Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dropper.exe

Overview

General Information

Sample name:dropper.exe
Analysis ID:1583673
MD5:762bf8c0fa7791e6b1d4fc4fd9750514
SHA1:b21efafaff42b9cb5d2a375a47236371610cd0d4
SHA256:8e01f0fce89a1f8ff1ce56ce426f289bccdb375fcaf68490237f59655dc50061
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Allocates memory in foreign processes
Changes security center settings (notifications, updates, antivirus, firewall)
Creates a thread in another existing process (thread injection)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Found direct / indirect Syscall (likely to bypass EDR)
Injects code into the Windows Explorer (explorer.exe)
Tries to delay execution (extensive OutputDebugStringW loop)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Enables driver privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
IP address seen in connection with other malware
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Uncommon Svchost Parent Process
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64native
  • dropper.exe (PID: 8152 cmdline: "C:\Users\user\Desktop\dropper.exe" MD5: 762BF8C0FA7791E6B1D4FC4FD9750514)
    • conhost.exe (PID: 4360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 4132 cmdline: "C:\Windows\System32\cmd.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • winlogon.exe (PID: 896 cmdline: winlogon.exe MD5: A987B43E6A8E8F894B98A3DF022DB518)
      • lsass.exe (PID: 960 cmdline: C:\Windows\system32\lsass.exe MD5: 15A556DEF233F112D127025AB51AC2D3)
      • svchost.exe (PID: 568 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p MD5: F586835082F632DC8D9404D83BC16316)
      • fontdrvhost.exe (PID: 796 cmdline: "fontdrvhost.exe" MD5: AB7AB4CF816D091EEE234C1D9BC4FD13)
      • fontdrvhost.exe (PID: 556 cmdline: "fontdrvhost.exe" MD5: AB7AB4CF816D091EEE234C1D9BC4FD13)
      • svchost.exe (PID: 1072 cmdline: C:\Windows\system32\svchost.exe -k RPCSS -p MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 1120 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: F586835082F632DC8D9404D83BC16316)
      • dwm.exe (PID: 1192 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
      • svchost.exe (PID: 1268 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 1288 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 1344 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: F586835082F632DC8D9404D83BC16316)
      • IntelCpHDCPSvc.exe (PID: 1384 cmdline: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_3ea756ac68d34d21\IntelCpHDCPSvc.exe MD5: B6BAD2BD8596D9101874E9042B8E2D63)
      • svchost.exe (PID: 1392 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 1460 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 1480 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 1524 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 1536 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 1648 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: F586835082F632DC8D9404D83BC16316)
      • IntelCpHeciSvc.exe (PID: 1732 cmdline: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_3ea756ac68d34d21\IntelCpHeciSvc.exe MD5: 3B0DF35583675DE5A08E8D4C1271CEC0)
      • igfxCUIService.exe (PID: 1756 cmdline: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_2e49f48165b8de10\igfxCUIService.exe MD5: 91038D45A86B5465E8B7E5CD63187150)
      • svchost.exe (PID: 1772 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 1856 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 1932 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 2000 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 2044 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 1444 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 1696 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 2092 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 2276 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 2392 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 2420 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 2496 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 2584 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 2672 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 2680 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 2712 cmdline: C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository MD5: F586835082F632DC8D9404D83BC16316)
      • svchost.exe (PID: 2744 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection MD5: F586835082F632DC8D9404D83BC16316)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 4132, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p, ProcessId: 568, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F28A540 BCryptGenRandom,SystemFunction036,BCryptGenRandom,SystemFunction036,0_2_00007FF77F28A540
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DC1A0 BCryptGenRandom,SystemFunction036,BCryptGenRandom,SystemFunction036,2_2_000001E9EC5DC1A0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AEC1A0 BCryptGenRandom,SystemFunction036,BCryptGenRandom,SystemFunction036,2_2_00007FFE99AEC1A0
Source: dropper.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.errorWt source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdb source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: dropper.pdb source: dropper.exe
Source: Binary string: *@C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdb source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.errornp source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\TCDE709.tmp.pdb source: svchost.exe, 00000012.00000002.3679635107.0000015B91656000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910875331.0000015B91656000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: dll.pdb source: dropper.exe, 00000000.00000003.1801624709.000001230EE59000.00000004.00000020.00020000.00000000.sdmp, dropper.exe, 00000000.00000002.1803905185.000001230EEA9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmp, cmd.exe, 00000002.00000002.3670963762.000001E9EA416000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmp, tempdll.dll.0.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdbTCDE&@ source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3679635107.0000015B91656000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910875331.0000015B91656000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\download.error source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062.pdb source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991 source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.error source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\TCDE703.tmp.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: dll.pdb( source: dropper.exe, 00000000.00000003.1801624709.000001230EE59000.00000004.00000020.00020000.00000000.sdmp, dropper.exe, 00000000.00000002.1803905185.000001230EEA9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmp, cmd.exe, 00000002.00000002.3670963762.000001E9EA416000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmp, tempdll.dll.0.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\download.error source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: WINWORD1.PDBwinload_prod.pdb source: svchost.exe, 00000012.00000002.3679635107.0000015B91656000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910875331.0000015B91656000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5E80E0 OutputDebugStringW,CloseHandle,memset,FindFirstFileExW,FindClose,2_2_000001E9EC5E80E0
Source: Joe Sandbox ViewIP Address: 1.1.1.1 1.1.1.1
Source: Joe Sandbox ViewIP Address: 1.1.1.1 1.1.1.1
Source: Microsoft-Windows-LiveId%4Operational.evtx.20.drString found in binary or memory: http://Passport.NET/tb
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
Source: lsass.exe, 00000006.00000002.3710081396.000001D5A1696000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848504666.000001D5A0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1622000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3670522460.000001D5A0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850167067.000001D5A1696000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1622000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
Source: lsass.exe, 00000006.00000002.3708539701.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849946528.000001D5A1641000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849833515.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3702556861.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3702556861.000001D5A1611000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850078314.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849833515.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
Source: lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000002.3747894161.00000203BC760000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000000.1869914301.00000203BC760000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000002.3747894161.00000203BC760000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000000.1869914301.00000203BC760000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
Source: lsass.exe, 00000006.00000002.3710081396.000001D5A1696000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848504666.000001D5A0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1622000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3670522460.000001D5A0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850167067.000001D5A1696000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1622000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 00000006.00000002.3708539701.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849946528.000001D5A1641000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849833515.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3702556861.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3702556861.000001D5A1611000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850078314.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
Source: svchost.exe, 00000025.00000000.1974733961.0000020206895000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000002.3676059694.0000020206824000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.1974813642.00000202068A8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000002.3687431840.00000202068A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
Source: lsass.exe, 00000006.00000000.1849526547.000001D5A14DD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3697261529.000001D5A14DD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: lsass.exe, 00000006.00000000.1848843522.000001D5A0CD0000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3678908754.000001D5A0CD0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
Source: lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: dropper.exeString found in binary or memory: http://ns.adobe.
Source: lsass.exe, 00000006.00000002.3708539701.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850078314.000001D5A165C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digice
Source: svchost.exe, 00000025.00000002.3686594730.0000020206892000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.1974733961.0000020206895000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com/
Source: lsass.exe, 00000006.00000002.3710081396.000001D5A1696000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3708539701.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849946528.000001D5A1641000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849833515.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848504666.000001D5A0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1622000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3670522460.000001D5A0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850167067.000001D5A1696000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3702556861.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3702556861.000001D5A1611000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850078314.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1622000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849833515.000001D5A1600000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0H
Source: svchost.exe, 0000001B.00000000.1947513300.0000015A41530000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
Source: lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
Source: lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
Source: lsass.exe, 00000006.00000000.1849946528.000001D5A164B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849885268.000001D5A1614000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3672345313.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3703976702.000001D5A1649000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C4C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848728130.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1849493676.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3696166954.000001D5A14CC000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3675959563.000001D5A0C88000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: svchost.exe, 00000022.00000002.3735824849.0000023DCECFA000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000000.1964678338.0000023DCECFA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.msftconnecttest.com/
Source: lsass.exe, 00000006.00000000.1849428437.000001D5A1493000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3694892536.000001D5A1493000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000002.3747894161.00000203BC760000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000000.1869914301.00000203BC760000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
Source: svchost.exe, 00000007.00000002.3710184662.000001C25487D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.1854630671.000001C25487D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.onenote.net/livetile/?Language=
Source: dropper.exe, tempdll.dll.0.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
Source: svchost.exe, 0000002A.00000000.1997961869.0000027311F8E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1997895867.0000027311F7C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3736012639.0000027311F7C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.comSRD1%
Source: svchost.exe, 00000025.00000002.3683338710.0000020206876000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.1974813642.00000202068A8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.1974587080.0000020206876000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
Source: lsass.exe, 00000006.00000000.1849428437.000001D5A1493000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3694892536.000001D5A1493000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000002.3747894161.00000203BC760000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000000.1869914301.00000203BC760000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
Source: svchost.exe, 0000002A.00000000.1997961869.0000027311F8E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3681957337.0000027310CA5000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1991269822.0000027310C9E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3122932540.0000027310CA4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.comSRD1-
Source: svchost.exe, 0000002A.00000000.1997961869.0000027311F8E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comSRD13
Source: svchost.exe, 00000007.00000002.3710184662.000001C25487D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.1854630671.000001C25487D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://spclient.wg.spotify.com/v1/live-tile-xml?region=
Source: svchost.exe, 00000007.00000002.3680147591.000001C253E43000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.cn/shellRESP
Source: svchost.exe, 00000007.00000002.3680147591.000001C253E43000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com/shell
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.20.drString found in binary or memory: https://wns2-ch1p.notify.windows.com/?token=AwYAAAA2HYHBNF6KtGfOq6LmRDRnRsE0C1NizUPB%2b9TW%2b0Tv9LLJ
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.20.drString found in binary or memory: https://wns2-ch1p.notify.windows.com/?token=AwYAAABApC73HrwE9gKV%2f4KYF6Kztns9Qz6WwYIs10FB2fwJYW985N
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.20.drString found in binary or memory: https://wns2-ch1p.notify.windows.com/?token=AwYAAABke4skwiuYfe49X%2f7MqWUvS4wAMAkNCdvIJKn2T%2fzGuskS
Source: Microsoft-Windows-PushNotification-Platform%4Operational.evtx.20.drString found in binary or memory: https://wns2-ch1p.notify.windows.com/?token=AwYAAACt0b4o2pzQr1ELEoEWZ1n5e%2fjr1V5ATEwWpquZtZOnf%2bYC
Source: svchost.exe, 0000002A.00000002.3732021382.0000027311EF4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1997217968.0000027311EF4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
Source: svchost.exe, 0000002A.00000002.3732021382.0000027311EF4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1997217968.0000027311EF4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com.com
Source: svchost.exe, 0000002A.00000000.1997961869.0000027311F8E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3725685333.0000027311D3C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1998134965.0000027312200000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1996163246.0000027311D3C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3737548261.0000027312200000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comSRD1#
Source: svchost.exe, 0000002A.00000003.3120063713.0000027311D4D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3120212964.0000027311D4F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1996163246.0000027311D3C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3120999826.0000027311D63000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3121060601.0000027311D65000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1993155866.0000027311800000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3741937602.0000027312323000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3120297979.0000027311D53000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3119200705.0000027311D46000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3715415088.0000027311800000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3119901157.0000027311D4B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3120816818.0000027311D60000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3119813685.0000027311D48000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3119103835.0000027311D44000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3121525964.0000027311D6C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3122326950.0000027311D70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/pwaimages
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F277CB0 memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,CreateToolhelp32Snapshot,memset,OutputDebugStringW,Module32FirstW,memset,memset,OutputDebugStringW,memset,OutputDebugStringW,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memcmp,memcmp,memcmp,memset,memset,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,Module32NextW,memset,OutputDebugStringW,NtClose,memset,OutputDebugStringW,0_2_00007FF77F277CB0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F27A5A0 memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,NtOpenFile,memset,memset,OutputDebugStringW,OutputDebugStringW,NtCreateSection,memset,memset,OutputDebugStringW,OutputDebugStringW,GetCurrentProcess,NtMapViewOfSection,NtClose,0_2_00007FF77F27A5A0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5E3110 NtReadFile,WaitForSingleObject,RtlNtStatusToDosError,2_2_000001E9EC5E3110
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5E8500 NtReadFile,WaitForSingleObject,RtlNtStatusToDosError,2_2_000001E9EC5E8500
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5E8620 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,GetModuleHandleW,FormatMessageW,GetLastError,2_2_000001E9EC5E8620
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99ADA350 memcpy,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,NtOpenFile,memset,memset,OutputDebugStringW,OutputDebugStringW,NtCreateSection,memset,memset,OutputDebugStringW,OutputDebugStringW,GetCurrentProcess,NtMapViewOfSection,NtClose,2_2_00007FFE99ADA350
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AF8620 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,GetModuleHandleW,FormatMessageW,GetLastError,2_2_00007FFE99AF8620
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F2828400_2_00007FF77F282840
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F2752D00_2_00007FF77F2752D0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F277CB00_2_00007FF77F277CB0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F274D100_2_00007FF77F274D10
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F2713500_2_00007FF77F271350
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F2773400_2_00007FF77F277340
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F2721C00_2_00007FF77F2721C0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F272DB00_2_00007FF77F272DB0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F2769B00_2_00007FF77F2769B0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F27A5A00_2_00007FF77F27A5A0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3C75D00_2_00007FF77F3C75D0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3A28600_2_00007FF77F3A2860
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3CDA700_2_00007FF77F3CDA70
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3A22800_2_00007FF77F3A2280
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3A16200_2_00007FF77F3A1620
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3C7A300_2_00007FF77F3C7A30
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3A20400_2_00007FF77F3A2040
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3A0C500_2_00007FF77F3A0C50
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3A1AE00_2_00007FF77F3A1AE0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3A25100_2_00007FF77F3A2510
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3A0F100_2_00007FF77F3A0F10
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3A02A00_2_00007FF77F3A02A0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3B8CD00_2_00007FF77F3B8CD0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F283CE00_2_00007FF77F283CE0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F2830E00_2_00007FF77F2830E0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F39FD600_2_00007FF77F39FD60
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3A1D700_2_00007FF77F3A1D70
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3AFF700_2_00007FF77F3AFF70
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F282B800_2_00007FF77F282B80
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3A09400_2_00007FF77F3A0940
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3BE5E00_2_00007FF77F3BE5E0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F39F4100_2_00007FF77F39F410
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3A12100_2_00007FF77F3A1210
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3C30100_2_00007FF77F3C3010
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DD1202_2_000001E9EC5DD120
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5E95102_2_000001E9EC5E9510
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5C4D102_2_000001E9EC5C4D10
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5C73402_2_000001E9EC5C7340
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DF6E02_2_000001E9EC5DF6E0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5D34E02_2_000001E9EC5D34E0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DDAD02_2_000001E9EC5DDAD0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5D54D02_2_000001E9EC5D54D0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5C52D02_2_000001E9EC5C52D0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DF1002_2_000001E9EC5DF100
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5D59002_2_000001E9EC5D5900
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5F8AF02_2_000001E9EC5F8AF0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5D1AF02_2_000001E9EC5D1AF0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5CCAF02_2_000001E9EC5CCAF0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5D31A02_2_000001E9EC5D31A0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5F1F902_2_000001E9EC5F1F90
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DDD902_2_000001E9EC5DDD90
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DF3902_2_000001E9EC5DF390
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5D73902_2_000001E9EC5D7390
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DD7C02_2_000001E9EC5DD7C0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5C21C02_2_000001E9EC5C21C0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5C69B02_2_000001E9EC5C69B0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5C2DB02_2_000001E9EC5C2DB0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DE9602_2_000001E9EC5DE960
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5D0F602_2_000001E9EC5D0F60
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5F8F502_2_000001E9EC5F8F50
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5C13502_2_000001E9EC5C1350
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5F2B802_2_000001E9EC5F2B80
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5E86202_2_000001E9EC5E8620
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5D76102_2_000001E9EC5D7610
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DCBE02_2_000001E9EC5DCBE0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5CE6002_2_000001E9EC5CE600
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DEBF02_2_000001E9EC5DEBF0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DE4A02_2_000001E9EC5DE4A0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5F86902_2_000001E9EC5F8690
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5F30902_2_000001E9EC5F3090
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DE0902_2_000001E9EC5DE090
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DC2902_2_000001E9EC5DC290
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5FA4C02_2_000001E9EC5FA4C0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5DEEC02_2_000001E9EC5DEEC0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5D64B02_2_000001E9EC5D64B0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5CA4B02_2_000001E9EC5CA4B0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5C7CB02_2_000001E9EC5C7CB0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5D78602_2_000001E9EC5D7860
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5F56702_2_000001E9EC5F5670
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5CF8702_2_000001E9EC5CF870
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AD21C02_2_00007FFE99AD21C0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AE0F602_2_00007FFE99AE0F60
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AD13502_2_00007FFE99AD1350
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99ADA3502_2_00007FFE99ADA350
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AD73402_2_00007FFE99AD7340
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AE1AF02_2_00007FFE99AE1AF0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AD52D02_2_00007FFE99AD52D0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AD4D102_2_00007FFE99AD4D10
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AE64B02_2_00007FFE99AE64B0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AEEBF02_2_00007FFE99AEEBF0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AECBE02_2_00007FFE99AECBE0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AED7C02_2_00007FFE99AED7C0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AF86202_2_00007FFE99AF8620
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AEE9602_2_00007FFE99AEE960
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AE31A02_2_00007FFE99AE31A0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AEDD902_2_00007FFE99AEDD90
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AEF3902_2_00007FFE99AEF390
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AFBD902_2_00007FFE99AFBD90
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99B01F902_2_00007FFE99B01F90
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99B02B802_2_00007FFE99B02B80
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AEF6E02_2_00007FFE99AEF6E0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AEDAD02_2_00007FFE99AEDAD0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AE54D02_2_00007FFE99AE54D0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AEEEC02_2_00007FFE99AEEEC0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99B0A4C02_2_00007FFE99B0A4C0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AED1202_2_00007FFE99AED120
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99B08AF02_2_00007FFE99B08AF0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AEF1002_2_00007FFE99AEF100
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AE59002_2_00007FFE99AE5900
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AE78602_2_00007FFE99AE7860
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AEE4A02_2_00007FFE99AEE4A0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AEE0902_2_00007FFE99AEE090
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AEC2902_2_00007FFE99AEC290
Source: C:\Users\user\Desktop\dropper.exeProcess token adjusted: Load DriverJump to behavior
Source: C:\Users\user\Desktop\dropper.exeProcess token adjusted: SecurityJump to behavior
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.drBinary string: 1\Device\HarddiskVolume4\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exeD
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.drBinary string: 1\Device\HarddiskVolume4\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exed
Source: System.evtx.20.drBinary string: C:\Device\HarddiskVolume4K
Source: System.evtx.20.drBinary string: \\?\Volume{cb7fdaf7-d8ae-4a24-98ab-ca007942ac33}\Device\HarddiskVolume1m
Source: Microsoft-Windows-SMBServer%4Operational.evtx.20.drBinary string: \Device\NetbiosSmb
Source: Microsoft-Windows-SMBServer%4Operational.evtx.20.drBinary string: computer WORKGROUP:\Device\NetBT_Tcpip_{68C65ED0-D5FC-471F-BF0F-95C04D2E3B08}
Source: System.evtx.20.drBinary string: \Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.20.drBinary string: \\?\Volume{cb7fdaf7-d8ae-4a24-98ab-ca007942ac33}\Device\HarddiskVolume1an
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.drBinary string: 1\Device\HarddiskVolume4\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.20.drBinary string: J\Device\HarddiskVolume4\Program Files (x86)\Joebox\driver\joeboxdriver.sys
Source: Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.20.drBinary string: C:\Device\HarddiskVolume4
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.drBinary string: 1\Device\HarddiskVolume4\Windows\System32\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.drBinary string: 1\Device\HarddiskVolume4\Windows\System32\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exeo
Source: System.evtx.20.drBinary string: \\?\Volume{cb7fdaf7-d8ae-4a24-98ab-ca007942ac33}\Device\HarddiskVolume1iceV
Source: Security.evtx.20.drBinary string: \Device\HarddiskVolume4\Program Files (x86)\Joebox\driver\joeboxdriver.sys
Source: System.evtx.20.drBinary string: .\Device\HarddiskVolume2\EFI\Microsoft\Boot\BCD~
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.drBinary string: 1\Device\HarddiskVolume4\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exeo
Source: Security.evtx.20.drBinary string: \Device\HarddiskVolume4\Windows\System32\drivers\filetrace.sysrit
Source: Microsoft-Windows-CodeIntegrity%4Operational.evtx.20.drBinary string: >\Device\HarddiskVolume4\Windows\System32\drivers\filetrace.sys
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.20.drBinary string: 1\Device\HarddiskVolume4\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume4\Program Files (x86)\AutoIt3\AutoIt3.exeT_AH**
Source: Microsoft-Windows-SmbClient%4Connectivity.evtx.20.drBinary string: :\Device\NetBT_Tcpip_{68C65ED0-D5FC-471F-BF0F-95C04D2E3B08}
Source: System.evtx.20.drBinary string: \Device\HarddiskVolume4\Windows\SysWOW64\tzutil.exeL
Source: classification engineClassification label: mal76.evad.winEXE@5/60@0/1
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5E8620 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,GetModuleHandleW,FormatMessageW,GetLastError,2_2_000001E9EC5E8620
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5D64B0 OutputDebugStringW,LsaOpenPolicy,GetCurrentProcess,OpenProcessToken,GetTokenInformation,LsaAddAccountRights,LsaClose,LsaClose,LsaClose,memset,OutputDebugStringW,memset,OutputDebugStringW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,memset,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,2_2_000001E9EC5D64B0
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99AE64B0 OutputDebugStringW,LsaOpenPolicy,GetCurrentProcess,OpenProcessToken,GetTokenInformation,LsaAddAccountRights,LsaClose,LsaClose,LsaClose,memset,OutputDebugStringW,memset,OutputDebugStringW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,memset,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,2_2_00007FFE99AE64B0
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F277CB0 memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,CreateToolhelp32Snapshot,memset,OutputDebugStringW,Module32FirstW,memset,memset,OutputDebugStringW,memset,OutputDebugStringW,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memset,OutputDebugStringW,memcmp,memcmp,memcmp,memset,memset,OutputDebugStringW,memset,memset,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,Module32NextW,memset,OutputDebugStringW,NtClose,memset,OutputDebugStringW,0_2_00007FF77F277CB0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4360:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4360:304:WilStaging_02
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5844:304:WilStaging_02
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5844:120:WilError_03
Source: C:\Users\user\Desktop\dropper.exeFile created: C:\Windows\Temp\tempdll.dllJump to behavior
Source: dropper.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\dropper.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\dropper.exe "C:\Users\user\Desktop\dropper.exe"
Source: C:\Users\user\Desktop\dropper.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\dropper.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\dropper.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe"Jump to behavior
Source: C:\Users\user\Desktop\dropper.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\dropper.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\dropper.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\dropper.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dllJump to behavior
Source: dropper.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: dropper.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: dropper.exeStatic file information: File size 3247104 > 1048576
Source: dropper.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x15da00
Source: dropper.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x1ad800
Source: dropper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: dropper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: dropper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: dropper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: dropper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: dropper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: dropper.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: dropper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.errorWt source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdb source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: dropper.pdb source: dropper.exe
Source: Binary string: *@C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdb source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.errornp source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\TCDE709.tmp.pdb source: svchost.exe, 00000012.00000002.3679635107.0000015B91656000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910875331.0000015B91656000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: dll.pdb source: dropper.exe, 00000000.00000003.1801624709.000001230EE59000.00000004.00000020.00020000.00000000.sdmp, dropper.exe, 00000000.00000002.1803905185.000001230EEA9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmp, cmd.exe, 00000002.00000002.3670963762.000001E9EA416000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmp, tempdll.dll.0.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\winload_prod.pdbTCDE&@ source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3679635107.0000015B91656000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910875331.0000015B91656000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\download.error source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062.pdb source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991 source: svchost.exe, 00000012.00000000.1910798877.0000015B91647000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3678032834.0000015B91647000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\36C00AF489401A26639ABBA698DE76062\download.error source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\TCDE703.tmp.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: dll.pdb( source: dropper.exe, 00000000.00000003.1801624709.000001230EE59000.00000004.00000020.00020000.00000000.sdmp, dropper.exe, 00000000.00000002.1803905185.000001230EEA9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmp, cmd.exe, 00000002.00000002.3670963762.000001E9EA416000.00000004.00000001.00020000.00000000.sdmp, cmd.exe, 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmp, tempdll.dll.0.dr
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\ntkrnlmp.pdb source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\47114209A62F3B9930F6B8998DFD4A991\download.error source: svchost.exe, 00000012.00000002.3676309771.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910751932.0000015B9162A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: WINWORD1.PDBwinload_prod.pdb source: svchost.exe, 00000012.00000002.3679635107.0000015B91656000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910875331.0000015B91656000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000012.00000002.3680429632.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000012.00000000.1910914394.0000015B9166B000.00000004.00000001.00020000.00000000.sdmp
Source: dropper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: dropper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: dropper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: dropper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: dropper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\dropper.exeFile created: C:\Windows\Temp\tempdll.dllJump to dropped file
Source: C:\Users\user\Desktop\dropper.exeFile created: C:\Windows\Temp\tempdll.dllJump to dropped file

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\dropper.exeSection loaded: OutputDebugStringW count: 1228
Source: C:\Windows\System32\cmd.exeSection loaded: OutputDebugStringW count: 1973
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 9118Jump to behavior
Source: C:\Users\user\Desktop\dropper.exeDropped PE file which has not been started: C:\Windows\Temp\tempdll.dllJump to dropped file
Source: C:\Windows\System32\cmd.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_2-11189
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5E80E0 OutputDebugStringW,CloseHandle,memset,FindFirstFileExW,FindClose,2_2_000001E9EC5E80E0
Source: lsass.exe, 00000006.00000000.1848773496.000001D5A0CA8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
Source: svchost.exe, 00000014.00000000.1918128496.0000024472040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3681342964.0000024472040000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor
Source: lsass.exe, 00000006.00000000.1848773496.000001D5A0CA8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
Source: svchost.exe, 00000007.00000000.1854366097.000001C254800000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicshutdown
Source: svchost.exe, 00000007.00000002.3691967229.000001C254013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicvss
Source: svchost.exe, 0000000A.00000000.1861897146.0000020295213000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3732406775.0000020295213000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.3733618857.0000023DCECDA000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000000.1964395015.0000023DCECDA000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000000.1964042058.0000023DCEC24000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.3730778928.0000023DCEC24000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000002.3676836230.0000020206832000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.1974262335.0000020206832000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: svchost.exe, 00000020.00000002.3672044851.00000176A2C00000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: lsass.exe, 00000006.00000000.1848773496.000001D5A0CA8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
Source: svchost.exe, 00000007.00000002.3691967229.000001C254013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmicshutdown
Source: svchost.exe, 0000000A.00000000.1861942504.000002029522A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.3732882937.000002029522A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
Source: svchost.exe, 00000007.00000002.3691967229.000001C254013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @vmicshutdown
Source: lsass.exe, 00000006.00000000.1848541761.000001D5A0C13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3671476740.000001D5A0C13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000000.1865068592.0000017A4FA13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.3670300175.0000017A4FA13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000E.00000000.1902839830.0000023624C29000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.3671063709.0000023624C29000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.3674201539.0000021074A2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000F.00000000.1905255624.0000021074A2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1918128496.0000024472040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3681342964.0000024472040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000000.1928161645.000002624BA5A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: svchost.exe, 00000007.00000002.3691967229.000001C254013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @vmicheartbeat
Source: svchost.exe, 00000007.00000000.1854366097.000001C254800000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
Source: C:\Windows\System32\cmd.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\svchost.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\svchost.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3C7054 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF77F3C7054
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5CCAF0 OutputDebugStringW,GetLastError,GetLastError,memset,memset,OutputDebugStringW,GetLastError,OutputDebugStringW,2_2_000001E9EC5CCAF0
Source: C:\Users\user\Desktop\dropper.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\cmd.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3C7054 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF77F3C7054
Source: C:\Windows\System32\cmd.exeCode function: 2_2_000001E9EC5F823C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000001E9EC5F823C
Source: C:\Windows\System32\cmd.exeCode function: 2_2_00007FFE99B0823C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FFE99B0823C
Source: C:\Users\user\Desktop\dropper.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\dropper.exeMemory allocated: C:\Windows\System32\cmd.exe base: 1E9EA1F0000 protect: page read and writeJump to behavior
Source: C:\Users\user\Desktop\dropper.exeThread created: C:\Windows\System32\cmd.exe EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeThread created: unknown EIP: AAA804F0Jump to behavior
Source: C:\Windows\System32\cmd.exeRegistry value deleted: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender DisableAntiSpywareJump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtCreateFile: Direct from: 0x7FF77F3AE785Jump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtClose: Direct from: 0x7FF77F279E04
Source: C:\Users\user\Desktop\dropper.exeNtProtectVirtualMemory: Direct from: 0x7FF77F27DBFBJump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtUnmapViewOfSection: Direct from: 0x7FF77F279D14Jump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtClose: Direct from: 0x7FF77F3A8991
Source: C:\Users\user\Desktop\dropper.exeNtSetInformationThread: Direct from: 0x7FF77F3C6C37Jump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtProtectVirtualMemory: Direct from: 0x7FFEABF42651Jump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtAllocateVirtualMemory: Direct from: 0x7FF77F27F694Jump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtWriteVirtualMemory: Direct from: 0x7FF77F27D0BAJump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtAllocateVirtualMemory: Direct from: 0x7FF77F27D076Jump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtMapViewOfSection: Direct from: 0x7FF77F27FAF4Jump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtQueryInformationProcess: Direct from: 0x7FF77F27F67FJump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtClose: Direct from: 0x7FF77F27BF83
Source: C:\Users\user\Desktop\dropper.exeNtWriteFile: Direct from: 0x7FF77F3AE917Jump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtAllocateVirtualMemory: Direct from: 0x7FF77F286BF3Jump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtCreateThreadEx: Direct from: 0x7FF77F27D30AJump to behavior
Source: C:\Users\user\Desktop\dropper.exeNtUnmapViewOfSection: Direct from: 0x7FF77F27F7E5Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: PID: 5028 base: 9E30000 value: 43Jump to behavior
Source: C:\Users\user\Desktop\dropper.exeMemory written: C:\Windows\System32\cmd.exe base: 1E9EA1F0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\winlogon.exe base: 22EA0F30000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\lsass.exe base: 1D5A12C0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1C2547E0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\fontdrvhost.exe base: 2D165ED0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\fontdrvhost.exe base: 15A02590000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 202954F0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 17A4FD10000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\dwm.exe base: 203C25A0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 210B17B0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 23625470000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 210752F0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_3ea756ac68d34d21\IntelCpHDCPSvc.exe base: 20132040000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 25A61170000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 15B925D0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1E527CD0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 24471FF0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 2624C1F0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 2A512710000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_3ea756ac68d34d21\IntelCpHeciSvc.exe base: 13C98A30000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_2e49f48165b8de10\igfxCUIService.exe base: 1A7C60C0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 15A415E0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 2B8023E0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 16F945E0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 18130BF0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 18A357F0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 176A39A0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 26D9CBF0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 23DCEBE0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1C21B810000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 2B6742F0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 20207560000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 20C362C0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 202DE5C0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 23332A00000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 24D9AC90000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 273114F0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 2E2D45A0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\spoolsv.exe base: 380000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF66FA0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1D388F80000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 2BBDEF30000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1E8AD970000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 21FEF4C0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1C4DAF90000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 2008E430000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1CE82070000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1620F440000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_78ff17a5ea060c5f\OneApp.IGCC.WinService.exe base: 1F32D400000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\DriverStore\FileRepository\dal.inf_amd64_ffc75848a6342fdf\jhi_service.exe base: 1B09BCE0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 15BF5370000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 246D20C0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 21290350000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1D861D60000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 24F383E0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 25D417C0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\sihost.exe base: 280B6990000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1FD0F310000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1E374BA0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe base: 700000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1CBDEC80000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1F1A68B0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 20DCEFE0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1D2EDCD0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\explorer.exe base: 9E30000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_2e49f48165b8de10\igfxEM.exe base: 2A1B2970000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 24274250000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: 2E75E930000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1E4E89D0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: 210C33F0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 18035870000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1FBC6F10000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 2382AEB0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\SettingSyncHost.exe base: 1C79D3A0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 21DEAFD0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 14DFF1A0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\dllhost.exe base: 1CD12040000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe base: 204BDDA0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\audiodg.exe base: 1DA251A0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 27DD4FC0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1F217020000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe base: 4D0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 1BA63E20000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 175748A0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 282CAFC0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 279ECD60000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 255D5AD0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 2266FBE0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\svchost.exe base: 23236FC0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 2BB0000Jump to behavior
Source: C:\Windows\System32\cmd.exeMemory written: C:\Windows\System32\conhost.exe base: 28438CA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 20295500000Jump to behavior
Source: dwm.exe, 0000000C.00000000.1880891638.00000203C0FB8000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000002.3769113737.00000203C0FB8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: winlogon.exe, 00000005.00000002.3700153476.0000022EA18E0000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000005.00000000.1846935380.0000022EA18E0000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000C.00000002.3738435099.00000203BA570000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: winlogon.exe, 00000005.00000002.3700153476.0000022EA18E0000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000005.00000000.1846935380.0000022EA18E0000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000C.00000002.3738435099.00000203BA570000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: winlogon.exe, 00000005.00000002.3700153476.0000022EA18E0000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000005.00000000.1846935380.0000022EA18E0000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000C.00000002.3738435099.00000203BA570000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: RProgram Manager
Source: winlogon.exe, 00000005.00000002.3700153476.0000022EA18E0000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000005.00000000.1846935380.0000022EA18E0000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000C.00000002.3738435099.00000203BA570000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\Windows\Temp\tempdll.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\dropper.exeCode function: 0_2_00007FF77F3C6F2C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF77F3C6F2C

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Windows\System32\cmd.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center FirewallOverrideJump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows DefenderRegistry value created: DisableAntiSpyware 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows DefenderRegistry value created: DisableAntiVirus 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngineRegistry value created: MpEnablePus 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableBehaviorMonitoring 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableIOAVProtection 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableOnAccessProtection 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableRealtimeMonitoring 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time ProtectionRegistry value created: DisableScanOnRealtimeEnable 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\ReportingRegistry value created: DisableEnhancedNotifications 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNetRegistry value created: DisableBlockAtFirstSeen 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNetRegistry value created: SpynetReporting 1Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNetRegistry value created: SubmitSamplesConsent 1Jump to behavior
Source: Microsoft-Windows-Windows Firewall With Advanced Security%4Firewall.evtx.20.drBinary or memory string: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2108.7-0\MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
LSASS Driver
1
Access Token Manipulation
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
42
Process Injection
12
Virtualization/Sandbox Evasion
LSASS Memory51
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Abuse Elevation Control Mechanism
31
Disable or Modify Tools
Security Account Manager12
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
LSASS Driver
1
Access Token Manipulation
NTDS3
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
42
Process Injection
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Bypass User Account Control
1
Abuse Elevation Control Mechanism
Cached Domain Credentials1
Remote System Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync1
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Bypass User Account Control
Proc Filesystem22
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
dropper.exe4%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.digice0%Avira URL Cloudsafe
http://schemas.micro0%Avira URL Cloudsafe
https://excel.office.comSRD1%0%Avira URL Cloudsafe
https://word.office.com.com0%Avira URL Cloudsafe
https://powerpoint.office.comSRD130%Avira URL Cloudsafe
https://outlook.comSRD1-0%Avira URL Cloudsafe
https://word.office.comSRD1#0%Avira URL Cloudsafe
http://ns.adobe.0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://word.office.comsvchost.exe, 0000002A.00000002.3732021382.0000027311EF4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1997217968.0000027311EF4000.00000004.00000001.00020000.00000000.sdmpfalse
    high
    http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmpfalse
      high
      https://windows.msn.com/shellsvchost.exe, 00000007.00000002.3680147591.000001C253E43000.00000004.00000001.00020000.00000000.sdmpfalse
        high
        http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmpfalse
          high
          http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmpfalse
            high
            https://docs.rs/getrandom#nodejs-es-module-supportdropper.exe, tempdll.dll.0.drfalse
              high
              https://wns2-ch1p.notify.windows.com/?token=AwYAAACt0b4o2pzQr1ELEoEWZ1n5e%2fjr1V5ATEwWpquZtZOnf%2bYCMicrosoft-Windows-PushNotification-Platform%4Operational.evtx.20.drfalse
                high
                https://www.office.com/pwaimagessvchost.exe, 0000002A.00000003.3120063713.0000027311D4D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3120212964.0000027311D4F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1996163246.0000027311D3C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3120999826.0000027311D63000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3121060601.0000027311D65000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1993155866.0000027311800000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3741937602.0000027312323000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3120297979.0000027311D53000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3119200705.0000027311D46000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3715415088.0000027311800000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3119901157.0000027311D4B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3120816818.0000027311D60000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3119813685.0000027311D48000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3119103835.0000027311D44000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3121525964.0000027311D6C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3122326950.0000027311D70000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmpfalse
                    high
                    http://schemas.microsvchost.exe, 0000001B.00000000.1947513300.0000015A41530000.00000002.00000001.00040000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://ocsp.digicelsass.exe, 00000006.00000002.3708539701.000001D5A165C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1850078314.000001D5A165C000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      https://wns2-ch1p.notify.windows.com/?token=AwYAAABke4skwiuYfe49X%2f7MqWUvS4wAMAkNCdvIJKn2T%2fzGuskSMicrosoft-Windows-PushNotification-Platform%4Operational.evtx.20.drfalse
                        high
                        https://word.office.com.comsvchost.exe, 0000002A.00000002.3732021382.0000027311EF4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1997217968.0000027311EF4000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://excel.office.comSRD1%svchost.exe, 0000002A.00000000.1997961869.0000027311F8E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1997895867.0000027311F7C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3736012639.0000027311F7C000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          https://spclient.wg.spotify.com/v1/live-tile-xml?region=svchost.exe, 00000007.00000002.3710184662.000001C25487D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.1854630671.000001C25487D000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/wsdl/lsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              https://powerpoint.office.comSRD13svchost.exe, 0000002A.00000000.1997961869.0000027311F8E000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://outlook.comSRD1-svchost.exe, 0000002A.00000000.1997961869.0000027311F8E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3681957337.0000027310CA5000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1991269822.0000027310C9E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000003.3122932540.0000027310CA4000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://windows.msn.cn/shellRESPsvchost.exe, 00000007.00000002.3680147591.000001C253E43000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                https://wns2-ch1p.notify.windows.com/?token=AwYAAAA2HYHBNF6KtGfOq6LmRDRnRsE0C1NizUPB%2b9TW%2b0Tv9LLJMicrosoft-Windows-PushNotification-Platform%4Operational.evtx.20.drfalse
                                  high
                                  http://www.quovadis.bm0lsass.exe, 00000006.00000000.1849428437.000001D5A1493000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3694892536.000001D5A1493000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000002.3747894161.00000203BC760000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000000.1869914301.00000203BC760000.00000004.00000001.00020000.00000000.sdmpfalse
                                    high
                                    https://wns2-ch1p.notify.windows.com/?token=AwYAAABApC73HrwE9gKV%2f4KYF6Kztns9Qz6WwYIs10FB2fwJYW985NMicrosoft-Windows-PushNotification-Platform%4Operational.evtx.20.drfalse
                                      high
                                      https://word.office.comSRD1#svchost.exe, 0000002A.00000000.1997961869.0000027311F8E000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3725685333.0000027311D3C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1998134965.0000027312200000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000000.1996163246.0000027311D3C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002A.00000002.3737548261.0000027312200000.00000004.00000001.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://Passport.NET/tbMicrosoft-Windows-LiveId%4Operational.evtx.20.drfalse
                                        high
                                        http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000006.00000002.3673991180.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848644587.000001D5A0C50000.00000004.00000001.00020000.00000000.sdmpfalse
                                          high
                                          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000006.00000002.3672345313.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000000.1848580244.000001D5A0C2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                            high
                                            http://ns.adobe.dropper.exefalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://ocsp.quovadisoffshore.com0lsass.exe, 00000006.00000000.1849428437.000001D5A1493000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000006.00000002.3694892536.000001D5A1493000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000002.3747894161.00000203BC760000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000C.00000000.1869914301.00000203BC760000.00000004.00000001.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              1.1.1.1
                                              unknownAustralia
                                              13335CLOUDFLARENETUSfalse
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1583673
                                              Start date and time:2025-01-03 10:10:28 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 11m 49s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                              Run name:Run with higher sleep bypass
                                              Number of analysed new started processes analysed:7
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:37
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:dropper.exe
                                              Detection:MAL
                                              Classification:mal76.evad.winEXE@5/60@0/1
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:Failed
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                              • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, conhost.exe
                                              • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              No simulations
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              1.1.1.16fW0GedR6j.xlsGet hashmaliciousUnknownBrowse
                                              • 1.1.1.1/ctrl/playback.php
                                              PO-230821_pdf.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                              • www.974dp.com/sn26/?kJBLpb8=qaEGeuQorcUQurUZCuE8d9pas+Z0M0brqtX248JBolEfq8j8F1R9i1jKZexhxY54UlRG&ML0tl=NZlpi
                                              AFfv8HpACF.exeGet hashmaliciousUnknownBrowse
                                              • 1.1.1.1/
                                              INVOICE_90990_PDF.exeGet hashmaliciousFormBookBrowse
                                              • www.quranvisor.com/usvr/?mN9d3vF=HHrW7cA9N4YJlebHFvlsdlDciSnnaQItEG8Ccfxp291VjnjcuwoPACt7EOqEq4SWjIf8&Pjf81=-Zdd-V5hqhM4p2S
                                              Go.exeGet hashmaliciousUnknownBrowse
                                              • 1.1.1.1/
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              CLOUDFLARENETUSebjtOH70jl.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                              • 188.114.97.3
                                              W2k2NLSvja.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.97.3
                                              FACT0987789000900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.96.3
                                              Setup.msiGet hashmaliciousUnknownBrowse
                                              • 104.21.32.1
                                              PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                              • 104.21.67.152
                                              http://4.nscqn.dashboradcortx.xyz/4hbVgI3060FFjU163rczgakrldw288HJUBSXEIQRWLNTA425583MYLP8076x12Get hashmaliciousUnknownBrowse
                                              • 1.1.1.1
                                              ogVinh0jhq.exeGet hashmaliciousDCRatBrowse
                                              • 104.20.4.235
                                              https://myburbank-uat.3didemo.comGet hashmaliciousHTMLPhisherBrowse
                                              • 104.26.13.57
                                              hiwA7Blv7C.exeGet hashmaliciousXmrigBrowse
                                              • 172.67.19.24
                                              http://hotelyetipokhara.comGet hashmaliciousUnknownBrowse
                                              • 104.21.96.1
                                              No context
                                              No context
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.317357507089542
                                              Encrypted:false
                                              SSDEEP:192:D8V7IF0RuqHQOnbgpib8AtYl+HDJ86PL+2SSD2Czp0gy16ZcC0/oUhQXzgwPtFqL:QhkyHQOLt5jR7zpkYQ9z+/TG6OtiY
                                              MD5:CA05A8EF9EFA541820B9A3D1D6E4D607
                                              SHA1:F7F15473CA3C1536AE571827FCB340D67C229799
                                              SHA-256:DB10F633289A65E7B927C2535B9B7AF208C1350DE3F9432C2F077F266876B97B
                                              SHA-512:0D71A18608A6551E5C01C869914F38782248AA669D295300C4989B69BA2B66F6F410791DBFCFDF7DAF94CA62F29374486E983D80107A15D5672BBEADFB193F9B
                                              Malicious:false
                                              Preview:ElfChnk.u...............u.............................vx......................................................................R_................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...............................9...........................).......................**......u.........K.i........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.471085771951786
                                              Encrypted:false
                                              SSDEEP:384:ZIhBNimLN3UN3pNINcN3uN36ZN3fcN3dN3xzN3lN3RN3sN3YN3zN3TN3JN3xN3kM:+AaC30SyTx57f6u5Z3/y2Fpwswk
                                              MD5:45583ED41855344DB67C5897C583269B
                                              SHA1:159826E30931D94FE11E3668A2DF3298D2EF298C
                                              SHA-256:CD303FFD25A30F80DF7000DE805781FDF9B598153AB198D9CF5F8D9EE75FD84A
                                              SHA-512:E8BA5A87140307D7F5770B7E83D249B309D2871C9BC5579030B6A669D1513163066BFB1797EE17996175FC8F822FE629300DE85A6D7AAA2494178CD9129CE500
                                              Malicious:false
                                              Preview:ElfChnk._.......y......._.......y............G..xI... .x....................................................................%.5................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**......_..........f,........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):69240
                                              Entropy (8bit):4.323948789348342
                                              Encrypted:false
                                              SSDEEP:384:SVHVdnV4V9VjVVVVhKVQV7VdVdEV/jVAVjVKV+VsV6VxVpV5mVmVoVJVsVuVSVRp:bfpq6
                                              MD5:38669967D478013212CE4ED4AB58C678
                                              SHA1:FB42791F75EA973A51C20B465102F96BE7A8ED0D
                                              SHA-256:4D56E20E3D9D303CEBB640B5C59CDF711483E715C7CBCED81DBFD6FF412BBCBF
                                              SHA-512:3491E9271BB5D1A5F5689D123CEE552922A40109EEE19BBEF1616C26BEDE0635AE0B5EC2E8DF9CD00A49ACEB826BB61516444FB1D718528E0A4FC80D071797FC
                                              Malicious:false
                                              Preview:ElfChnk.|(.......(......|(.......(..........8|...~....3e........................................................................................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&............................................&...............................#......**.......(.......<..]......../X.P&...............................................................@.......X...a.!.....E..........@.<..]......]......]..8...l....(...................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t...'..Y.J.R>:..=_M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t./.O.p.e.r.a.t.i.o.n.a.l...f.d.........N...M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s...S.e.a.r.c.h._.c.w.5.n.1.h.2.t.x.y.e.w.y.....s......**.......(........=..]......../X
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.3946742616331385
                                              Encrypted:false
                                              SSDEEP:1536:JY1fni2TDyiWAZfBzB6BbB2e7CBC23KDi/OyazwNJCmikDw:KfjDyGA
                                              MD5:8C584F0C2548065D96ECD20CDF399B93
                                              SHA1:70B546F843562BD8EC14D27DA0D258C98162DCD7
                                              SHA-256:841D8A202ED20FF90F8C821A405185A2BD92B2664259BB1ADF7DDD17452CC6A7
                                              SHA-512:F30A622357A3376E8E0FBC2F8522B5D76FCC15E59B97A322F68305B8D9DAD9A9493DB4078FA7897A7E358122FBFC813F95CD3E8DBD42FBA15CB1F052E1501949
                                              Malicious:false
                                              Preview:ElfChnk..'.......'.......'.......(.................R.....................................................................m/'.................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...............................3W..#>.......................N..&........................................8...;.......@......;5...........`..........**.......'........~........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.340052085018986
                                              Encrypted:false
                                              SSDEEP:384:rhm+iMNEi1itiXiYiAiQiCiYiXiviCiriMiKiYili+iciSiVciji/DiQisiKi7i4:r8
                                              MD5:99669F5266647966B480D0F4BF617990
                                              SHA1:680D1F4A75F3974808719C0D8F6FC8732C9C8BD9
                                              SHA-256:B3C5A2E0EFE60C841A6C9D5E871F4A7533DC286CD8F036C0DAAEDB960F2A2129
                                              SHA-512:CEE0318611F43ECB227F80ED4E36882709AB3A0E32EC301459DC7FC9C710F56E009F6B239780DE01D6B132C822EE46C073358D5782D6E40DF96CE9DE7E95B12D
                                              Malicious:false
                                              Preview:ElfChnk.........3...............3........... z..h|....?.....................................................................@'..............................................=...........................................................................................................................f...............?...................................b...........M...F...........................................................&.......................................................................................**..X..............w............>.&.........>..'.W.U2..9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.448777410500309
                                              Encrypted:false
                                              SSDEEP:384:8hI3c6dh3O3Km30v3635B33H353X3g3J3N33Lv3j3j3A3730j3ue3H3T39z3IM3U:8kqL+Tl5qhdWFgwc4MElvawvMLoo
                                              MD5:02952C86F9B4D292381FDC4ADEE3BB27
                                              SHA1:F9C2E6FC882EB94C0CBB9E58453185F649FD2AD1
                                              SHA-256:21E51C5F4F136BBC03A070485A582860C70F28BF0258437C70741CC265B2827B
                                              SHA-512:2ED7FC1335ECD17FDFB31EE9E863AB4329859E813E80EBDB0FB2956D4B989DBFCF1D963DC2AB0A1307ED30635C8AEB972769181528151280B196958584F81EFB
                                              Malicious:false
                                              Preview:ElfChnk.........^...............^...........`.........I.....................................................................]...............................................=...............u...........................................................................................................H...............?...............................................M...F...........................................&................9......................................................................j...............**.................*T.........B...&.......B...._.X.$.]...+........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.22642484283712
                                              Encrypted:false
                                              SSDEEP:768:mPcpk0+dX1RzsZrczv9ezTjlRLD1xzzmfgO5WJ:04PTjX
                                              MD5:71D8B347FC36E3BBF82BFA7B67D30C51
                                              SHA1:40B3183F8BC2DC7B59F644A44064B121E92CCA89
                                              SHA-256:21399E3BDF55D542EF6CD6C0CCC2825593C73F570800D7383D0EA388A37E011F
                                              SHA-512:5A00AEFC1769DF324663D8C2F6D3959B9F7A10D270C94F0581E9FA0DB7821226D9B63EEAA4E8D03FA0F54B18759DDF652B9D993950C90E1995171E6C7F7C226D
                                              Malicious:false
                                              Preview:ElfChnk......................................&...(..=.Tv.....................................................................w..........................................4...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**...............q..f........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.953892112941886
                                              Encrypted:false
                                              SSDEEP:768:Bl/LLKiILbXvvvD7rrXuXtPPrzbvjPH7b3z:uiZX
                                              MD5:51F287C19FD8D718665AE93755E49789
                                              SHA1:9C1D5D078F0F8846E01CE340AA5DF6DC840BD7AB
                                              SHA-256:26E592666A18E69B371F7F40EC0E1A942A8665819FB056C9A1210E8BF21EEBB6
                                              SHA-512:F882E84AA94FAF611ED552770438A7815988B67519B00473E6B67CC70C34D2D37D344D458E772328CA2FCFD860B1476E63750E8BE1B2A583122496C751DAF7F7
                                              Malicious:false
                                              Preview:ElfChnk.........................................p.....Uf....................................................................j.q`................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**.................g,........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):67560
                                              Entropy (8bit):2.5012553886847404
                                              Encrypted:false
                                              SSDEEP:384:BoOKxcojhuoS9VoryorOoroortorVorVorNorrmo4oruorlIoreorNorworgorDp:QsWqGO
                                              MD5:4BFAF011F8D43F0B64B613C0251AC723
                                              SHA1:C0353E09527F7EA18E5FBD47FA7C6297A9C3B927
                                              SHA-256:1C86F7E62C13A8922F5CA02ED44BFDDAED738B5D0BA9676B454351F4270D68B4
                                              SHA-512:1CFD8581BBEB9B35EB859DE227228F29B89718B00A46C8D3FF5E6A321651E59C29347704C1D636D2F0C2DD9069502FF9A1C218E7D915CCCA4593007837862D72
                                              Malicious:false
                                              Preview:ElfChnk.........M...............M............}......9......................................................................M..x................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...................................................................................................................E{..............................**......L........:)..]......../X.P................................................................>.......V...X.!..e...............:)..]......]......]......X...L....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y..k.N.<.D..97d>7.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y./.O.p.e.r.a.t.i.o.n.a.l...!>.E{......!>....[.U.....i...........|...:....A..3...b...%....=.......F.i.l.e.N.a.m.e.L.e.n.g.t.h.......A..3...b...%....=.......F.i.l.e.N
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.2039623428900272
                                              Encrypted:false
                                              SSDEEP:384:DhNPmP1PKPvPZl5P8P7PAPt/PU+PKP1PEPNPaPQPiPqPFDPhP6PwPXPaPZ8PWPCn:DDlvUGLpF
                                              MD5:BF839F61B8509D2BA013E21D5EFB64AB
                                              SHA1:22668868E83DDB0F6225A0EEC6E52151E3582413
                                              SHA-256:066A01D0D8102CFEA34B5DB728F61D39D8909E508877456D64FDACA1693EBC80
                                              SHA-512:B93F0251372B6D082C3292E1F68A52889E9EC22556A9B8243D43D5217606E5171248210C1B1439DBCEF8DA7BF8E50699CD7066A86E8BB895F9D6F617829D8F0B
                                              Malicious:false
                                              Preview:ElfChnk.........G...............G........... t...u...7.....................................................................-.K^................N...........................=...........................................................................................................................f...............?...........................m...................M...F.......................&...................................................................................................'.......................**..x...........B...S...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.1777142048205946
                                              Encrypted:false
                                              SSDEEP:768:qDbHtuYYZAqRidVY4HdYWgML/chv4PzSw05Wt19M6vz73mA4+9AxNAVBBBxZvaV4:N27
                                              MD5:C6D0CD72D59A5899D41AA26A905F0CF4
                                              SHA1:21F28930C56543BA30AEA04CF498B95DC74C8D26
                                              SHA-256:A769F4AA35805D622753C6728EE3F31C147019C21162A14E61EB2E63207CB6CA
                                              SHA-512:21648DB20C6520D2F46D24587032F5535E6059B3E94D9814B15BBCDC2EACB9827B887D173DE3A02F68DAC0B1998A96C193E7C0805C6F0A0DE4971BD37CCD45A2
                                              Malicious:false
                                              Preview:ElfChnk.........G...............G............q..ps..2k.\........................................................................................F...........................=...........................................................................................................................f...............?...........................m...................M...F.......................&...........................................................................................................................**..p...........!|..S...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.728529992742437
                                              Encrypted:false
                                              SSDEEP:384:/hch15hHh0hUh4hlhhhFhhNhPhLh1hthlh6hah+hFh1hVhEhUhMhFhJhKhthPFhM:/yyoA
                                              MD5:3A209D72BB7CD82F33F122164465B8DC
                                              SHA1:A56A595132E7EB8A87CDD428995D2B9FFC42828F
                                              SHA-256:A2B80E54420E53556E4462B39272AECE4718864DC68563CBCC03B09AFC792338
                                              SHA-512:71873924BD3A7B8C944D9E1273192AD0EC1C5FB222A147D4C115139ABDFFB6961151F49D35FB46DE68661FA53112E9794135CD27C0B331A65EDDD61FB6D68FFE
                                              Malicious:false
                                              Preview:ElfChnk.....................................h...X....N$l.......................................................................(................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...................................................!i..........&...................................................................................**..X........................./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.8002646739086935
                                              Encrypted:false
                                              SSDEEP:384:A6h7YJVYV4YcYIjYkYVpYsqYVyYV3YVfYVRYVSY:bfvzDWeM
                                              MD5:2BA39549B106C8FC4FE0F1D272FFCBB7
                                              SHA1:F9EC0BE60CF59315AA07748A5555B2FCC8DAAA44
                                              SHA-256:2733C048E5F142D564C96C7D40D965F86EDB98B5E0E1449479F4B6000124715E
                                              SHA-512:BBCAA661B8F128C9F0DE05E84878C54BFFA4B532610F799D8D8F584C9A4135BD08983BDBA429DA2A9314FA7208F678A6EEDE474C18D9D3E121571C2B2E71E53C
                                              Malicious:false
                                              Preview:ElfChnk.z...............z...................@!.. #..,.^.....................................................................m.7m................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**..h...z.........i._........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.699669825530658
                                              Encrypted:false
                                              SSDEEP:384:nhDCq2cCp1Cz2TCLqCM2CZCjiCsCblCnC/iCsCe5CECOwCFCkUCXCUoCjCtorCrx:nUEJ2R
                                              MD5:7C383F220CCF7AE5BFC75FC4C087D1E8
                                              SHA1:C954003C698498CC0002459700A1A67741634777
                                              SHA-256:9719EBAEABC138DFE9172C3D9D0400C17918172535D9676772391DC31AF9E49E
                                              SHA-512:19C405E18A58232417F50D7030ED37CEDB1C7FE9B3FA5B52D422B9D5C6A9A859D91EB6EBBEB1973F514B9DBA0A31C843C5597E80439D0E8014E87BB97AB7F487
                                              Malicious:false
                                              Preview:ElfChnk.m...............m............................Sy....................................................................E.$.............................................=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**.. ...m.........*13........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.953822970614976
                                              Encrypted:false
                                              SSDEEP:768:oey39iM13dtfbSqyYcQGXrlhmQHZHm43/0YOb5IMSm/OAwuM2eWE:YSE
                                              MD5:8CDE65568AA84CAD5EFFA67C34EE0598
                                              SHA1:D5D301DE2FEB829D26F01700BFAD2B3BC082955E
                                              SHA-256:6213E07EDC1449EA17833C80A9B9BB699CEF267CBB6E0B339BAF3160FEEFC402
                                              SHA-512:0748F6372930EA9BE259DC733F6FE449AD8F9119DEBA5D0202F7F23FAD7EAB7B11D4362412BBF466F513C508F6B663EE5BB154F94B8B05A25939531C1FFE7F71
                                              Malicious:false
                                              Preview:ElfChnk.........F...............F...................IG......................................................................'.n.................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...................................................................................................................................................**..x...........&............./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.472701761912705
                                              Encrypted:false
                                              SSDEEP:384:Eh8kbAP1gjk+Jk+yk/3Suhfmk+Adk+AkKuIk+2hk+Dk+rk+4k+ik+8k+4k+Uk+R7:ENAP1EHDzS0SpmjmoToEEltkV48m
                                              MD5:3D7BF6131B2BF1CAFC71AB0E6F87F170
                                              SHA1:9E16D96BDA70506DA07294615FB8CDBC61B46D7E
                                              SHA-256:866F56B9C85CDAA38C082E62B8AAE5472254150E95625D4B87BAE2B649670C0D
                                              SHA-512:11276CC04623E4E9778E338EB3781DECE976873DA04D1C65949A39ACC215D86ECC16A0290A93FBBFE8F884195FD4DDB48D71DFDFEE4BDF6015AF2E865D5E1B64
                                              Malicious:false
                                              Preview:ElfChnk......................................I...K............................................................................`................b...........................=...........................................................................................................................f...............?...........................m...................M...F.......................&.......................................~...................................U...............;...............................**..x............Ft.i...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.445319870654315
                                              Encrypted:false
                                              SSDEEP:384:GhaEdEqXAEJVvOEJSvEqEBEENEuDEaExEOEAE7EmEizEJ6ExEZEX/+EaEF5EOcE4:GVXmIBqr97fAI6XNMJlpO
                                              MD5:6D3C0546E8E757F5165167BD707752B2
                                              SHA1:5C7B5D53F2BD6B9D35E94A1DAB435977DA6A6F3D
                                              SHA-256:32520504B280A16110A920CBE1819E42CC19E84197111914B61CA7DBB7E1E0A0
                                              SHA-512:9CA45F17836F3BF0976A213B41A92EAF66A329CE808D23A1C656347F2C367F1B85141E00AD8FBE94B013F198771031957F56B788E8DC9DABB22C8C2515B5DD97
                                              Malicious:false
                                              Preview:ElfChnk.....................................P........'.v....................................................................1.9.................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F....................#...............!...9..=................O...=...........A...?.......;..ME..........}....................'..........5...........**...............2...9......../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.3995297065421424
                                              Encrypted:false
                                              SSDEEP:384:JhPFKlcLBKalKuDGK1GKgkKClKvQKqlKlaKu7dKrXK7CK53HKstKoIK8eKugGKIz:Jz8
                                              MD5:AEDBC66370D37B0736385E9DF81F2189
                                              SHA1:353E6833D8C54695EED688BF7D18388D2BC06636
                                              SHA-256:2C68161836C61E4B4FFB9AA8B6563921C9A5DA858CADC85C7F7DE6AFFC67B4DB
                                              SHA-512:E719260CB8EDD26DDB35EDA6CDB4495CE467A354910652C6A64BE63DC87222A6D56980BE81677128DB090D1408AE4C954CD9A3C159140B44B3B41911473E2B33
                                              Malicious:false
                                              Preview:ElfChnk.=...............=....................x..0z..(........................................................................Q.................H.......................,...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...........................................................!.......................**..x...=.......m............./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.102452801956487
                                              Encrypted:false
                                              SSDEEP:384:dh+DEfbDisDTDqDPD1DPDXDuDTDGD8DMDRDcDvDhDlDEJDpDmXDyDsD6DwDKDODQ:drqyaBHYPi
                                              MD5:D6AB266F8146081CC5B39581B63419B6
                                              SHA1:03B2ED65ED60282561C37C60850ADE53113AFD45
                                              SHA-256:AEFDE4777F3C4A579828AE80981BE2714227BA624163765BDE1A908144E5B108
                                              SHA-512:08DCEFDA403CF3BD15C125606596FA07296371309229F88519B59CFCBCC579B480C959C11B3A805C83D803BBE53AB5D749F3496CBE6F600F9B568F389FA153AF
                                              Malicious:false
                                              Preview:ElfChnk.........<...............<...........8.......b.X\.......................................................................$................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**..............F_G.4........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.1951183317588985
                                              Encrypted:false
                                              SSDEEP:384:phdzpzAzKzyzIzazrzRztzPzxaz9OzJznzfzXz4zdz/znzYx3z9zrzmzYzwzYzXA:pK8WxvZ
                                              MD5:1E9AA0568D589B2B72C7FBA5DA357CE5
                                              SHA1:C3147DDE26420D49439FA9FE2D217B71ABC42539
                                              SHA-256:DF94EA2970ED1AF6334B6127D014AEE24E6660D6ED56648C239E84B2DA6BF404
                                              SHA-512:AACF138137D7EC96223ADEDE96B4EE6E90389A861D3680C080B5135AE2DE78D08EEDEC8FA3F37A1FE018E791DB0EDC33BDE726BB8CECEB033263D22E38C78B8A
                                              Malicious:false
                                              Preview:ElfChnk.....................................@...0....q?!.......................................................................................<.......................d...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**..............,o.{........../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.7393244733469149
                                              Encrypted:false
                                              SSDEEP:384:phXIVbIEIiNjI0IlIkI2IrIQIPIiIHI7I267WI+vILINIhIkI8IDITI0IfImIlI:pQjP0
                                              MD5:37BF6F02816D21A96D244C4CCE776B30
                                              SHA1:C90E7EDDD004AC2C3B0CC7051012F84948DFF890
                                              SHA-256:C584262439F9D8CF9CFCF7347FF0A4B2848AF9CD7F03CC5F66DD798EF30BA687
                                              SHA-512:8005777CD298969F1A6FDCEC9C9F51C2002DBC8BF34C90AB56B2F965E481D179A55104A1B5BC81D551C41B28AF2EBCF198C3C536C2F746938CB8F33978E752A9
                                              Malicious:false
                                              Preview:ElfChnk.............................................* .y....................................................................}.(W................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F............................................................h......................................................................................**...9..............9......../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):5.698981106820357
                                              Encrypted:false
                                              SSDEEP:384:xhPa5UAzIzyzka5raKxphpKWQOPM+2KX8oIa5uaa5E6H2K7zyzIzfa5zMzuzNz01:x6Wc1JvZe
                                              MD5:4A1A3E143E2C91F24E727C42EBEF74C8
                                              SHA1:C5EC8F8F1B115376EA815439B44AC78FDF64DA78
                                              SHA-256:909753801FB877443B44492397F74FEEC9C219981C33ED80198447436CCD878E
                                              SHA-512:FA45A8276241D5FA89096855F6F2DCAE097597FB5FCAE24FBD44B50809D279E906D789AFBA80724F5556FBCBB8B21188FBAE4A9B7328AACB4336E1CCE0ACB0CD
                                              Malicious:false
                                              Preview:ElfChnk.h.......p.......h.......p............`...b..Y&......................................................................w..p........................................8...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&.......................................................................y!..........**......h.......6..<.]......../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.1078194442473146
                                              Encrypted:false
                                              SSDEEP:384:2h0QMqHM3EbMYFMOuM0cMn71MuMMxsM98M0n4MBHMovMmXMqQMrdMlOMZzMWHMBW:2ZWa
                                              MD5:6E827C3A14ADE71EE1A590B0B589C32D
                                              SHA1:3F2F1B997FE929C4901B5CB4797975E608C92004
                                              SHA-256:B8579BBB00FE585C98279986D456AB7FFCC745215B610AD3CF91164AC54ED757
                                              SHA-512:A78E3E12E8EFC9F713E3587B83F1709027EE8197CB6A8978C034D07523A169817762F6968CFC935C21540232EB520802F7C541593FB2FB816228115597578091
                                              Malicious:false
                                              Preview:ElfChnk.........@...............@............l..Pn..Y..`....................................................................k...........................................>...=...........................................................................................................................f...............?...........................m...................M...F.......................&...........................................................................................................................**..............)..S...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.282506379130842
                                              Encrypted:false
                                              SSDEEP:384:Lhb1Sh151f21Q1c161J1fA1eE1cj1/q1f+1Cz1410C1F1f81H111f210111X1fI8:L6vPCDe2v/bgrJlrxbz3t3fAQmLm
                                              MD5:FBCD26FDD21DE9A9A37D977967F3E435
                                              SHA1:3215A571E100BEE2B4A0786E8870415FC0460B83
                                              SHA-256:B5395AC0D74FA4F7F7E8E7C0EF6E3C0F1E57031EC88BE035024FDB096A013ECF
                                              SHA-512:E57FC724432F900C57B9B410F2C2589A00717B4C0927467C6A883B234E906CBEB6087088FCAB0373C8A125FD836833F4F64DCB6C922D118D786C6872ACCA7165
                                              Malicious:false
                                              Preview:ElfChnk.0...............0...................`......../M.......................................................................x.................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................1.......................................................**......0...........]........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.323432355165814
                                              Encrypted:false
                                              SSDEEP:384:yhnIFwI1IcIIIEI1InI0IXInICIWIzIOILIqIhIXIJIrIPIMIiIMI/InIFIxImIV:yuxxVIRr
                                              MD5:F737596F7B40F88F8118EDB58EEFFA37
                                              SHA1:BB21B3F84EBFB93D98A3808D85DF56337A1DCD46
                                              SHA-256:CF6E3590B51C3506EE36C092F6E12C30B117767C39FF54218D040332815E9B45
                                              SHA-512:A971647EE9028E3F5A5169BAF518C7C678AC430D9C740823A9EFAF45304FB1E2577168E9FA8190454B88209880CA584FDC44EB0DF76690A68F88DE40BCEA130E
                                              Malicious:false
                                              Preview:ElfChnk..................................... .................................................................................}.........................................0...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**..h...........r.........../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.1541116692842
                                              Encrypted:false
                                              SSDEEP:384:8hqILI6I6IUI+I4IZIhISCI3hUICIOIDIMIfINIEdImIDIXIjlII+I/IAIiIkItY:8HZhxKkDBhT
                                              MD5:AB1E696BF5A8671E47A66DCE5F1A43DC
                                              SHA1:9A2623F28CAF13D5600FFC6F93BA507955AB9D0F
                                              SHA-256:8A50DBCA8693D81535DB8E4E4D0BD2E9C33981EACA9E924C8981CC9F966DE219
                                              SHA-512:24CFBCAD1F26F6EF5A30A9EF25872C1498223F0E5D6236DD62E063F7BA9F56C4DF2FB76BE050D3A35B15CB44C6492D2BDE2366B629CA5DA4B25D242F8E496F99
                                              Malicious:false
                                              Preview:ElfChnk.........Q...............Q............o...q...........................................................................@!.............................................=...........................................................................................................................f...............?...........................m...................M...F.......................&...........................................................................................................................**..................S...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.8998803290277757
                                              Encrypted:false
                                              SSDEEP:768:141WS5OAT1rPgAT0nH15T0n915T0nQ15T0nW15T0nr15T0nB15T0nh15T0nb15TT:XScA
                                              MD5:6F2DDEA5E2C93524F07EC17890A247CF
                                              SHA1:45832DB838E1378DC96D1142C867EF5007671DF3
                                              SHA-256:160178BB9FFB551F1195982325645229F3534C2E0E6C2753952C57BDA2BFD87B
                                              SHA-512:EDEEA26ECC9675AE6C0937A44C5ED44369CA2E50BA438DAE06C3CF32D284F75DECB81CF4FB9EA6F9DC400665FA5D56C8B86B4FE06689EFF281B6D0BD675B23BB
                                              Malicious:false
                                              Preview:ElfChnk.Y.......[.......Y.......[............'.../..?..k................................................................................................................B...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**..8...Y........n_I.9......../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):103632
                                              Entropy (8bit):4.9748872305581155
                                              Encrypted:false
                                              SSDEEP:768:ERwcWmH+43Nj0G8hyDV4B1WgvOPN3Az4wcWmH+43Nj0G8hyDV4B1l:E/N3t0vsDVNPN3vN3t0vsDVG
                                              MD5:E619DFD4FD97C8A61946A44AE456BF15
                                              SHA1:BC403AFC1F8E9C719E0E8C33FFEFCFBCE2C9EC13
                                              SHA-256:875ABFA1E63E97E5C7BF8A2AE2A235816563F67FCA426A3B544BDD72649C7481
                                              SHA-512:DE852B142B56C81B20FCC52DD989637A8B25D997E30947E8177C866CC79D7E1CAFBD697A4BFADCE9514307D3757521AACD09BA23C457C405BE5C8849E1668C41
                                              Malicious:false
                                              Preview:ElfChnk.{*.......*......{*.......*..................P.(......................................................................e................n...........................=...........................................................................................................................f...............?...........................m...................M...F........................,...................x..........G........n.......).......%...............................................{..............W...**..8...{*......`.n..]......../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:DIY-Thermocam raw data (Lepton 2.x), scale 4-8, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 10384593717069655257060992658440192.000000
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.053649827115195
                                              Encrypted:false
                                              SSDEEP:384:Zho8N8M8p8d8I8K8t8v681o8t8K8aI848s8D828P8N8285818n8U858w8v8yt8+m:Zj31lT
                                              MD5:5F53E0F9E97DF09A3D6B41D97E368058
                                              SHA1:167E112D214AEBB96A3C3E8FB804565EBBF35F07
                                              SHA-256:34B1F24FC914161D35BE2AB7342E8EC966D2DBA9FC67292D9CEDB18F38243CAE
                                              SHA-512:8287038E44CAECE033727FA4B50102449A4265B2D4ACF8D8F258CEDD243B4BA02B71D051FABC9B6D2F079ED6DF901B823443FAF21B272DD8726DF43BAA4B4335
                                              Malicious:false
                                              Preview:ElfChnk.........@...............@...........8f...g....Ig.....................................................................$..........................................V...=...........................................................................................................................f...............?...........................m...................M...F.......................&...........................................................................................................................**..(...........e...S...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.2229180413645775
                                              Encrypted:false
                                              SSDEEP:384:OhuvnvmvJvBvdvrvwvSvovl+v4v6vvvmvcMvOyv4vCvAvTvGvP+v5vRvH8vUv5vC:ONzTEejRRTt2
                                              MD5:BDBB2FF15C1B180C7B13590E3E02DBBD
                                              SHA1:2989F4396A4277D203C79F0FBB3DD68630CE64DB
                                              SHA-256:E49AC7A0299A0252079DA7900FD16461E299E1F9C5D9E8FC21D459B6763F611F
                                              SHA-512:545AD7A3777A01497007ECDD46A2360214F9A203A05B748D684AB2E79CA442DFFFED46FDCFA70557928E9AB55F8B1B565AC435F6605B2C6E1CE1F27BF3AD246F
                                              Malicious:false
                                              Preview:ElfChnk.........................................P...`..0.....................................................................j.................v...........................=...........................................................................................................................f...............?...........................m...................M...F.......................&.......................................f ..........................................................O.......................**..............l..-T...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.09283426805895
                                              Encrypted:false
                                              SSDEEP:768:WS/Bp+UdTU8UqOUyGUwaUpcuUvKUruU6DUZ5UtaUKOUpSUv2UwLiUIeU7bUhCUrp:b7rw
                                              MD5:FBCF55B27308A765B6D514AD9E3F975E
                                              SHA1:C1B35022A1690FEB22836A5858EDE7F003B2AA06
                                              SHA-256:D0E486FCFDD73BFB154EF9BA7412F010AF3172289705132F93959FE18B7377B9
                                              SHA-512:8F64ED00CE3BCDFBC246C7BF6B425EC91482017D051B81764C143709CF473182583ABC778E50ABAA78C038E4AE10E405FA700312493ECF133DB83792FD558108
                                              Malicious:false
                                              Preview:ElfChnk.....................................8...h....{.V........................................................................................C...........................=...................................}.......................<...............................................................f...............?...............................................M...F...........................................................&.......................................................................................**..h.............h............>.&.........>..'.W.U2..9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 7, DIRTY
                                              Category:dropped
                                              Size (bytes):71160
                                              Entropy (8bit):0.8572927173515907
                                              Encrypted:false
                                              SSDEEP:384:aJhRiBmiriGi/i6ieibhRiBmiriGi/i6iei:ikDk
                                              MD5:82F661D9877F6F88624801634D77F6FF
                                              SHA1:A4107575C2372B597188CC2D89C20945FB37000B
                                              SHA-256:FC0453DB9A22C67332F6A56DE1A85EA3694AF1822F38188DDBF1D7620FB5EDF1
                                              SHA-512:7E930C4A2CA17D22DDF4600E8F0ECE6B5FF1B008379D4D7FA6FFCA2374189150CD3E05D20C35A179A8B6F5C6F31928A006FB08BA83E91DFA22FCB3625E1A59A0
                                              Malicious:false
                                              Preview:ElfFile......................................................................................................................O.+ElfChnk.........................................x............................................................................t................|...........................=...........................................................................................................................f...............?...........................m...................M...F.......................&.......................................................U...................................................................**..............<k}/T...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:modified
                                              Size (bytes):112240
                                              Entropy (8bit):4.295073254607269
                                              Encrypted:false
                                              SSDEEP:384:JChd2h2x2z2W2q2Ez2S2h2HC1C+CACA2q282vo2Q2f2j2S42N262W2kCwCaCZLjL:0GCyLBWpfPc6isrzh4GCyLBWp+u
                                              MD5:259F7B168C26DC917FE7D9929A0FC14C
                                              SHA1:89C4882321E1ADAA23EDAB7C59599A350E3F58CE
                                              SHA-256:D0B1C57E305ADA2D665512DE23F66485059DF18372428BF995FD538B54765526
                                              SHA-512:BA3E4C4770BB756E012EA322AE4805FE26338768CDF016B5194328675CF466C587AB2792C0BE03A13CE140BE541C889EA08C8B74E44EBF6C15AFCD3B5A5FCC17
                                              Malicious:false
                                              Preview:ElfChnk.<.......s.......P...................h...p......<....................................................................M.F.................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................!b..................................&............................................................;......................**.. ...P........v...9......../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.415346248247045
                                              Encrypted:false
                                              SSDEEP:1536:jtJTcmXTfu/hD9ouzDZx+DWQeD8yiM4C0BYEeKee6lFY99PXg95RA2IektFNEfJ7:5JTcmXTfu/hD9ouzDZx+DWQeD8yiM4CZ
                                              MD5:79E319114B3EDCE65E6008FFCF8E6C4D
                                              SHA1:168F4EDF140DED590DCA93A95EA5B061FBA6222B
                                              SHA-256:0885B77A81A3F6C8F127876A0699EC9F6DB6A0C516B7787B4A4C07240502BD74
                                              SHA-512:46D2A05AC7DB5DACA3935D1989F51BDB463245DDD31CD569F8A8DEC33463A52ED4BA740ECAB75FC0D6FCA59AD7FF469D159ACA7D17AAABADE6BA9378227A110C
                                              Malicious:false
                                              Preview:ElfChnk.~...............~.......................x......q.....................................................................U,.................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**......~.......=............./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.473355136480431
                                              Encrypted:false
                                              SSDEEP:1536:Cv8uGpQtJAd1WVXrBNg/Sf2uGyywH3cIKkkZkpagW2Dwaz2JXD6kdEHTmsCnvYbM:Cv8uGpQtJAd1WVXrBNg/Sf2uGyywXcI2
                                              MD5:263EEA3261C771F3BAD4918FFAACD3B3
                                              SHA1:3E8160BAF2FA49C5B5657611C711B1869F88F0F2
                                              SHA-256:89CC7AF7AD6C7EF037B289CDFB84352BA81453BA8A8494F8AA6063CAD3551DBE
                                              SHA-512:C1C1FA1E2249D138ECB7DBB6069A7F66BF7026DE9CC3F4B61E45F50648D2E371C35E1FB2DBCC5EC00C53C10309EF7DB43D2870C8CFDCA0F9633A8BB8FF632095
                                              Malicious:false
                                              Preview:ElfChnk.0&.......&......0&.......&..................0.........................................................................).................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F......................................................................................................................a~...y......................**......0&......N...]......../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.9554289307699784
                                              Encrypted:false
                                              SSDEEP:384:ihq7v7l7UZ7r7B7c7li7x/7Z7Z747A7rK7Rx7fy7P7C7I7F7W7DX7z7C7B7Z7f7H:iGzb
                                              MD5:2C17148B09B6B77C7CBE1EF79F2E0DA0
                                              SHA1:7290371228D62E2FC08D05DA4A1DF7B3F47EA851
                                              SHA-256:4C75036C4709C4BE048F986E67FF40CBBBE37018C5817FCDEAF8336B329E30D5
                                              SHA-512:E6B70D03B3FE3E781757F4E72B43FFDCD90695CFAA6EDB535351DA2824A5C8F82237040243F9F803D4F662904A154CFDD7E0C991C333A62D0BDED3ACB893EE0E
                                              Malicious:false
                                              Preview:ElfChnk.........2...............4............\...^.."..".....................................................................S\.........................................0...=...........................................................................................................................f...............?...........................m...................M...F...........................................m!..................&...........................................................e.......................**............................/X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.258875318932236
                                              Encrypted:false
                                              SSDEEP:384:M8hwuTDFbuJuuDu/uVuuvu7uu6uOuU/ueuu/uFuuVuauUmuPuuAutuu2kuzjuUa2:M8HawuFBoRW3L463zLKxWFmu16S
                                              MD5:F0AE98EB279C50FC1D2A4FE3C598C405
                                              SHA1:4D555B1880C7B0F75688C157A7C752C3C854177F
                                              SHA-256:50BAF1B339B0326697A6760ED2B3E962A813B704AF9FD876058AAA592263226B
                                              SHA-512:2B7E9DE8E45EEBD1924FB64E4EA92F1A9A59BF41FCC1F5E63074DBE47FED68BB33E75DA3FB3EAB7FDD055C9B498456B98C7E1489A171D3F050DE57BE8AEAF597
                                              Malicious:false
                                              Preview:ElfChnk.6...............=............................o`.................................................................................................................F...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................o...............................**......=........*............/X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.3453030234141012
                                              Encrypted:false
                                              SSDEEP:384:Kheu/uSuWugu5uGuFu5ut1u7su+uPudu3uxuIuTuxufvuIUubuMuBuquZu/uKu9H:KP6ZDGl
                                              MD5:611FFBE1C80E5D28A7490CF7C55DC0AA
                                              SHA1:7AC79562942DF77EF8BCFB64DFC4F044937AC725
                                              SHA-256:C5C3C756447CB67D04115151674FF3778DC61FAF4CC751EC8F5B12C86C981AF3
                                              SHA-512:A53A47520AFF99363716F9D692E63067A823F8E7A7E1F8B7B14D7E2F5909DA0490BC7A971E21A81BA355B6FA962C9D0E8B422B3FDA8070CC989B8B62E05873D0
                                              Malicious:false
                                              Preview:ElfChnk.........H...............H............z.. |....R.....................................................................W.L................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F.......................&...........................................................................................................................**..............%,H(T...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.298985438907344
                                              Encrypted:false
                                              SSDEEP:384:2ahPAodANA9APA7SjAkxArIvjA2UlA/A3AnA7ATAnALAlAfMAYQAgiA/ABAxAsAz:2a9SNmIvvfek9kOG
                                              MD5:FBE31E45BEE6A41C17FA69BA3ACE038E
                                              SHA1:E207C6A6AF78878C7B30F34F7D8B8B4A95687FB1
                                              SHA-256:7EFC10299E5832FC49DA06B985D83883B1931B6FDAA9E5EA24BB1CEE3DD00CAB
                                              SHA-512:BB06451E4912E404E846C8312A5B4ACD576013471BB62976E35B4311DCE66D17CE12C21D452B78C8A4A0E1878BD830CD6FC8DBB257CEA8D86077ACA891CB5CC7
                                              Malicious:false
                                              Preview:ElfChnk.........r...............r...........8.......X..y....................................................................)...................4.......................\...=...........................................................................................................................f...............?...........................m...................M...F...........................M........................%..........&...................................................................................**..............}y.._........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.4245834313194634
                                              Encrypted:false
                                              SSDEEP:384:Yhk+pUYnpdo4pd+pdnpdwpdVpd+pdrpd4pdRpd/pdqpd9pdopdKpdXpd8pddpddh:YIAz69
                                              MD5:C9EA969B9079CC8119796DB7CABABA3D
                                              SHA1:FF6FA77A0C3DAA3BB6F30BDDF892954A158F9A8D
                                              SHA-256:8E724EA6C1DAEE8E81871A215AB2632F03BEEEB7BE6F78F216350EA962D92F6F
                                              SHA-512:F8C170283AC815C6A2E8740E4849AF80CB420184223C36CD0B360F6DB9D46240199859FC08DC0B0190FCD27FF4B8489C61EF12FAEC107215C9151BEDCD3EB9D5
                                              Malicious:false
                                              Preview:ElfChnk.&.......L.......&.......L............... .....2.................................................................................................................:...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**......&.......yN..^........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.121653993559385
                                              Encrypted:false
                                              SSDEEP:384:IhmCpaKpmpL6pAsUpfwpAbdpABApAGQpTVp2LMpIJpAbWpW8pAWWpAJap8kpAE0E:ICX8T/ke
                                              MD5:836292A8B200CCA648A675131A7FBAD4
                                              SHA1:D3BF3EF8B2D9A632C4B2C9C93F2C2FF047DA353E
                                              SHA-256:931C964A1969042377DC7EAC1F1274143D867DFDAD45D8E389517CCE32CF44E3
                                              SHA-512:DB8D9C8FEA94C82DFB889439BF10F43DEC489EC8189F3345744A1AC581AD146553E9F50C526281922651C3BA1D940768628A911C96FD064DEFE9D2F0BECC9D24
                                              Malicious:false
                                              Preview:ElfChnk.........R...............R...............X...oH7L................................................................................................................D...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...............................i'..E...............................................**..............a...f........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.236353710304171
                                              Encrypted:false
                                              SSDEEP:384:6hoCKCQC8CUCLCYC7CFCuC2C+CxC1Cl0Ct4CCC2C7CLCtCeCeCiCmjC0zCpDCMCc:6+fNJCRxkjZHbUL
                                              MD5:0071D965F90F7978F469A2193A685FED
                                              SHA1:27CC4070CD630F93A7CBBEFE3DC99C596778AE2F
                                              SHA-256:61E1AC21458D10B942132149B089389C004A6BCB81C15F6BE9DE83C314000291
                                              SHA-512:23DD85FF846319E3145A0C93855516F846BD5324B85559F9CC64C30ED8F477B24439D6B95EEC17180F0C8CA56BB1B6B1059C80C3B51BD2D37CC2E3FE5097D2CA
                                              Malicious:false
                                              Preview:ElfChnk.........P...............P...................h.......................................................................m...................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F.......................&........................................%............................................................................../...**..@.............1.S...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.697634260387277
                                              Encrypted:false
                                              SSDEEP:384:Uh54M5hM9MMeMVMsMhMIMkqMULbyKMXNbM9M/fpM0fMU+jMjMIMF6QMkIMaxMqMg:UfAby39f7Wp8bVBabyMbywGBcbyKJdAn
                                              MD5:216C060E8BC7718FE314681C4522C7AA
                                              SHA1:CA91FB84A06B77E96A3F09210A399C2781FBDF06
                                              SHA-256:278A2B71890198C09EC27121DCF0BC433F17229CE10C56B62B42D49E8FA868F5
                                              SHA-512:05CAA54D00E6C5F7DDA18B2A9ECDF2A84274BDE22298D02D95056B60B00971A0AE7C17C01A423FB508F385F46B8E5DD0767824B8CE8D2907F985A929F09AF7C8
                                              Malicious:false
                                              Preview:ElfChnk.O...............O.......................(......^.......................................................................F........................................D...=...........................................................................................................................f...............?...........................m...................M...F...............................e+..............................&........................................................H..........................**......O..........J.]......../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 64, DIRTY
                                              Category:dropped
                                              Size (bytes):108648
                                              Entropy (8bit):3.630708561580112
                                              Encrypted:false
                                              SSDEEP:768:SvgffnPNm/2sY3pLwIkJ2jLHbj9fr7w2imMFopTMFw3grHUP9qPvgffnPNm/2sYk:LGaYCGaY
                                              MD5:F1792F1F50C8F385B11B08C34767793A
                                              SHA1:02EE3215E5767AE15E6706F05C07CA80CE169C7C
                                              SHA-256:D2350D2AF119A5441F0BF408976E32FC6651F45A5F8FA79E5986E9B355D38DA0
                                              SHA-512:DB8FCEAC3BCAE10684FAFCE62AB4B27C5AEC0E0DD96124A70A05988B5ADC67342D7509160677F354991A9F9E925D02C129FA84CABE4D4B4D032EDB5E150050E2
                                              Malicious:false
                                              Preview:ElfFile.................@....................................................................................................d.BElfChnk.........@...............@...................BPh...................................................................................... .......................H...=...........................................................................................................................f...............?...........................m...................M...F.......................&.......................................fC...................................................................1..............**................8.S...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.203905497815097
                                              Encrypted:false
                                              SSDEEP:48:M0BW4CrP+MZQNRBEZWTENO4bpBdo4i/6FgVt:LoKNVaO8toh/6Fg
                                              MD5:73EFCA720203B38B5359CED08C224555
                                              SHA1:CEF8F27415EBC5AD15C854346EB8590217090DDB
                                              SHA-256:7A5B0B7BD92397B3C085F4AF3D674D072762ECB1DCCB111BFA957920C16A01A8
                                              SHA-512:95B8C386A16C53BC65E42D65076E93A28F197058FB2BC9F3B97AC6DD6FB07E4F4E082566506B30417950543858BC3828F2A415592AC396F6A6C508668CADA366
                                              Malicious:false
                                              Preview:ElfChnk......................................................................................................................k................ .......................H...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**................|J.]......../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.298824401368957
                                              Encrypted:false
                                              SSDEEP:1536:ZKoKKK3KOKbKrK7KAKqKpK0KXKAK8KTK+KfKvKYKqK4KGKkKhKjK9KyKeKhK1KK7:ZKoKKK3KOKbKrK7KAKqKpK0KXKAK8KTg
                                              MD5:BE4737B80496B7E9F99E9FE82BA58F79
                                              SHA1:57550603B61895810546370E2904155D12A59C93
                                              SHA-256:157AF8FF86608132E7BC8B6A3508681616C4768F2A1D585F4F16837D9AFFCA14
                                              SHA-512:42D9E17D56289E28EE849F763B9A158708580ADB0A3DFDA9FA7D607BBDB766C19F7951189B3E484D77243CEBF16BCF87F5D3FB7B4695838D06A2EE23CC0A29C2
                                              Malicious:false
                                              Preview:ElfChnk.....................................X}......p6dt.......................................................................7................,...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...................................................................................**..H...........N..)........../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.095984635925141
                                              Encrypted:false
                                              SSDEEP:384:Oh8i4i/yi6iDiDi5iwiliM1iNiUiXKbieifiGiOiOiIiIiBigi1iVinixiEiVciq:Op6xKo4KN
                                              MD5:64951A5836E8371CE0B1749B5BA7EB6E
                                              SHA1:CCF4E110C89C901FAFCAED03C598B6064A0CB6B9
                                              SHA-256:99F1A88E3F8C44DA8B960782B2F3DA4F483E0DC967000EC4ED209B11E89787A1
                                              SHA-512:B92F8C500CAD7AA8D927877D66E15FCA7B2FC7D286CF80DAC0502CB646577E21018ACBC1F5EF488E478991C7C0FBD2588BA9630D2E9802ED699F3F6F74D75494
                                              Malicious:false
                                              Preview:ElfChnk.....................................hQ..pS....F......................................................................*.............................................=...........................................................................................................................f...............?...............9.......B.......................M...F...........................................................&...............................................................q.......................**..................f...........>.&.........>..'.W.U2..9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.308707995715741
                                              Encrypted:false
                                              SSDEEP:768:uxSaa8NlaranavazaZa5agCadadaZadacaRaZasasaUaUaMacaIaYaEakaAagakL:yNA
                                              MD5:BC1BCC38E89B3483AAAF40BC3122D3AD
                                              SHA1:1D02ABC77061093A5867F3E259160B019444DFB7
                                              SHA-256:B24A4E4A935D6B689208D05D4E9F911BD34A9A6C456948E961EF52DDFA2D7AC5
                                              SHA-512:EF011A89D4123BF2D950E607E1D5564D6CFDDC3D0B7156744F336BB83E47D7FD0D5BEB2A7C08DC78DBD96283056E2C6ECCA5750161B20EBCB5585EFEAC35CDDB
                                              Malicious:false
                                              Preview:ElfChnk./.......x.......E.......................P...d$.,....................................................................?..%................`...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...............................................9...................................**..H...E.......3..Y.9......../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.930395201431989
                                              Encrypted:false
                                              SSDEEP:384:QhNXDcXxzXZXeX/XOXMXauXLiXCXVX1XYXZXeX+XiXfXuXFXRX9XsX5XLXzXgXyV:QyAggHqOT
                                              MD5:AEC70E63BB17473F5BC05BBA7A24C4D5
                                              SHA1:DC60A92CD17B66D662548F761194417584C19EFD
                                              SHA-256:735D6547ED68F051448721EF4CB6696DFDC7366C7A3E23E7C0C1EB0081CF7BE8
                                              SHA-512:A288DA11D3A53F20EB724C0762B4D33569C37177816BA0B5752AF98DB26F49B2F0F01EF7B5C13713845F1F897A7391812B082D8DD3A30D9E373E6029D1CE4B5F
                                              Malicious:false
                                              Preview:ElfChnk.........J...............J...........8.........=+.......................................................................7................j...........................=...........................................................................................................................f...............?...........................m...................M...F.......................&...........................................................C...............................................................**..............C..?T...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.3349408445986155
                                              Encrypted:false
                                              SSDEEP:384:Sh2LmImemomHmOmamCm2m2m3mnBmGqmFmJmFmKmrm2mOmsmSmmmVmghmRmBmBSXR:S/fh
                                              MD5:FAD7BB2A2B6A8C323F3952EA20528956
                                              SHA1:34E4AC310CFAD511D469F47EDC4A81A7D171911E
                                              SHA-256:7AFA780036429AFD4BB39B40602F2A2E05CD658A27AB9689886FB5647F04A23E
                                              SHA-512:57FAF63B3F33AFD47A764F85597C488DB1A9845A1C4CE7449797F9E15FECEBB03BC5872811615757C98D70410CA6389AF6DB73A4A4B2AB0375893712847A09B7
                                              Malicious:false
                                              Preview:ElfChnk.........................................P...&.e.......................................................................................Z...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................................&...............3...................................................................**................y........../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.9842713779193972
                                              Encrypted:false
                                              SSDEEP:384:ph0h21c2kS27W2VP2en32x2U2x2V2d2N26A2q242R2V2Y2w25vb2C2k2o2g2s2Il:p2C5U9
                                              MD5:A965BDA2233DA2A8FD340A35622A2F2C
                                              SHA1:EC5CE408DC8A459526BF1F72A55A3021DFCD1AC6
                                              SHA-256:1F40EF724D3AD0C6E4A24EB44E0F4A927821476567897425BD8402F57E240B84
                                              SHA-512:DEF27213078BD95F1A8BC5B0ED4B8BC2A4F376DB82A85ADF3DC796494E873901C7AE1BCA819ABEB383773476D3D9FC85C2AF8A441B989E09324400CB100153D5
                                              Malicious:false
                                              Preview:ElfChnk......................................]..._..n..........................................................................................L.......................t...=...........................................................................................................................f...............?...........................m...................M...F...............................%...............................&...................................................................................**................+.g........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):116936
                                              Entropy (8bit):4.305238089129907
                                              Encrypted:false
                                              SSDEEP:384:lVhpR+daRsRjRQRPRZX8R6R/aRXRsRqRbR2R7RoR/RlR9R/RlRlRaRMR0lbRLRz7:XLlKhLlKL
                                              MD5:7EE4AF4C98A33ACAEBFABBA419B7593B
                                              SHA1:86FE6BC4E1E802E6686D075CC038863ECF282846
                                              SHA-256:CF1749580C9BA08D0A7E3C6CC91AD9C9D1E98CE590F025F370879B8DFB39FE63
                                              SHA-512:62A3C36F67751AA5C4BDA6FBB80C2F3336BF6689FF0944401B5AB070DF60A27A41E260882441800AB77F64F64335B38DBFADD7190B02A38930EBC6C70DE7A0A7
                                              Malicious:false
                                              Preview:ElfChnk.Z...............Z.............................1}....................................................................3.].....................2.......@..............=..........................................S.......................%...........................J...........................f...Z...........?......................................?.......M...F...a...........}...................................y.......&.....................................................................................**..X...Z........;..9..........>.&.........>..'.W.U2..9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.386946820408639
                                              Encrypted:false
                                              SSDEEP:384:DhCh7whqhvh4h/hMNhihhiVqhXhPh5Vh+hth0qhPdh4zshS3hi9uhiZhhpYhAThQ:DkMfO1mGJH4
                                              MD5:3E622F165DF1E886EB21AC83D841DE75
                                              SHA1:54C49818AC2E54382B0464BAAFF783B41293241C
                                              SHA-256:7FB7021A710A938CF2161BE50EA60A44DBD54307362689E1F31B4E8C403DAE55
                                              SHA-512:214C6FDD608720E0DE650B439FABD36502419480C7916CD401D27B574EEF831C3AD0C3C32BDF3EB8DDF4DD42B3BF3CC98858C4992554E9F68300257F41B1BAF0
                                              Malicious:false
                                              Preview:ElfChnk.........6...............6...........X........~.......................................................................\.........................................l...=...........................................................................................................................f...............?...........................m...................M...F...........................................A...................&...................................................................9...............**..@...............,........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.5479414424934914
                                              Encrypted:false
                                              SSDEEP:384:Yh2VaVYVtVbVwVoVTVJVgVZVrVdVfVKVHVl/V+VnkVkgVOVEVRVtVsVCVFVhfV5H:YWIreU7U7enh
                                              MD5:6BE3FF89E0B0AC2F6A490446FFAD2125
                                              SHA1:F3FCD69C56C6B1278639029AC453A13519E75838
                                              SHA-256:DE0829B9E7CA1CC6D3714B38A37B1006FBB36856FEBE22C79EAE850540BC1418
                                              SHA-512:E4AF47980E9828024A2DAC470A582CA7EACAF6631A3220E2FEDC1903E09FBC530A7BC9EAD9FE7C249E3B5E5D5C90269FC3A862944DB798DD7D19BCA68684FCCF
                                              Malicious:false
                                              Preview:ElfChnk...............................................,.....................................................................1.9.................&...........................=...........................................................................................................................f...............?...........................m...................M...F.......................&...........................................................................................................................**..P...........F~..S...........w.&.........w..._.|.1+O.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.287346959251621
                                              Encrypted:false
                                              SSDEEP:384:EhuZBwBQ/lrBwB7/FBwBK8bV5BwB5dYBwBkBwBHBwB/BwBGBwBkBwBd5BwBJ+Bwy:E58bSRI+9
                                              MD5:7255088B156B431467259A0C49A3E473
                                              SHA1:869D7E51C6410425D33666F952B28844EF4D6899
                                              SHA-256:6D4391C38D01D963F48BF5E3F2E5950ED5B4CA016AA2ABD5657B733B5DB7C84F
                                              SHA-512:CA16514578F0F9B656E598B0B3C43FD884761821B5CD6A9C364FA6F262CD9CF7C6609908706489D2A2B3889BD112F9DBB66A14357A1144375A8B02D23FDBA0E0
                                              Malicious:false
                                              Preview:ElfChnk.............................................)./Y....................................................................q..{............................................=...........................................................................................................................f...............?...........................m...................M...F...........................W...................................&................................*..................................................**..............6\. ^........./X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.39952452267522
                                              Encrypted:false
                                              SSDEEP:384:/h1wUEFUEmUEMUEgUENUEqUEqUEWUEvUESUE4UE4UE3UEbUEpUEpUE9UEgUExUEa:/LFWRqXJQe
                                              MD5:E865587D71A9766D06794EC44AB39AF0
                                              SHA1:2D050B53BC35A25B1817C10AB0ECF37BAF7C141B
                                              SHA-256:C25BB4C3C9F7A21F234974F00446CC0BBE3DC659849A14EF3C0A2FA5F3B99D00
                                              SHA-512:8B33BB597306094BAB452E0F6C254275D75E5CFB9F37AE277F3A6A309C7A6BF32DFFAA1EC45C18A5A5F14B12B01D4E6E7DA2BD3AF61234DBA6F1763C6F0D89A5
                                              Malicious:false
                                              Preview:ElfChnk.........+...............+...........x}......C..3....................................................................&...................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...............................................................&....5.......................................................3......................**.............. 2^O.9......../X.P&......./X.P...P&.C..:.v........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.441999444093931
                                              Encrypted:false
                                              SSDEEP:384:dw0+VsWZttC95UZhVhRoSxHJUBvv3R2ipndD7odz6L7RPLfVXYgXcIycjd52T42p:d3sfo/0pQhxf27SVSVTuziNpBg12U
                                              MD5:796968E761F163D89878F1178926BF7B
                                              SHA1:3129B6AF0EFEBA2AA31CA7FD0A37DA56642C42F6
                                              SHA-256:F1A859690B482532EC068248BDC7E4000EB4E146FAFDFE22D45DEE2678DDC3FA
                                              SHA-512:56158178B7C5855F2D9F29A64C78222E8637AC0A193937FD5E8D7CC9EB640BD7C55388D484A7F565AE05800B7BDFA5A2EE5E7DE1A6B309D0F9B604E70AB1A9F8
                                              Malicious:false
                                              Preview:ElfChnk.........+...............+............Y...Z....Z........................................................................6............................................=...........................................................................................................................w...............P...........................~...................M...m...........................x...............................................................&.......................................................**..x............Bo.,.........|.=O&.......|.=O.s.Q...W.E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..j............{..P.r.o.v.i.d.e.r...G....=.......K...N.a.m.e.......O.n.e.A.p.p._.I.G.C.C._.W.i.n.S.e.r.v.i.c.e..A..M............a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):69768
                                              Entropy (8bit):4.421656343113753
                                              Encrypted:false
                                              SSDEEP:384:Z+NvFRaBootxn+NvFRaBootxv+doJ+VpvnQzodMtBFopMt1ov2olKoLZovbolToJ:qNSWNSuh1rG
                                              MD5:04C0A072414A9BCBAECDC787BF426A41
                                              SHA1:8EE79CE5BCB6C71DEF949E6C34662CB803081E7B
                                              SHA-256:804FFAFDF9E6D468B5AC15F50FDEFD01C6234D84083A77753E06E08B0CF1713A
                                              SHA-512:6FB1E2C781663F1AECA39E1ADBD5B827B21A7ECB82058205159E32707558090BE7DDFCB35C646C5FE8EAA5C4892B81D369FCCC652905B9EAF420A319074970B8
                                              Malicious:false
                                              Preview:ElfChnk.........................................................................................................................................Z...s...h...................=...................................................N...............................................w.......4.......................-...................................[...........).......M...R...:...........................&...............................>.......................3...........................................................**..............3..]............&...........0.P\...3.Du?.......A..3...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....\...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):69624
                                              Entropy (8bit):4.424086358239701
                                              Encrypted:false
                                              SSDEEP:384:AFRrffFRrflw2SwXwFwfwI6wawSwfwLwZw3wEh2HJ9bPDda/8yQ9+9s9NvisQDyC:2jnKhR8XwKiYI/fNPYqp56YMn0Ry2
                                              MD5:BCBB16FFA2F7994AD04D141B550CDC54
                                              SHA1:A565867C6ACB77A1AC8994703A70C404067C296F
                                              SHA-256:8A2480F5C38CCE7103EF23A2497C4BFD1F4E18B389C4F805E094C9F5AE575506
                                              SHA-512:F4E87CF2972DFE8FB26E89277735D819FEE5FF6158EDCDB0230F39CF6651E358F124B02FFD53A60AD0EE7308072086C2313D94A8D1B3AD6FBDAE1F1DDEC91DD9
                                              Malicious:false
                                              Preview:ElfChnk..................0.......0...................k6.....................................................................C.:.....................s...h...............N...=...................................................N...............................................w.......0.......................E...................................W...........).......M...3...:...................................................................&...........................................................................**..@....0......3..].........}.T&........}.TA.P[J.......;.......A../...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....X...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                              Process:C:\Users\user\Desktop\dropper.exe
                                              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                              Category:dropped
                                              Size (bytes):331776
                                              Entropy (8bit):6.318956070460591
                                              Encrypted:false
                                              SSDEEP:6144:lfSlVZvlVqQ+fv7M89ro8SaPKGOfOdScGYB5Zcxqo4HN3v/VUVcdt6:l6lVZvlVqFH7M89NSaPKLfFc5poA09
                                              MD5:26B19337F05A6BAEA7E49D38366A5C2F
                                              SHA1:E4A033997595013D65D7E46E0D179C80262038CA
                                              SHA-256:911CE2E95F00831E88F802FDB64DB2EDBCCC8FB0396C4264B5EC07220111B3BF
                                              SHA-512:C137125F80A20D09C7CE634E4A9891B5627D6A2A06D74FEEA2217D485C9E6D5C7BAF9C94594530F44D40290378B6B59D24692C72894690931881CBECCB53E86D
                                              Malicious:false
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........vS....................R.......R.......R.......R..........d............R.......R......Rich............................PE..d...U.wg.........." ...&.....l......L}.......................................P............`.........................................`...D.................... ...............@..........T.......................(...`...@...............P............................text.............................. ..`.rdata..`A.......B..................@..@.data...............................@....pdata....... ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................
                                              File type:PE32+ executable (console) x86-64, for MS Windows
                                              Entropy (8bit):7.1035106668168675
                                              TrID:
                                              • Win64 Executable Console (202006/5) 92.65%
                                              • Win64 Executable (generic) (12005/4) 5.51%
                                              • Generic Win/DOS Executable (2004/3) 0.92%
                                              • DOS Executable Generic (2002/1) 0.92%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:dropper.exe
                                              File size:3'247'104 bytes
                                              MD5:762bf8c0fa7791e6b1d4fc4fd9750514
                                              SHA1:b21efafaff42b9cb5d2a375a47236371610cd0d4
                                              SHA256:8e01f0fce89a1f8ff1ce56ce426f289bccdb375fcaf68490237f59655dc50061
                                              SHA512:ff24ab783c8d33edb25e5886f4a0dc54c7458f589104b368ed9654460c942550952a80551465f5fc864a6536769c8b50682dcad148978ea8efe1abedaf3cc248
                                              SSDEEP:49152:9shTzuPwbSgzcyJcqoWJuZYzey+H1P0JvPm0gWWbCWc+oqMKpm2+:9pWHzdM6vBDWbAP
                                              TLSH:88E5AD16B64658ADD06AC478834A4A73AA3674CE0B3579FF05D482393FA9FE51F3C708
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l.F/(.(|(.(|(.(|!..|$.(|..)}*.(|..-}?.(|..,}!.(|..+}+.(|Z.)}-.(|(.)|..(|(.(|..(|E..|).(|E.*}).(|Rich(.(|................PE..d..
                                              Icon Hash:f0ecd6ce8d8e878b
                                              Entrypoint:0x140156c40
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x140000000
                                              Subsystem:windows cui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x6777A6B1 [Fri Jan 3 08:58:25 2025 UTC]
                                              TLS Callbacks:0x40140dc0, 0x1
                                              CLR (.Net) Version:
                                              OS Version Major:6
                                              OS Version Minor:0
                                              File Version Major:6
                                              File Version Minor:0
                                              Subsystem Version Major:6
                                              Subsystem Version Minor:0
                                              Import Hash:0f026d0bef75c6cbd3ab3d29123202f8
                                              Instruction
                                              dec eax
                                              sub esp, 28h
                                              call 00007F25B0C205C8h
                                              dec eax
                                              add esp, 28h
                                              jmp 00007F25B0C20157h
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              nop word ptr [eax+eax+00000000h]
                                              dec eax
                                              sub esp, 10h
                                              dec esp
                                              mov dword ptr [esp], edx
                                              dec esp
                                              mov dword ptr [esp+08h], ebx
                                              dec ebp
                                              xor ebx, ebx
                                              dec esp
                                              lea edx, dword ptr [esp+18h]
                                              dec esp
                                              sub edx, eax
                                              dec ebp
                                              cmovb edx, ebx
                                              dec esp
                                              mov ebx, dword ptr [00000010h]
                                              dec ebp
                                              cmp edx, ebx
                                              jnc 00007F25B0C202F8h
                                              inc cx
                                              and edx, 8D4DF000h
                                              wait
                                              add al, dh
                                              Programming Language:
                                              • [IMP] VS2008 SP1 build 30729
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x30b7240x140.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3190000xc00.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x30e0000xa5d8.pdata
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x31a0000x2100.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x2ea8200x54.rdata
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x2ea8800x28.rdata
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2ea6e00x140.rdata
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x15f0000x400.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x15d91f0x15da00dc091c1e8b00bebef983255a277cf6d7False0.4546109671076153data6.336391184236192IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x15f0000x1ad6560x1ad800e80307459e46f3d7b763b8e041768024False0.772115332144936data7.37975922298643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x30d0000x4a80x200e52013ecbde41d2830e5277e4947239fFalse0.34765625data2.785226409213346IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .pdata0x30e0000xa5d80xa6008dbea7c30af0583454c08d7ef307ee4cFalse0.5136248117469879data6.142562583718053IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .rsrc0x3190000xc000xc00d47c4fd012b19c01e5a32ab71ff56ab2False0.7421875data6.00972549379838IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x31a0000x21000x2200ebfd53c3bd59f7878f5067c8e74f857bFalse0.4831112132352941data5.401399256200194IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0x3190c00xb28Device independent bitmap graphic, 21 x 64 x 32, image size 2688, resolution 3779 x 3779 px/mEnglishUnited States0.7629551820728291
                                              RT_GROUP_ICON0x319be80x14dataEnglishUnited States1.1
                                              DLLImport
                                              api-ms-win-core-synch-l1-2-0.dllWaitOnAddress, WakeByAddressAll, WakeByAddressSingle
                                              bcryptprimitives.dllProcessPrng
                                              bcrypt.dllBCryptGenRandom
                                              ADVAPI32.dllLsaAddAccountRights, SystemFunction036, AdjustTokenPrivileges, LookupPrivilegeValueW, LsaClose, GetTokenInformation, OpenProcessToken, LsaOpenPolicy
                                              kernel32.dllGetEnvironmentVariableW, GetStdHandle, GetCurrentProcessId, GetCurrentDirectoryW, QueryPerformanceFrequency, SetLastError, HeapReAlloc, lstrlenW, ReleaseMutex, RtlVirtualUnwind, CreateFileW, RtlLookupFunctionEntry, GetConsoleMode, RtlCaptureContext, GetSystemInfo, GetFullPathNameW, MultiByteToWideChar, WriteConsoleW, WideCharToMultiByte, CreateThread, GetProcAddress, QueryPerformanceCounter, WaitForSingleObject, WaitForSingleObjectEx, LoadLibraryA, CreateMutexA, SwitchToThread, GetCurrentThread, SetThreadStackGuarantee, AddVectoredExceptionHandler, GetCurrentThreadId, GetSystemTimeAsFileTime, FormatMessageW, LoadLibraryExA, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, HeapAlloc, HeapFree, GetProcessHeap, GetModuleFileNameW, Module32NextW, Module32FirstW, CreateToolhelp32Snapshot, GetProcessId, CloseHandle, GetLastError, GetCurrentProcess, GetModuleHandleA, VirtualQuery, GetModuleHandleW, OutputDebugStringW, SetFileInformationByHandle, IsProcessorFeaturePresent
                                              oleaut32.dllSysFreeString, GetErrorInfo, SysStringLen
                                              api-ms-win-core-winrt-error-l1-1-0.dllRoOriginateErrorW
                                              ntdll.dllNtWriteFile, RtlNtStatusToDosError
                                              VCRUNTIME140.dllmemcmp, memcpy, __C_specific_handler, __CxxFrameHandler3, __current_exception, memset, __current_exception_context, memmove, _CxxThrowException
                                              api-ms-win-crt-string-l1-1-0.dllwcslen, strlen
                                              api-ms-win-crt-math-l1-1-0.dllroundf, truncf, exp2f, ceil, __setusermatherr
                                              api-ms-win-crt-runtime-l1-1-0.dll_initterm_e, exit, _exit, __p___argc, __p___argv, _cexit, _c_exit, _register_thread_local_exe_atexit_callback, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, terminate, _set_app_type, _seh_filter_exe, _configure_narrow_argv
                                              api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
                                              api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                              api-ms-win-crt-heap-l1-1-0.dllfree, _set_new_mode
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              No network behavior found

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:04:12:36
                                              Start date:03/01/2025
                                              Path:C:\Users\user\Desktop\dropper.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\Desktop\dropper.exe"
                                              Imagebase:0x7ff77f270000
                                              File size:3'247'104 bytes
                                              MD5 hash:762BF8C0FA7791E6B1D4FC4FD9750514
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:1
                                              Start time:04:12:36
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff79f0e0000
                                              File size:875'008 bytes
                                              MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:2
                                              Start time:04:12:36
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\cmd.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Windows\System32\cmd.exe"
                                              Imagebase:0x7ff64bab0000
                                              File size:289'792 bytes
                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              Target ID:4
                                              Start time:04:12:36
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff79f0e0000
                                              File size:875'008 bytes
                                              MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              Target ID:5
                                              Start time:04:12:41
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\winlogon.exe
                                              Wow64 process (32bit):false
                                              Commandline:winlogon.exe
                                              Imagebase:0x7ff6b20e0000
                                              File size:944'128 bytes
                                              MD5 hash:A987B43E6A8E8F894B98A3DF022DB518
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:6
                                              Start time:04:12:41
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\lsass.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\lsass.exe
                                              Imagebase:0x7ff7f6350000
                                              File size:59'448 bytes
                                              MD5 hash:15A556DEF233F112D127025AB51AC2D3
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:7
                                              Start time:04:12:41
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:8
                                              Start time:04:12:42
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\fontdrvhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:"fontdrvhost.exe"
                                              Imagebase:0x7ff6934c0000
                                              File size:830'520 bytes
                                              MD5 hash:AB7AB4CF816D091EEE234C1D9BC4FD13
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:9
                                              Start time:04:12:42
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\fontdrvhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:"fontdrvhost.exe"
                                              Imagebase:0x7ff6934c0000
                                              File size:830'520 bytes
                                              MD5 hash:AB7AB4CF816D091EEE234C1D9BC4FD13
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:10
                                              Start time:04:12:42
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k RPCSS -p
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:11
                                              Start time:04:12:43
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:12
                                              Start time:04:12:43
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\dwm.exe
                                              Wow64 process (32bit):false
                                              Commandline:"dwm.exe"
                                              Imagebase:0x7ff731b80000
                                              File size:94'720 bytes
                                              MD5 hash:5C27608411832C5B39BA04E33D53536C
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:13
                                              Start time:04:12:46
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:14
                                              Start time:04:12:46
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:15
                                              Start time:04:12:47
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:16
                                              Start time:04:12:47
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_3ea756ac68d34d21\IntelCpHDCPSvc.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_3ea756ac68d34d21\IntelCpHDCPSvc.exe
                                              Imagebase:0x7ff616210000
                                              File size:365'360 bytes
                                              MD5 hash:B6BAD2BD8596D9101874E9042B8E2D63
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:17
                                              Start time:04:12:47
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:18
                                              Start time:04:12:47
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:19
                                              Start time:04:12:48
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:20
                                              Start time:04:12:48
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:23
                                              Start time:04:12:49
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:24
                                              Start time:04:12:50
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:25
                                              Start time:04:12:50
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_3ea756ac68d34d21\IntelCpHeciSvc.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_3ea756ac68d34d21\IntelCpHeciSvc.exe
                                              Imagebase:0x7ff6039c0000
                                              File size:521'536 bytes
                                              MD5 hash:3B0DF35583675DE5A08E8D4C1271CEC0
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:26
                                              Start time:04:12:50
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_2e49f48165b8de10\igfxCUIService.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_2e49f48165b8de10\igfxCUIService.exe
                                              Imagebase:0x7ff60d660000
                                              File size:399'664 bytes
                                              MD5 hash:91038D45A86B5465E8B7E5CD63187150
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:27
                                              Start time:04:12:51
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:28
                                              Start time:04:12:51
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:29
                                              Start time:04:12:51
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:30
                                              Start time:04:12:52
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:31
                                              Start time:04:12:52
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:32
                                              Start time:04:12:52
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:33
                                              Start time:04:12:52
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:34
                                              Start time:04:12:52
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:35
                                              Start time:04:12:53
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:36
                                              Start time:04:12:53
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:37
                                              Start time:04:12:53
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:38
                                              Start time:04:12:54
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:39
                                              Start time:04:12:54
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:40
                                              Start time:04:12:55
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:41
                                              Start time:04:12:55
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:42
                                              Start time:04:12:55
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:43
                                              Start time:04:12:56
                                              Start date:03/01/2025
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                              Imagebase:0x7ff659430000
                                              File size:57'360 bytes
                                              MD5 hash:F586835082F632DC8D9404D83BC16316
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:18.4%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:50.5%
                                                Total number of Nodes:1189
                                                Total number of Limit Nodes:11
                                                execution_graph 6739 7ff77f3c6c40 6742 7ff77f3c6f2c 6739->6742 6743 7ff77f3c6f4f GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6742->6743 6744 7ff77f3c6c49 6742->6744 6743->6744 6694 7ff77f27c6b0 6695 7ff77f27c6ce 6694->6695 6696 7ff77f27c6d3 6695->6696 6697 7ff77f3ce093 15 API calls 6695->6697 6698 7ff77f27c725 6697->6698 5638 7ff77f271350 5639 7ff77f2713b7 5638->5639 5640 7ff77f271f68 5638->5640 5641 7ff77f271f54 5639->5641 5647 7ff77f2713cf 5639->5647 5718 7ff77f3cd390 5640->5718 5702 7ff77f3cd780 5641->5702 5644 7ff77f271fbe 5646 7ff77f3ce670 15 API calls 5644->5646 5645 7ff77f2713f3 5650 7ff77f272053 5645->5650 5663 7ff77f27141f 5645->5663 5648 7ff77f271fed 5646->5648 5647->5644 5647->5645 5726 7ff77f282ff0 5648->5726 5652 7ff77f3ce0b0 15 API calls 5650->5652 5651 7ff77f271f39 5652->5648 5654 7ff77f27209e 5656 7ff77f27200b 5658 7ff77f3ce670 15 API calls 5656->5658 5657 7ff77f271ee9 5657->5651 5707 7ff77f3cd8b0 5657->5707 5658->5648 5661 7ff77f271dda memset 5662 7ff77f271eba OutputDebugStringW 5661->5662 5661->5663 5662->5663 5663->5656 5663->5657 5663->5662 5664 7ff77f280350 5663->5664 5691 7ff77f282840 5663->5691 5695 7ff77f3b8b10 5663->5695 5667 7ff77f2803d3 5664->5667 5668 7ff77f280394 5664->5668 5665 7ff77f2803bf 5739 7ff77f39f410 memset 5665->5739 5670 7ff77f3ce093 15 API calls 5667->5670 5689 7ff77f2803f2 5667->5689 5668->5665 5669 7ff77f28044d 5668->5669 5672 7ff77f28046e memcpy memcpy 5669->5672 5673 7ff77f280905 5670->5673 5671 7ff77f2803ce 5674 7ff77f28049b memcpy 5671->5674 5672->5674 5676 7ff77f3ce093 15 API calls 5673->5676 5674->5673 5677 7ff77f2804cc 5674->5677 5675 7ff77f280922 5678 7ff77f3ce750 15 API calls 5675->5678 5680 7ff77f280920 5676->5680 5677->5673 5677->5675 5679 7ff77f2804fb 5677->5679 5678->5680 5679->5675 5681 7ff77f28050b memcpy memcpy 5679->5681 5680->5663 5682 7ff77f280558 5681->5682 5683 7ff77f280562 memcpy memset 5681->5683 5684 7ff77f3b8b10 15 API calls 5682->5684 5682->5689 5683->5682 5685 7ff77f280709 memset 5684->5685 5686 7ff77f2807fa OutputDebugStringW 5685->5686 5687 7ff77f28074b 5685->5687 5688 7ff77f280816 5686->5688 5687->5686 5688->5689 5690 7ff77f3ce670 15 API calls 5688->5690 5689->5663 5690->5680 5692 7ff77f282af1 5691->5692 5694 7ff77f282878 5691->5694 5745 7ff77f3c75d0 5692->5745 5694->5663 5696 7ff77f3b8b3a 5695->5696 5697 7ff77f3b8c29 5696->5697 5698 7ff77f3ce670 15 API calls 5696->5698 5699 7ff77f3b8bf9 5696->5699 5697->5661 5698->5699 5700 7ff77f3ce093 15 API calls 5699->5700 5701 7ff77f3b8c85 5700->5701 5701->5661 5706 7ff77f3cd7a9 5702->5706 5703 7ff77f3cd89d 5703->5657 5704 7ff77f3cd836 WaitOnAddress 5705 7ff77f3cd853 GetLastError 5704->5705 5704->5706 5705->5706 5706->5703 5706->5704 5708 7ff77f3cd8c7 5707->5708 5709 7ff77f3cd959 5707->5709 5710 7ff77f3cd8ef 5708->5710 5714 7ff77f3cd8da WakeByAddressSingle 5708->5714 5711 7ff77f3ce340 15 API calls 5709->5711 5713 7ff77f3cd8f9 5710->5713 5715 7ff77f3cd920 WakeByAddressSingle 5710->5715 5717 7ff77f3cd90e 5710->5717 5712 7ff77f3cd971 5711->5712 5716 7ff77f3cd944 WakeByAddressAll 5713->5716 5713->5717 5715->5716 5715->5717 5716->5717 5717->5651 5719 7ff77f3cd484 5718->5719 5722 7ff77f3cd3bd 5718->5722 5720 7ff77f3cd43e 5721 7ff77f3cd472 5720->5721 5725 7ff77f3cd46c WakeByAddressAll 5720->5725 5721->5647 5722->5720 5722->5721 5723 7ff77f3cd415 WaitOnAddress 5722->5723 5723->5722 5724 7ff77f3cd432 GetLastError 5723->5724 5724->5722 5725->5721 5728 7ff77f283001 5726->5728 5727 7ff77f28302a 5727->5654 5728->5727 5729 7ff77f3cd8c7 5728->5729 5730 7ff77f3cd959 5728->5730 5731 7ff77f3cd8ef 5729->5731 5735 7ff77f3cd8da WakeByAddressSingle 5729->5735 5732 7ff77f3ce340 15 API calls 5730->5732 5734 7ff77f3cd8f9 5731->5734 5736 7ff77f3cd90e 5731->5736 5737 7ff77f3cd920 WakeByAddressSingle 5731->5737 5733 7ff77f3cd971 5732->5733 5734->5736 5738 7ff77f3cd944 WakeByAddressAll 5734->5738 5736->5654 5737->5736 5737->5738 5738->5736 5742 7ff77f39f477 5739->5742 5740 7ff77f3a19b0 15 API calls 5740->5742 5741 7ff77f39f59f memcpy 5741->5671 5742->5740 5742->5741 5744 7ff77f3a0f10 15 API calls 5742->5744 5744->5742 5746 7ff77f3c76f6 5745->5746 5748 7ff77f3c75fc 5745->5748 5754 7ff77f3b8770 5746->5754 5748->5746 5749 7ff77f3c7702 5748->5749 5753 7ff77f3c764b 5748->5753 5750 7ff77f3c79b1 5749->5750 5751 7ff77f3c772c memset 5749->5751 5759 7ff77f3b87c0 5750->5759 5751->5753 5753->5694 5753->5753 5755 7ff77f3b8786 5754->5755 5756 7ff77f3b877e 5754->5756 5757 7ff77f3ce2a0 15 API calls 5755->5757 5756->5753 5758 7ff77f3b87b8 5757->5758 5760 7ff77f3b87da 5759->5760 5761 7ff77f3b87ce 5759->5761 5762 7ff77f3ce0b0 15 API calls 5760->5762 5761->5753 5763 7ff77f3b87e5 5762->5763 5764 7ff77f277cb0 memset OutputDebugStringW 5892 7ff77f281d80 5764->5892 5766 7ff77f277d68 5907 7ff77f3b8cd0 5766->5907 5768 7ff77f277da5 5769 7ff77f3b8b10 15 API calls 5768->5769 5770 7ff77f277e16 memset 5769->5770 5771 7ff77f277efa OutputDebugStringW 5770->5771 5774 7ff77f277e55 5770->5774 5772 7ff77f277f10 5771->5772 5940 7ff77f2729a0 5772->5940 5774->5771 5775 7ff77f277f42 5952 7ff77f272db0 5775->5952 5777 7ff77f277f68 5778 7ff77f277f83 5777->5778 6299 7ff77f3a3000 GetLastError 5777->6299 5779 7ff77f2729a0 28 API calls 5778->5779 5851 7ff77f2783fd 5778->5851 5781 7ff77f277fb1 5779->5781 5782 7ff77f272db0 106 API calls 5781->5782 5783 7ff77f277fd7 5782->5783 5784 7ff77f277ff2 5783->5784 6300 7ff77f3a3000 GetLastError 5783->6300 5786 7ff77f2729a0 28 API calls 5784->5786 5784->5851 5787 7ff77f278020 5786->5787 5788 7ff77f272db0 106 API calls 5787->5788 5789 7ff77f278046 5788->5789 5790 7ff77f27806a 5789->5790 6301 7ff77f3a3000 GetLastError 5789->6301 5791 7ff77f2729a0 28 API calls 5790->5791 5790->5851 5793 7ff77f27809c 5791->5793 6050 7ff77f2752d0 5793->6050 5795 7ff77f2780b1 5798 7ff77f2780c9 5795->5798 6302 7ff77f3a3000 GetLastError 5795->6302 5797 7ff77f2780e3 memset OutputDebugStringW CreateToolhelp32Snapshot 5799 7ff77f278389 memset OutputDebugStringW 5797->5799 5800 7ff77f27814f memset OutputDebugStringW 5797->5800 5798->5797 5798->5851 6303 7ff77f3a3000 GetLastError 5799->6303 6117 7ff77f3a2eb0 memset 5800->6117 5803 7ff77f2781af Module32FirstW 5804 7ff77f2781c8 5803->5804 5805 7ff77f278402 memset OutputDebugStringW 5803->5805 5806 7ff77f3b8b10 15 API calls 5804->5806 5807 7ff77f27849e 5805->5807 5808 7ff77f27827b 5806->5808 6304 7ff77f3a3000 GetLastError 5807->6304 5810 7ff77f3b8cd0 33 API calls 5808->5810 5811 7ff77f2782a6 5810->5811 5812 7ff77f3b8b10 15 API calls 5811->5812 5813 7ff77f278322 memset 5812->5813 5814 7ff77f27853a OutputDebugStringW 5813->5814 5817 7ff77f278364 5813->5817 5815 7ff77f278556 5814->5815 6118 7ff77f27a5a0 5815->6118 5817->5814 5818 7ff77f278593 5819 7ff77f27868d 5818->5819 5820 7ff77f2785a7 5818->5820 5822 7ff77f3b8b10 15 API calls 5819->5822 5821 7ff77f3b8b10 15 API calls 5820->5821 5823 7ff77f278626 memset 5821->5823 5824 7ff77f278728 memset 5822->5824 5825 7ff77f27882a OutputDebugStringW 5823->5825 5830 7ff77f278668 5823->5830 5826 7ff77f27890a OutputDebugStringW 5824->5826 5829 7ff77f27876a 5824->5829 5825->5851 5827 7ff77f278926 5826->5827 6250 7ff77f2769b0 5827->6250 5829->5826 5830->5825 5831 7ff77f278949 5832 7ff77f3b8b10 15 API calls 5831->5832 5833 7ff77f2789fc 5832->5833 5834 7ff77f3b8cd0 33 API calls 5833->5834 5835 7ff77f278a20 5834->5835 5836 7ff77f3b8b10 15 API calls 5835->5836 5837 7ff77f278a9c memset 5836->5837 5838 7ff77f278b8a OutputDebugStringW 5837->5838 5842 7ff77f278ade 5837->5842 5839 7ff77f278ba6 5838->5839 5840 7ff77f27a5a0 138 API calls 5839->5840 5841 7ff77f278be3 5840->5841 5843 7ff77f278cdd 5841->5843 5844 7ff77f278bf7 5841->5844 5842->5838 5846 7ff77f3b8b10 15 API calls 5843->5846 5845 7ff77f3b8b10 15 API calls 5844->5845 5847 7ff77f278c76 memset 5845->5847 5848 7ff77f278d78 memset 5846->5848 5849 7ff77f278e7a OutputDebugStringW 5847->5849 5855 7ff77f278cb8 5847->5855 5850 7ff77f278fea OutputDebugStringW 5848->5850 5856 7ff77f278dc1 5848->5856 5849->5851 5852 7ff77f279010 5850->5852 5853 7ff77f2769b0 28 API calls 5852->5853 5854 7ff77f279030 memset OutputDebugStringW 5853->5854 5889 7ff77f2790e0 5854->5889 5855->5849 5856->5850 5859 7ff77f3b8b10 15 API calls 5860 7ff77f279289 memset 5859->5860 5861 7ff77f27937a OutputDebugStringW 5860->5861 5862 7ff77f2792c7 5860->5862 5861->5862 5862->5861 5864 7ff77f3b8cd0 33 API calls 5862->5864 5865 7ff77f3b8b10 15 API calls 5862->5865 6288 7ff77f27a440 5862->6288 5864->5862 5866 7ff77f279460 memset 5865->5866 5867 7ff77f27954a OutputDebugStringW 5866->5867 5872 7ff77f27949e 5866->5872 5867->5872 5868 7ff77f27958a memcmp 5868->5872 5869 7ff77f2795ad memcmp 5871 7ff77f279d00 Module32NextW 5869->5871 5869->5872 5870 7ff77f3b8b10 15 API calls 5874 7ff77f27971d memset 5870->5874 5875 7ff77f279d5d memset OutputDebugStringW 5871->5875 5871->5889 5872->5867 5872->5868 5872->5869 5872->5870 5873 7ff77f2795d0 memcmp 5872->5873 5876 7ff77f3b8b10 15 API calls 5872->5876 5873->5871 5873->5872 5877 7ff77f279cca OutputDebugStringW 5874->5877 5874->5889 5878 7ff77f279dcb 5875->5878 5879 7ff77f279652 memset 5876->5879 5877->5871 5877->5889 5880 7ff77f279dfb NtClose memset OutputDebugStringW 5878->5880 5881 7ff77f27980a OutputDebugStringW 5879->5881 5883 7ff77f279690 5879->5883 5880->5851 5881->5883 5882 7ff77f27a5a0 138 API calls 5882->5883 5883->5881 5883->5882 5884 7ff77f3b8b10 15 API calls 5883->5884 5885 7ff77f3b8b10 15 API calls 5883->5885 5886 7ff77f279911 memset 5884->5886 5887 7ff77f279a24 memset 5885->5887 5888 7ff77f279b1a OutputDebugStringW 5886->5888 5886->5889 5887->5889 5890 7ff77f279bfa OutputDebugStringW 5887->5890 5888->5889 5889->5859 5889->5871 5889->5877 5889->5888 5889->5890 5891 7ff77f2769b0 28 API calls 5889->5891 6282 7ff77f2830e0 5889->6282 6305 7ff77f3c7f00 5889->6305 5890->5889 5891->5889 5893 7ff77f281dae 5892->5893 5894 7ff77f281db7 GetModuleFileNameW 5893->5894 5895 7ff77f281ea4 5893->5895 5897 7ff77f281dd3 5894->5897 5904 7ff77f281e43 5894->5904 5896 7ff77f3ce093 15 API calls 5895->5896 5898 7ff77f281eba 5896->5898 5899 7ff77f281e8e 5897->5899 5900 7ff77f281de4 5897->5900 5898->5766 5901 7ff77f3ce750 15 API calls 5899->5901 5902 7ff77f3c7f00 18 API calls 5900->5902 5905 7ff77f281ea2 5901->5905 5903 7ff77f281e24 5902->5903 5906 7ff77f2830e0 19 API calls 5903->5906 5904->5766 5905->5895 5906->5904 5908 7ff77f3b9839 5907->5908 5910 7ff77f3b8cff 5907->5910 5909 7ff77f3ce093 15 API calls 5908->5909 5911 7ff77f3b92ad 5909->5911 5910->5908 5924 7ff77f3b8d2e 5910->5924 5913 7ff77f3ce810 15 API calls 5911->5913 5912 7ff77f3b97e4 5912->5768 5914 7ff77f3b9837 5913->5914 5914->5768 5916 7ff77f3b8f3c 6351 7ff77f3ce810 5916->6351 5918 7ff77f3b8890 15 API calls 5918->5924 5919 7ff77f3b9794 5923 7ff77f3cdff0 15 API calls 5919->5923 5921 7ff77f3b9751 5927 7ff77f3cdff0 15 API calls 5921->5927 5922 7ff77f3b9328 memcpy 5922->5924 5926 7ff77f3b97b4 5923->5926 5924->5911 5924->5912 5924->5916 5924->5918 5924->5919 5924->5921 5924->5922 5925 7ff77f3b9571 memcpy 5924->5925 5924->5926 5929 7ff77f3c6400 15 API calls 5924->5929 5930 7ff77f3b9760 5924->5930 5931 7ff77f3b9420 memcpy 5924->5931 5932 7ff77f3b8e6f memcpy 5924->5932 5933 7ff77f3b97cc 5924->5933 5934 7ff77f3c6580 15 API calls 5924->5934 5937 7ff77f3b977c 5924->5937 5938 7ff77f3b94c0 memcpy 5924->5938 6328 7ff77f3c6880 5924->6328 6344 7ff77f3cdff0 5924->6344 5925->5924 5928 7ff77f3cdff0 15 API calls 5926->5928 5927->5930 5928->5933 5929->5924 5935 7ff77f3cdff0 15 API calls 5930->5935 5931->5924 5932->5924 5936 7ff77f3cdff0 15 API calls 5933->5936 5934->5924 5935->5937 5936->5912 5939 7ff77f3cdff0 15 API calls 5937->5939 5938->5924 5939->5919 5941 7ff77f280350 26 API calls 5940->5941 5942 7ff77f2729f5 5941->5942 5943 7ff77f272ce8 5942->5943 5944 7ff77f2729ff 5942->5944 5945 7ff77f3ce670 15 API calls 5943->5945 5946 7ff77f3b8b10 15 API calls 5944->5946 5947 7ff77f272d29 5945->5947 5948 7ff77f272af4 memset 5946->5948 5947->5775 5949 7ff77f272bda OutputDebugStringW 5948->5949 5950 7ff77f272b33 5948->5950 5951 7ff77f272bf0 5949->5951 5950->5949 5951->5775 5953 7ff77f3b8b10 15 API calls 5952->5953 5954 7ff77f272ef3 memset 5953->5954 5955 7ff77f272fda OutputDebugStringW 5954->5955 5958 7ff77f272f2e 5954->5958 5956 7ff77f272ffd 5955->5956 5957 7ff77f27a440 16 API calls 5956->5957 5959 7ff77f273028 5957->5959 5958->5955 5960 7ff77f3b8b10 15 API calls 5959->5960 5961 7ff77f273086 memset 5960->5961 5962 7ff77f27317a OutputDebugStringW 5961->5962 5965 7ff77f2730c8 5961->5965 5963 7ff77f273196 5962->5963 6388 7ff77f2767d0 5963->6388 5965->5962 5966 7ff77f2731ba 5967 7ff77f3b8b10 15 API calls 5966->5967 5968 7ff77f27323a memset 5967->5968 5969 7ff77f27332a OutputDebugStringW 5968->5969 5973 7ff77f27327c 5968->5973 5970 7ff77f273346 5969->5970 6397 7ff77f2721c0 5970->6397 5972 7ff77f273369 6041 7ff77f273378 5972->6041 6427 7ff77f280ae0 5972->6427 5973->5969 5975 7ff77f2733ce 5976 7ff77f2733db 5975->5976 5980 7ff77f2734cc 5975->5980 5977 7ff77f3b8b10 15 API calls 5976->5977 5978 7ff77f27345e memset 5977->5978 5979 7ff77f27374a OutputDebugStringW 5978->5979 5982 7ff77f2734a7 5978->5982 5979->6041 5981 7ff77f3b8b10 15 API calls 5980->5981 5983 7ff77f27364a memset 5981->5983 5982->5979 5984 7ff77f27386a OutputDebugStringW 5983->5984 5985 7ff77f27368c 5983->5985 5989 7ff77f273886 5984->5989 5985->5984 5986 7ff77f273a53 6453 7ff77f277340 5986->6453 5989->5986 5992 7ff77f273972 5989->5992 5990 7ff77f273ee8 5994 7ff77f3b8b10 15 API calls 5990->5994 5991 7ff77f273a68 5993 7ff77f3b8b10 15 API calls 5991->5993 5995 7ff77f3b8b10 15 API calls 5992->5995 5996 7ff77f273ae9 memset 5993->5996 5997 7ff77f273f4a memset 5994->5997 5998 7ff77f2739ec memset 5995->5998 5999 7ff77f27403a OutputDebugStringW 5996->5999 6005 7ff77f273b2b 5996->6005 6000 7ff77f27410a OutputDebugStringW 5997->6000 6008 7ff77f273f86 5997->6008 6002 7ff77f273c1a OutputDebugStringW 5998->6002 6012 7ff77f273a2e 5998->6012 6033 7ff77f273ea6 5999->6033 6001 7ff77f274126 6000->6001 6003 7ff77f283ce0 18 API calls 6001->6003 6004 7ff77f273c36 6002->6004 6006 7ff77f274174 GetModuleHandleW 6003->6006 6479 7ff77f283ce0 6004->6479 6005->5999 6010 7ff77f27426c 6006->6010 6011 7ff77f274191 6006->6011 6007 7ff77f3b8b10 15 API calls 6013 7ff77f2743f5 memset 6007->6013 6008->6000 6508 7ff77f3a3000 GetLastError 6010->6508 6021 7ff77f3b8b10 15 API calls 6011->6021 6011->6041 6012->6002 6016 7ff77f2744da OutputDebugStringW 6013->6016 6026 7ff77f27442e 6013->6026 6014 7ff77f273c84 GetModuleHandleW 6017 7ff77f273ca1 6014->6017 6018 7ff77f273d8f 6014->6018 6019 7ff77f2744f6 6016->6019 6022 7ff77f3b8b10 15 API calls 6017->6022 6017->6041 6507 7ff77f3a3000 GetLastError 6018->6507 6487 7ff77f274d10 6019->6487 6023 7ff77f274212 memset 6021->6023 6025 7ff77f273d2c memset 6022->6025 6027 7ff77f27433a OutputDebugStringW 6023->6027 6035 7ff77f27424b 6023->6035 6029 7ff77f273e8a OutputDebugStringW 6025->6029 6037 7ff77f273d6e 6025->6037 6026->6016 6027->6033 6028 7ff77f274521 6030 7ff77f27452b 6028->6030 6031 7ff77f274642 6028->6031 6029->6033 6034 7ff77f274541 VirtualQuery 6030->6034 6032 7ff77f3b8b10 15 API calls 6031->6032 6036 7ff77f2746ab memset 6032->6036 6033->6007 6038 7ff77f274710 6034->6038 6039 7ff77f274560 6034->6039 6035->6027 6040 7ff77f27491a OutputDebugStringW 6036->6040 6046 7ff77f2746eb 6036->6046 6037->6029 6043 7ff77f3b8b10 15 API calls 6038->6043 6039->6038 6042 7ff77f27456d 6039->6042 6040->6041 6041->5777 6044 7ff77f3b8b10 15 API calls 6042->6044 6045 7ff77f274787 memset 6043->6045 6047 7ff77f2745e4 memset 6044->6047 6045->6040 6045->6046 6046->6040 6048 7ff77f274a4a OutputDebugStringW 6047->6048 6049 7ff77f27461d 6047->6049 6048->6041 6049->6048 6051 7ff77f3b8b10 15 API calls 6050->6051 6052 7ff77f2753bb memset 6051->6052 6053 7ff77f2754aa OutputDebugStringW 6052->6053 6056 7ff77f2753f6 6052->6056 6054 7ff77f2754cd 6053->6054 6055 7ff77f2721c0 26 API calls 6054->6055 6057 7ff77f2754ed 6055->6057 6056->6053 6058 7ff77f280ae0 24 API calls 6057->6058 6064 7ff77f2754fc 6057->6064 6059 7ff77f275544 6058->6059 6060 7ff77f275551 6059->6060 6065 7ff77f27562f 6059->6065 6061 7ff77f3b8b10 15 API calls 6060->6061 6062 7ff77f2755ca memset 6061->6062 6063 7ff77f27580a OutputDebugStringW 6062->6063 6066 7ff77f27560a 6062->6066 6063->6064 6064->5795 6067 7ff77f3b8b10 15 API calls 6065->6067 6066->6063 6068 7ff77f275715 memset 6067->6068 6069 7ff77f27592a OutputDebugStringW 6068->6069 6072 7ff77f27574e 6068->6072 6070 7ff77f275946 6069->6070 6071 7ff77f3b8b10 15 API calls 6070->6071 6073 7ff77f275a03 6071->6073 6072->6069 6074 7ff77f3b8cd0 33 API calls 6073->6074 6075 7ff77f275a27 6074->6075 6076 7ff77f3b8b10 15 API calls 6075->6076 6077 7ff77f275a99 memset 6076->6077 6078 7ff77f275b8a OutputDebugStringW 6077->6078 6081 7ff77f275ad5 6077->6081 6079 7ff77f275ba6 6078->6079 6080 7ff77f2767d0 34 API calls 6079->6080 6082 7ff77f275bca 6080->6082 6081->6078 6083 7ff77f3b8b10 15 API calls 6082->6083 6084 7ff77f275c43 memset 6083->6084 6085 7ff77f275d2a OutputDebugStringW 6084->6085 6088 7ff77f275c7c 6084->6088 6086 7ff77f275d46 6085->6086 6087 7ff77f277340 25 API calls 6086->6087 6089 7ff77f275d62 6087->6089 6088->6085 6090 7ff77f275d6c 6089->6090 6091 7ff77f275e41 memset OutputDebugStringW GetModuleHandleA 6089->6091 6094 7ff77f3b8b10 15 API calls 6090->6094 6092 7ff77f275efb 6091->6092 6093 7ff77f275f3a 6091->6093 6092->6064 6098 7ff77f274d10 25 API calls 6092->6098 6523 7ff77f3a3000 GetLastError 6093->6523 6096 7ff77f275de3 memset 6094->6096 6097 7ff77f27600a OutputDebugStringW 6096->6097 6103 7ff77f275e1c 6096->6103 6097->6092 6099 7ff77f276051 6098->6099 6100 7ff77f27616b 6099->6100 6101 7ff77f27605b 6099->6101 6102 7ff77f3b8b10 15 API calls 6100->6102 6105 7ff77f276071 VirtualQuery 6101->6105 6104 7ff77f2761bf memset 6102->6104 6103->6097 6106 7ff77f27641a OutputDebugStringW 6104->6106 6114 7ff77f2761ff 6104->6114 6107 7ff77f276224 6105->6107 6108 7ff77f276090 6105->6108 6106->6064 6109 7ff77f3b8b10 15 API calls 6107->6109 6108->6107 6110 7ff77f27609d 6108->6110 6112 7ff77f276286 memset 6109->6112 6111 7ff77f3b8b10 15 API calls 6110->6111 6113 7ff77f27610d memset 6111->6113 6112->6106 6112->6114 6115 7ff77f27653a OutputDebugStringW 6113->6115 6116 7ff77f276146 6113->6116 6114->6106 6115->6064 6116->6115 6117->5803 6119 7ff77f3b8b10 15 API calls 6118->6119 6120 7ff77f27a64a memset 6119->6120 6121 7ff77f27a73a OutputDebugStringW 6120->6121 6124 7ff77f27a685 6120->6124 6122 7ff77f27a75d 6121->6122 6123 7ff77f3b8b10 15 API calls 6122->6123 6125 7ff77f27a7d4 6123->6125 6124->6121 6126 7ff77f3b8b10 15 API calls 6125->6126 6127 7ff77f27a851 memset 6126->6127 6128 7ff77f27a94a OutputDebugStringW 6127->6128 6131 7ff77f27a893 6127->6131 6129 7ff77f27a97b 6128->6129 6130 7ff77f2729a0 28 API calls 6129->6130 6132 7ff77f27a9ad 6130->6132 6131->6128 6133 7ff77f2752d0 93 API calls 6132->6133 6134 7ff77f27a9c2 6133->6134 6135 7ff77f27ab70 6134->6135 6136 7ff77f3b8b10 15 API calls 6134->6136 6137 7ff77f2729a0 28 API calls 6135->6137 6249 7ff77f27ab77 6135->6249 6139 7ff77f27aa48 memset 6136->6139 6138 7ff77f27aba8 6137->6138 6141 7ff77f2752d0 93 API calls 6138->6141 6140 7ff77f27ab3a OutputDebugStringW 6139->6140 6147 7ff77f27aa83 6139->6147 6143 7ff77f27ab5d 6140->6143 6142 7ff77f27abbd 6141->6142 6144 7ff77f27ad70 6142->6144 6146 7ff77f3b8b10 15 API calls 6142->6146 6535 7ff77f3a3000 GetLastError 6143->6535 6148 7ff77f2729a0 28 API calls 6144->6148 6144->6249 6149 7ff77f27ac4c memset 6146->6149 6147->6140 6150 7ff77f27adb3 6148->6150 6151 7ff77f27ad3a OutputDebugStringW 6149->6151 6158 7ff77f27ac87 6149->6158 6152 7ff77f2752d0 93 API calls 6150->6152 6154 7ff77f27ad5d 6151->6154 6153 7ff77f27adc8 6152->6153 6156 7ff77f27af70 6153->6156 6157 7ff77f3b8b10 15 API calls 6153->6157 6536 7ff77f3a3000 GetLastError 6154->6536 6159 7ff77f2729a0 28 API calls 6156->6159 6156->6249 6160 7ff77f27ae4e memset 6157->6160 6158->6151 6161 7ff77f27afa8 6159->6161 6162 7ff77f27af3a OutputDebugStringW 6160->6162 6169 7ff77f27ae89 6160->6169 6163 7ff77f2752d0 93 API calls 6161->6163 6164 7ff77f27af5d 6162->6164 6165 7ff77f27afbd 6163->6165 6537 7ff77f3a3000 GetLastError 6164->6537 6167 7ff77f27b160 6165->6167 6168 7ff77f3b8b10 15 API calls 6165->6168 6167->6249 6524 7ff77f283930 6167->6524 6171 7ff77f27b043 memset 6168->6171 6169->6162 6173 7ff77f27b12a OutputDebugStringW 6171->6173 6177 7ff77f27b07e 6171->6177 6172 7ff77f27b1f1 6174 7ff77f3a65f0 15 API calls 6172->6174 6178 7ff77f27b214 6172->6178 6175 7ff77f27b14d 6173->6175 6174->6178 6538 7ff77f3a3000 GetLastError 6175->6538 6177->6173 6179 7ff77f3b8b10 15 API calls 6178->6179 6180 7ff77f27b30d memset 6179->6180 6181 7ff77f27b3fa OutputDebugStringW 6180->6181 6187 7ff77f27b34f 6180->6187 6182 7ff77f27b42a NtOpenFile 6181->6182 6183 7ff77f27b419 6181->6183 6184 7ff77f27b5c7 6182->6184 6185 7ff77f27b462 6182->6185 6183->6182 6186 7ff77f3b8b10 15 API calls 6184->6186 6188 7ff77f3b8b10 15 API calls 6185->6188 6190 7ff77f27b633 memset 6186->6190 6187->6181 6189 7ff77f27b560 memset 6188->6189 6191 7ff77f27b72a OutputDebugStringW 6189->6191 6199 7ff77f27b5a2 6189->6199 6192 7ff77f27b8ea OutputDebugStringW 6190->6192 6196 7ff77f27b675 6190->6196 6194 7ff77f27b746 6191->6194 6193 7ff77f27b909 6192->6193 6198 7ff77f27b91f NtCreateSection 6193->6198 6195 7ff77f3b8b10 15 API calls 6194->6195 6197 7ff77f27b7c2 6195->6197 6196->6192 6197->6249 6539 7ff77f3a3600 6197->6539 6200 7ff77f27bacd 6198->6200 6201 7ff77f27b96b 6198->6201 6199->6191 6204 7ff77f3b8b10 15 API calls 6200->6204 6203 7ff77f3b8b10 15 API calls 6201->6203 6207 7ff77f27ba66 memset 6203->6207 6205 7ff77f27bb4b memset 6204->6205 6208 7ff77f27bd5a OutputDebugStringW 6205->6208 6217 7ff77f27bb8a 6205->6217 6210 7ff77f27bc4a OutputDebugStringW 6207->6210 6218 7ff77f27baa8 6207->6218 6211 7ff77f27bd8d GetCurrentProcess NtMapViewOfSection 6208->6211 6212 7ff77f27bd7c 6208->6212 6213 7ff77f27bc66 6210->6213 6214 7ff77f27bf92 6211->6214 6215 7ff77f27be02 6211->6215 6212->6211 6224 7ff77f3a3600 17 API calls 6213->6224 6216 7ff77f3b8b10 15 API calls 6214->6216 6219 7ff77f27be0d 6215->6219 6220 7ff77f27c183 6215->6220 6221 7ff77f27bffe 6216->6221 6217->6208 6218->6210 6223 7ff77f3b8b10 15 API calls 6219->6223 6222 7ff77f3b8b10 15 API calls 6220->6222 6225 7ff77f281f30 2 API calls 6221->6225 6226 7ff77f27c27b 6222->6226 6227 7ff77f27be6f 6223->6227 6228 7ff77f27bc9b 6224->6228 6236 7ff77f27c01d 6225->6236 6231 7ff77f281f30 2 API calls 6226->6231 6532 7ff77f281f30 memset 6227->6532 6544 7ff77f3a32c0 GetErrorInfo 6228->6544 6237 7ff77f27c29a 6231->6237 6232 7ff77f27be8e 6233 7ff77f2767d0 34 API calls 6232->6233 6234 7ff77f27bebf 6233->6234 6235 7ff77f3b8b10 15 API calls 6234->6235 6238 7ff77f27bf3c 6235->6238 6239 7ff77f2767d0 34 API calls 6236->6239 6545 7ff77f282e00 6237->6545 6241 7ff77f281f30 2 API calls 6238->6241 6242 7ff77f27c062 6239->6242 6244 7ff77f27bf5b 6241->6244 6245 7ff77f3b8b10 15 API calls 6242->6245 6243 7ff77f27c2e4 6243->6243 6246 7ff77f27bf79 NtClose 6244->6246 6247 7ff77f27c0fa 6245->6247 6246->6249 6248 7ff77f281f30 2 API calls 6247->6248 6248->6249 6249->5818 6251 7ff77f2769e6 6250->6251 6252 7ff77f276c01 6250->6252 6256 7ff77f276a18 6251->6256 6258 7ff77f3cd2c0 2 API calls 6251->6258 6260 7ff77f2770c2 6251->6260 6253 7ff77f3b8b10 15 API calls 6252->6253 6254 7ff77f276c5b memset 6253->6254 6257 7ff77f276dfa OutputDebugStringW 6254->6257 6261 7ff77f276c93 6254->6261 6255 7ff77f3cd390 3 API calls 6255->6256 6259 7ff77f277123 6256->6259 6269 7ff77f276a44 6256->6269 6279 7ff77f276e1b 6257->6279 6258->6260 6262 7ff77f3b8b10 15 API calls 6259->6262 6260->6255 6261->6257 6264 7ff77f277190 6262->6264 6263 7ff77f276ed7 6575 7ff77f282b80 6263->6575 6266 7ff77f281f30 2 API calls 6264->6266 6268 7ff77f2771b8 6266->6268 6273 7ff77f3ce2a0 15 API calls 6268->6273 6269->6263 6271 7ff77f3b8b10 15 API calls 6269->6271 6270 7ff77f3b8b10 15 API calls 6272 7ff77f276f74 memset 6270->6272 6274 7ff77f276d12 memset 6271->6274 6275 7ff77f27705a OutputDebugStringW 6272->6275 6278 7ff77f276fb3 6272->6278 6281 7ff77f277070 6273->6281 6276 7ff77f276eba OutputDebugStringW 6274->6276 6280 7ff77f276d51 6274->6280 6275->6281 6276->6263 6278->6275 6279->5831 6280->6276 6281->6279 6579 7ff77f3cd380 WakeByAddressSingle 6281->6579 6283 7ff77f283113 6282->6283 6284 7ff77f2833de 6283->6284 6286 7ff77f283397 memcpy 6283->6286 6287 7ff77f3c7f00 18 API calls 6283->6287 6589 7ff77f3b8890 6283->6589 6284->5889 6286->6283 6287->6283 6290 7ff77f27a47c 6288->6290 6289 7ff77f27a49e 6291 7ff77f3b8b10 15 API calls 6289->6291 6290->6289 6297 7ff77f27a4b3 6290->6297 6292 7ff77f27a550 6291->6292 6292->5862 6293 7ff77f27a580 6296 7ff77f3ce093 15 API calls 6293->6296 6294 7ff77f27a4e5 memcpy 6294->6292 6298 7ff77f27a595 6296->6298 6297->6293 6297->6294 6299->5778 6300->5784 6301->5790 6302->5798 6303->5851 6304->5851 6306 7ff77f3c7fd4 6305->6306 6307 7ff77f3c7f17 6305->6307 6308 7ff77f3ce093 15 API calls 6306->6308 6307->6306 6311 7ff77f3c7f6d 6307->6311 6309 7ff77f3c7fba 6308->6309 6310 7ff77f3ce093 15 API calls 6309->6310 6318 7ff77f3c7fc1 6309->6318 6312 7ff77f3c7ff8 6310->6312 6311->6309 6314 7ff77f3c7e90 RtlReAllocateHeap 6311->6314 6600 7ff77f28a2d0 6312->6600 6314->6309 6315 7ff77f3c803b 6316 7ff77f3c8216 6315->6316 6317 7ff77f3c8044 6315->6317 6320 7ff77f3ce2a0 15 API calls 6316->6320 6607 7ff77f28a010 6317->6607 6318->5889 6322 7ff77f3c8267 6320->6322 6321 7ff77f3c806e 6321->6322 6324 7ff77f3c80a5 6321->6324 6323 7ff77f3ce0b0 15 API calls 6322->6323 6326 7ff77f3c8278 6323->6326 6327 7ff77f3c81ae 6324->6327 6614 7ff77f3b0c50 6324->6614 6326->5889 6327->5889 6329 7ff77f3c68ae 6328->6329 6330 7ff77f3c6892 6328->6330 6329->6330 6353 7ff77f3ce428 6329->6353 6330->5924 6345 7ff77f3ce001 6344->6345 6346 7ff77f3ce093 15 API calls 6345->6346 6347 7ff77f3ce024 6345->6347 6346->6347 6348 7ff77f3ce093 15 API calls 6347->6348 6350 7ff77f3ce05d 6347->6350 6349 7ff77f3ce092 6348->6349 6350->5924 6356 7ff77f3c3ed0 6351->6356 6354 7ff77f3ce2a0 15 API calls 6353->6354 6355 7ff77f3ce48b 6354->6355 6357 7ff77f3c3ef9 6356->6357 6368 7ff77f3c3f3b 6356->6368 6360 7ff77f3ce810 15 API calls 6357->6360 6357->6368 6358 7ff77f3c41d8 6359 7ff77f3ce2a0 15 API calls 6358->6359 6361 7ff77f3c424c 6359->6361 6360->6368 6362 7ff77f3ce2a0 15 API calls 6361->6362 6363 7ff77f3c42c1 6362->6363 6376 7ff77f3ce760 6363->6376 6367 7ff77f3ce810 15 API calls 6367->6368 6368->6358 6368->6361 6368->6363 6368->6367 6370 7ff77f3c407f 6368->6370 6371 7ff77f3ce220 6368->6371 6369 7ff77f3ce2a0 15 API calls 6369->6358 6370->6369 6372 7ff77f3ce340 15 API calls 6371->6372 6373 7ff77f3ce23e 6372->6373 6374 7ff77f3ce2a0 15 API calls 6373->6374 6375 7ff77f3ce29c 6374->6375 6385 7ff77f3c6320 6376->6385 6386 7ff77f3ce2a0 15 API calls 6385->6386 6387 7ff77f3c638e 6386->6387 6389 7ff77f3b8cd0 33 API calls 6388->6389 6395 7ff77f2767f6 6389->6395 6390 7ff77f276956 6393 7ff77f3ce093 15 API calls 6390->6393 6391 7ff77f27683e memcpy 6396 7ff77f27685f 6391->6396 6394 7ff77f27696b 6393->6394 6394->5966 6395->6390 6395->6391 6396->5966 6398 7ff77f27220a 6397->6398 6399 7ff77f272820 6397->6399 6401 7ff77f27222d 6398->6401 6402 7ff77f3cd5a0 15 API calls 6398->6402 6400 7ff77f3cd390 3 API calls 6399->6400 6400->6398 6403 7ff77f272888 6401->6403 6408 7ff77f27223a 6401->6408 6402->6401 6405 7ff77f3ce670 15 API calls 6403->6405 6404 7ff77f2723fb 6407 7ff77f3b8b10 15 API calls 6404->6407 6406 7ff77f2728bc 6405->6406 6411 7ff77f272924 6406->6411 6414 7ff77f3cd8b0 18 API calls 6406->6414 6409 7ff77f272455 memset 6407->6409 6408->6404 6412 7ff77f2724c0 6408->6412 6410 7ff77f2726aa OutputDebugStringW 6409->6410 6419 7ff77f27249b 6409->6419 6415 7ff77f2726c0 6410->6415 6411->5972 6413 7ff77f3b8b10 15 API calls 6412->6413 6416 7ff77f2725b7 memset 6413->6416 6414->6411 6417 7ff77f27280e 6415->6417 6420 7ff77f3cd8b0 18 API calls 6415->6420 6418 7ff77f27276a OutputDebugStringW 6416->6418 6422 7ff77f2725fd 6416->6422 6417->5972 6424 7ff77f272780 6418->6424 6419->6410 6420->6417 6421 7ff77f2728cb 6423 7ff77f3ce093 15 API calls 6421->6423 6422->6418 6423->6406 6424->6421 6426 7ff77f2727ce memcpy 6424->6426 6426->6415 6430 7ff77f280b63 6427->6430 6434 7ff77f280b24 6427->6434 6428 7ff77f280bc8 6437 7ff77f280be9 memcpy memcpy 6428->6437 6429 7ff77f280b4f 6431 7ff77f39f410 17 API calls 6429->6431 6432 7ff77f3ce093 15 API calls 6430->6432 6433 7ff77f280b82 6430->6433 6435 7ff77f280b5e 6431->6435 6436 7ff77f280fed 6432->6436 6433->5975 6434->6428 6434->6429 6438 7ff77f280c16 memcpy 6435->6438 6439 7ff77f3ce093 15 API calls 6436->6439 6437->6438 6438->6436 6444 7ff77f280c42 6438->6444 6442 7ff77f281008 6439->6442 6440 7ff77f280c66 memcpy memcpy 6443 7ff77f280cb2 6440->6443 6449 7ff77f280ca8 6440->6449 6442->5975 6509 7ff77f284560 6443->6509 6444->6436 6444->6440 6446 7ff77f3b8b10 15 API calls 6447 7ff77f280dc2 memset 6446->6447 6448 7ff77f280eba OutputDebugStringW 6447->6448 6450 7ff77f280e04 6447->6450 6451 7ff77f280ed6 6448->6451 6449->6433 6449->6446 6450->6448 6451->6433 6452 7ff77f3ce670 15 API calls 6451->6452 6452->6442 6454 7ff77f277b4e 6453->6454 6455 7ff77f277391 6453->6455 6456 7ff77f3cd390 3 API calls 6454->6456 6457 7ff77f3cd2c0 2 API calls 6455->6457 6459 7ff77f2773a7 6455->6459 6456->6459 6457->6454 6458 7ff77f277baa 6460 7ff77f3ce670 15 API calls 6458->6460 6459->6458 6463 7ff77f2773cc 6459->6463 6473 7ff77f277a2d 6460->6473 6461 7ff77f27759b 6462 7ff77f3b8b10 15 API calls 6461->6462 6464 7ff77f2775f5 memset 6462->6464 6463->6461 6465 7ff77f277660 6463->6465 6466 7ff77f2777ea OutputDebugStringW 6464->6466 6471 7ff77f27763b 6464->6471 6469 7ff77f3b8b10 15 API calls 6465->6469 6474 7ff77f277800 6466->6474 6468 7ff77f273a5e 6468->5990 6468->5991 6470 7ff77f2776ec memset 6469->6470 6472 7ff77f277aca OutputDebugStringW 6470->6472 6476 7ff77f277739 6470->6476 6471->6466 6472->6473 6473->6468 6522 7ff77f3cd380 WakeByAddressSingle 6473->6522 6474->6473 6475 7ff77f3b8b10 15 API calls 6474->6475 6478 7ff77f2779fa OutputDebugStringW 6474->6478 6477 7ff77f277921 memset 6475->6477 6476->6472 6477->6474 6477->6478 6478->6474 6481 7ff77f283d0c 6479->6481 6480 7ff77f2840ac 6482 7ff77f3ce093 15 API calls 6480->6482 6481->6480 6484 7ff77f283ea9 6481->6484 6486 7ff77f283dea 6481->6486 6483 7ff77f2840be 6482->6483 6483->6014 6485 7ff77f3c7f00 18 API calls 6484->6485 6484->6486 6485->6484 6486->6014 6488 7ff77f274d33 6487->6488 6489 7ff77f274dd1 memset 6487->6489 6490 7ff77f274e1f 6488->6490 6492 7ff77f274d5f memset 6488->6492 6491 7ff77f2751cc OutputDebugStringW 6489->6491 6493 7ff77f3b8b10 15 API calls 6490->6493 6505 7ff77f2751da 6491->6505 6492->6491 6494 7ff77f274ead memset 6493->6494 6495 7ff77f274f9a OutputDebugStringW 6494->6495 6497 7ff77f274ee5 6494->6497 6499 7ff77f274fbc 6495->6499 6496 7ff77f275168 memset 6496->6491 6497->6495 6498 7ff77f27500c strlen 6498->6499 6499->6496 6499->6498 6500 7ff77f275064 memcmp 6499->6500 6500->6499 6501 7ff77f275075 6500->6501 6502 7ff77f3b8b10 15 API calls 6501->6502 6503 7ff77f27510b memset 6502->6503 6504 7ff77f27528a OutputDebugStringW 6503->6504 6506 7ff77f275143 6503->6506 6504->6505 6505->6028 6506->6504 6507->6017 6508->6011 6510 7ff77f2845bf 6509->6510 6513 7ff77f284594 6509->6513 6511 7ff77f284635 6510->6511 6514 7ff77f39fd60 6510->6514 6511->6449 6513->6449 6513->6513 6516 7ff77f39fdc1 6514->6516 6515 7ff77f3a0221 6515->6510 6516->6515 6517 7ff77f3a028c 6516->6517 6520 7ff77f3a020b 6516->6520 6518 7ff77f3ce760 15 API calls 6517->6518 6519 7ff77f3a029b 6518->6519 6521 7ff77f3ce760 15 API calls 6520->6521 6521->6515 6523->6092 6527 7ff77f28395a 6524->6527 6525 7ff77f283b65 6525->6172 6526 7ff77f283c75 6528 7ff77f3ce093 15 API calls 6526->6528 6527->6525 6527->6526 6530 7ff77f2839e3 6527->6530 6529 7ff77f283c8d 6528->6529 6529->6172 6530->6525 6531 7ff77f3c7f00 18 API calls 6530->6531 6531->6530 6533 7ff77f28200a OutputDebugStringW 6532->6533 6534 7ff77f281f6a 6532->6534 6533->6232 6534->6533 6535->6135 6536->6144 6537->6156 6538->6167 6552 7ff77f3a3c70 6539->6552 6541 7ff77f3a3632 RoOriginateErrorW 6542 7ff77f27b7e3 6541->6542 6543 7ff77f3a32c0 GetErrorInfo 6542->6543 6543->6249 6544->6249 6546 7ff77f282e0a 6545->6546 6547 7ff77f282e1f 6545->6547 6548 7ff77f3a3600 17 API calls 6546->6548 6547->6243 6549 7ff77f282e11 6548->6549 6574 7ff77f3a32c0 GetErrorInfo 6549->6574 6551 7ff77f282e18 6551->6243 6555 7ff77f3a3c9a 6552->6555 6553 7ff77f3a3eb5 6553->6541 6554 7ff77f3a3fc5 6556 7ff77f3ce093 15 API calls 6554->6556 6555->6553 6555->6554 6558 7ff77f3a3d23 6555->6558 6557 7ff77f3a3fdd 6556->6557 6557->6541 6558->6553 6560 7ff77f3ccaa0 6558->6560 6561 7ff77f3ccb61 6560->6561 6562 7ff77f3ccab2 6560->6562 6564 7ff77f3ce093 15 API calls 6561->6564 6562->6561 6566 7ff77f3ccafa 6562->6566 6563 7ff77f3ccb47 6565 7ff77f3ce093 15 API calls 6563->6565 6568 7ff77f3ccb4e 6563->6568 6564->6563 6569 7ff77f3ccb85 6565->6569 6566->6563 6570 7ff77f3c7e90 6566->6570 6568->6558 6569->6558 6571 7ff77f3c7ea7 6570->6571 6572 7ff77f3c7ec0 6570->6572 6571->6572 6573 7ff77f3c7ebe RtlReAllocateHeap 6571->6573 6572->6563 6573->6572 6574->6551 6576 7ff77f282dbf 6575->6576 6578 7ff77f276efe 6575->6578 6580 7ff77f3c7a30 6576->6580 6578->6270 6581 7ff77f3c7b53 6580->6581 6583 7ff77f3c7a5c 6580->6583 6582 7ff77f3b8770 15 API calls 6581->6582 6588 7ff77f3c7aab 6582->6588 6583->6581 6584 7ff77f3c7b5f 6583->6584 6583->6588 6585 7ff77f3c7e06 6584->6585 6586 7ff77f3c7b89 memset 6584->6586 6587 7ff77f3b87c0 15 API calls 6585->6587 6586->6588 6587->6588 6588->6578 6588->6588 6590 7ff77f3b88a9 6589->6590 6591 7ff77f3b88cd 6590->6591 6592 7ff77f3ce093 15 API calls 6590->6592 6593 7ff77f3ce093 15 API calls 6591->6593 6594 7ff77f3b8906 6591->6594 6592->6591 6597 7ff77f3b8934 6593->6597 6594->6283 6595 7ff77f3ce093 15 API calls 6598 7ff77f3b89bc 6595->6598 6596 7ff77f3b89c1 6596->6283 6597->6596 6597->6598 6599 7ff77f3ce0b0 15 API calls 6597->6599 6598->6595 6599->6598 6601 7ff77f28a2da 6600->6601 6604 7ff77f28a306 6600->6604 6621 7ff77f28a540 6601->6621 6603 7ff77f28a2e5 6603->6604 6605 7ff77f3ce0b0 15 API calls 6603->6605 6604->6315 6606 7ff77f28a328 6605->6606 6606->6315 6608 7ff77f28a028 6607->6608 6609 7ff77f28a035 6608->6609 6610 7ff77f28a092 6608->6610 6611 7ff77f3ce760 15 API calls 6608->6611 6609->6321 6610->6609 6612 7ff77f3ce750 15 API calls 6610->6612 6611->6610 6613 7ff77f28a0f4 6612->6613 6615 7ff77f3b0c89 6614->6615 6616 7ff77f3b0d2b 6614->6616 6618 7ff77f3b0ce7 6615->6618 6626 7ff77f3a6520 6615->6626 6617 7ff77f3a9e50 15 API calls 6616->6617 6619 7ff77f3b0d65 6617->6619 6618->6327 6619->6327 6622 7ff77f28a5aa 6621->6622 6623 7ff77f28a553 6621->6623 6622->6603 6623->6622 6624 7ff77f28a578 BCryptGenRandom 6623->6624 6624->6623 6625 7ff77f28a59c SystemFunction036 6624->6625 6625->6622 6625->6623 6627 7ff77f3a653d 6626->6627 6628 7ff77f3ce093 15 API calls 6627->6628 6631 7ff77f3a6564 6627->6631 6628->6631 6629 7ff77f3ce093 15 API calls 6630 7ff77f3a65e2 6629->6630 6631->6629 6632 7ff77f3a65b4 6631->6632 6632->6618 6633 7ff77f271250 6634 7ff77f271261 6633->6634 6635 7ff77f27128a 6634->6635 6636 7ff77f3cd8c7 6634->6636 6637 7ff77f3cd959 6634->6637 6638 7ff77f3cd8ef 6636->6638 6641 7ff77f3cd8da WakeByAddressSingle 6636->6641 6639 7ff77f3ce340 15 API calls 6637->6639 6642 7ff77f3cd90e 6638->6642 6643 7ff77f3cd8f9 6638->6643 6644 7ff77f3cd920 WakeByAddressSingle 6638->6644 6640 7ff77f3cd971 6639->6640 6643->6642 6645 7ff77f3cd944 WakeByAddressAll 6643->6645 6644->6642 6644->6645 6645->6642 6646 7ff77f2712d0 6648 7ff77f3c2710 6646->6648 6650 7ff77f3c27bf 6648->6650 6651 7ff77f3c29f0 6648->6651 6653 7ff77f3c28b2 6648->6653 6655 7ff77f3be5e0 6648->6655 6649 7ff77f3ce810 15 API calls 6649->6651 6650->6649 6650->6651 6652 7ff77f3ce810 15 API calls 6654 7ff77f3c2a93 6652->6654 6653->6652 6656 7ff77f3be5f3 6655->6656 6657 7ff77f3be63a 6656->6657 6660 7ff77f3be614 6656->6660 6661 7ff77f3c6700 6656->6661 6657->6660 6668 7ff77f3c4430 6657->6668 6660->6648 6662 7ff77f3c685d 6661->6662 6665 7ff77f3c67ab 6661->6665 6663 7ff77f3ce428 15 API calls 6662->6663 6664 7ff77f3c6871 6663->6664 6666 7ff77f3ce428 15 API calls 6665->6666 6667 7ff77f3c681d 6665->6667 6666->6662 6667->6657 6669 7ff77f3c4447 6668->6669 6670 7ff77f3c443f 6668->6670 6669->6670 6673 7ff77f3c4300 6669->6673 6670->6660 6672 7ff77f3c44c9 6672->6660 6674 7ff77f3c438a 6673->6674 6679 7ff77f3c4314 6673->6679 6678 7ff77f3ce220 15 API calls 6674->6678 6680 7ff77f3c4372 6674->6680 6675 7ff77f3c440c 6677 7ff77f3ce750 15 API calls 6675->6677 6676 7ff77f3ce760 15 API calls 6676->6675 6677->6674 6681 7ff77f3c4427 6678->6681 6679->6674 6679->6675 6679->6676 6679->6680 6680->6672 6682 7ff77f3c443f 6681->6682 6683 7ff77f3c4300 15 API calls 6681->6683 6682->6672 6684 7ff77f3c44c9 6683->6684 6684->6672 6699 7ff77f271230 6700 7ff77f27124e 6699->6700 6701 7ff77f3cd959 6700->6701 6703 7ff77f3cd8c7 6700->6703 6704 7ff77f3ce340 15 API calls 6701->6704 6702 7ff77f3cd8ef 6706 7ff77f3cd8f9 6702->6706 6708 7ff77f3cd90e 6702->6708 6709 7ff77f3cd920 WakeByAddressSingle 6702->6709 6703->6702 6707 7ff77f3cd8da WakeByAddressSingle 6703->6707 6705 7ff77f3cd971 6704->6705 6706->6708 6710 7ff77f3cd944 WakeByAddressAll 6706->6710 6709->6708 6709->6710 6710->6708 6714 7ff77f277c10 6717 7ff77f271190 6714->6717 6718 7ff77f27119a 6717->6718 6719 7ff77f2711b4 6718->6719 6720 7ff77f3cd380 WakeByAddressSingle 6718->6720 5379 7ff77f3ae610 5392 7ff77f3afa40 5379->5392 5381 7ff77f3ae639 5383 7ff77f3ae649 5381->5383 5400 7ff77f3b0400 5381->5400 5384 7ff77f3ae673 5384->5383 5385 7ff77f3ae750 CreateFileW 5384->5385 5386 7ff77f3ae78f 5385->5386 5387 7ff77f3ae837 GetLastError 5385->5387 5386->5383 5388 7ff77f3ae79e GetLastError 5386->5388 5387->5383 5388->5383 5389 7ff77f3ae7ab SetFileInformationByHandle 5388->5389 5389->5383 5390 7ff77f3ae854 GetLastError CloseHandle 5389->5390 5391 7ff77f3ae873 5390->5391 5391->5383 5395 7ff77f3afa6b 5392->5395 5394 7ff77f3afab9 5427 7ff77f3a67f0 5394->5427 5395->5394 5431 7ff77f3ce093 5395->5431 5399 7ff77f3afb71 5399->5381 5424 7ff77f3b0434 5400->5424 5401 7ff77f3b047b 5401->5384 5402 7ff77f3b05a8 SetLastError GetFullPathNameW 5403 7ff77f3b05d3 GetLastError 5402->5403 5402->5424 5404 7ff77f3b06aa GetLastError 5403->5404 5403->5424 5404->5401 5405 7ff77f3b05ed GetLastError 5407 7ff77f3b0a3e 5405->5407 5405->5424 5406 7ff77f3ccd70 15 API calls 5406->5424 5409 7ff77f3ce340 15 API calls 5407->5409 5408 7ff77f3b0a2a 5632 7ff77f3ce750 5408->5632 5413 7ff77f3b0a3c 5409->5413 5411 7ff77f3b07d0 5412 7ff77f3b07f3 memcpy 5411->5412 5416 7ff77f3ccd70 15 API calls 5411->5416 5412->5401 5415 7ff77f3b0817 5412->5415 5413->5384 5414 7ff77f3b07d5 5414->5411 5420 7ff77f3b0a74 5414->5420 5419 7ff77f3a65f0 15 API calls 5415->5419 5417 7ff77f3b0a1e 5416->5417 5417->5412 5418 7ff77f3b07ae memcpy 5418->5411 5418->5412 5419->5401 5423 7ff77f3ce093 15 API calls 5420->5423 5421 7ff77f3b068a 5421->5418 5422 7ff77f3b08fd 5421->5422 5422->5414 5425 7ff77f3b0a58 5422->5425 5423->5413 5424->5401 5424->5402 5424->5405 5424->5406 5424->5408 5424->5414 5424->5421 5426 7ff77f3ce093 15 API calls 5425->5426 5426->5413 5429 7ff77f3a6819 5427->5429 5428 7ff77f3a6973 5428->5399 5437 7ff77f3a65f0 5428->5437 5429->5428 5444 7ff77f3ccd70 5429->5444 5432 7ff77f3ce0a2 5431->5432 5433 7ff77f3ce0aa 5431->5433 5629 7ff77f3b8850 5432->5629 5435 7ff77f3ce0b0 15 API calls 5433->5435 5436 7ff77f3ce0af 5435->5436 5438 7ff77f3a660d 5437->5438 5439 7ff77f3a6633 5438->5439 5440 7ff77f3ce093 15 API calls 5438->5440 5441 7ff77f3ce093 15 API calls 5439->5441 5443 7ff77f3a667c 5439->5443 5440->5439 5442 7ff77f3a66aa 5441->5442 5443->5399 5445 7ff77f3ccd88 5444->5445 5446 7ff77f3ce093 15 API calls 5445->5446 5448 7ff77f3ccdcc 5445->5448 5446->5448 5447 7ff77f3ce093 15 API calls 5449 7ff77f3cce4f 5447->5449 5448->5447 5452 7ff77f3cce1a 5448->5452 5455 7ff77f3a6e80 5449->5455 5452->5428 5456 7ff77f3a6e88 5455->5456 5457 7ff77f3a6ea9 5456->5457 5458 7ff77f3a6eab WakeByAddressSingle 5456->5458 5459 7ff77f3ce2a0 5457->5459 5462 7ff77f3ad310 5459->5462 5468 7ff77f3ac4a0 5462->5468 5495 7ff77f3ad680 5468->5495 5470 7ff77f3ac4af 5501 7ff77f3ad830 5470->5501 5497 7ff77f3ad6a3 5495->5497 5496 7ff77f3ad6f2 5498 7ff77f3ad8e6 15 API calls 5496->5498 5497->5496 5504 7ff77f3ad8e6 5497->5504 5500 7ff77f3ad729 5498->5500 5500->5470 5502 7ff77f3ad8e6 15 API calls 5501->5502 5503 7ff77f3ad85d 5502->5503 5508 7ff77f3ad921 5504->5508 5505 7ff77f3ada0b 5506 7ff77f3ada95 5505->5506 5507 7ff77f3ada13 5505->5507 5509 7ff77f3a9e50 15 API calls 5506->5509 5574 7ff77f3a9e50 5507->5574 5508->5505 5510 7ff77f3ad94f 5508->5510 5523 7ff77f3cd5a0 5508->5523 5514 7ff77f3ada8f 5509->5514 5515 7ff77f3ad993 5510->5515 5531 7ff77f3ace24 5510->5531 5517 7ff77f3a9e50 15 API calls 5514->5517 5549 7ff77f3a5610 5515->5549 5519 7ff77f3adb3d 5517->5519 5518 7ff77f3ad9de 5518->5514 5562 7ff77f3adb90 5518->5562 5521 7ff77f3a5610 15 API calls 5519->5521 5522 7ff77f3adb74 5521->5522 5522->5496 5524 7ff77f3cd5bc 5523->5524 5525 7ff77f3cd740 5524->5525 5526 7ff77f3cd74b 5524->5526 5528 7ff77f3cd6e2 WaitOnAddress 5524->5528 5525->5510 5527 7ff77f3ce2a0 13 API calls 5526->5527 5530 7ff77f3cd77d 5527->5530 5528->5524 5529 7ff77f3cd704 GetLastError 5528->5529 5529->5524 5532 7ff77f3ace4e 5531->5532 5536 7ff77f3ace48 5531->5536 5532->5536 5579 7ff77f3aa3a0 5532->5579 5535 7ff77f3ad064 5535->5515 5536->5535 5583 7ff77f3a95c0 5536->5583 5537 7ff77f3acf41 5538 7ff77f3acf65 5537->5538 5539 7ff77f3acfd9 5537->5539 5542 7ff77f3acf7c 5538->5542 5590 7ff77f3cd2c0 5538->5590 5540 7ff77f3ad135 2 API calls 5539->5540 5548 7ff77f3acfca 5540->5548 5587 7ff77f3ad135 5542->5587 5548->5515 5550 7ff77f3a562a 5549->5550 5551 7ff77f3a562c 5549->5551 5550->5518 5552 7ff77f3cd8c7 5551->5552 5553 7ff77f3cd959 5551->5553 5556 7ff77f3cd8ef 5552->5556 5558 7ff77f3cd8da WakeByAddressSingle 5552->5558 5595 7ff77f3ce340 5553->5595 5557 7ff77f3cd8f9 5556->5557 5559 7ff77f3cd90e 5556->5559 5560 7ff77f3cd920 WakeByAddressSingle 5556->5560 5557->5559 5561 7ff77f3cd944 WakeByAddressAll 5557->5561 5559->5518 5560->5559 5560->5561 5561->5559 5598 7ff77f3b1ac0 5562->5598 5564 7ff77f3adba5 5565 7ff77f3a9e50 15 API calls 5564->5565 5566 7ff77f3adbfe 5565->5566 5569 7ff77f3adc3d 5566->5569 5570 7ff77f3adcb2 5566->5570 5567 7ff77f3adcb0 5567->5505 5568 7ff77f3b863e 5568->5505 5569->5567 5621 7ff77f3ce740 5569->5621 5570->5568 5624 7ff77f3ce670 5570->5624 5575 7ff77f3a9e87 5574->5575 5576 7ff77f3ce2a0 15 API calls 5575->5576 5578 7ff77f3a9e96 5575->5578 5577 7ff77f3a9f3a 5576->5577 5577->5514 5578->5514 5580 7ff77f3aa3bc 5579->5580 5582 7ff77f3aa3d2 5579->5582 5581 7ff77f3a82a0 15 API calls 5580->5581 5581->5582 5582->5536 5584 7ff77f3a95d7 5583->5584 5585 7ff77f3cd980 15 API calls 5584->5585 5586 7ff77f3a9614 5584->5586 5585->5586 5586->5537 5588 7ff77f3abaf0 WaitOnAddress GetLastError 5587->5588 5589 7ff77f3ad15e 5588->5589 5591 7ff77f3cd2d9 5590->5591 5592 7ff77f3cd300 5591->5592 5593 7ff77f3cd32c WaitOnAddress 5591->5593 5592->5542 5593->5591 5594 7ff77f3cd349 GetLastError 5593->5594 5594->5591 5596 7ff77f3ce2a0 15 API calls 5595->5596 5597 7ff77f3ce37d 5596->5597 5599 7ff77f3b1acd 5598->5599 5600 7ff77f3b1b6e 5599->5600 5601 7ff77f3acd10 15 API calls 5599->5601 5600->5564 5602 7ff77f3b1b82 5601->5602 5603 7ff77f3ce48c 15 API calls 5602->5603 5604 7ff77f3b1ba3 5603->5604 5605 7ff77f3ce2a0 15 API calls 5604->5605 5606 7ff77f3b1bec 5605->5606 5607 7ff77f3b1cc9 5606->5607 5608 7ff77f3ce340 15 API calls 5606->5608 5610 7ff77f3b1c33 5606->5610 5607->5564 5608->5610 5609 7ff77f3ce220 15 API calls 5611 7ff77f3b1c8f 5609->5611 5610->5607 5610->5609 5610->5611 5611->5607 5612 7ff77f3ce2a0 15 API calls 5611->5612 5620 7ff77f3b1feb 5612->5620 5613 7ff77f3c29f0 5613->5564 5614 7ff77f3be5e0 15 API calls 5614->5620 5615 7ff77f3ce810 15 API calls 5615->5613 5616 7ff77f3c28b2 5618 7ff77f3ce810 15 API calls 5616->5618 5617 7ff77f3c27bf 5617->5613 5617->5615 5619 7ff77f3c2a93 5618->5619 5620->5613 5620->5614 5620->5616 5620->5617 5622 7ff77f3c6240 15 API calls 5621->5622 5623 7ff77f3ce74f 5622->5623 5625 7ff77f3ce2a0 15 API calls 5624->5625 5626 7ff77f3ce6f0 5625->5626 5627 7ff77f3ce2a0 15 API calls 5626->5627 5628 7ff77f3ce73c 5627->5628 5630 7ff77f3ce2a0 15 API calls 5629->5630 5631 7ff77f3b8888 5630->5631 5635 7ff77f3c62b0 5632->5635 5636 7ff77f3ce2a0 15 API calls 5635->5636 5637 7ff77f3c631e 5636->5637 6685 7ff77f277240 6686 7ff77f277266 6685->6686 6687 7ff77f277280 6686->6687 6689 7ff77f3cd380 WakeByAddressSingle 6686->6689 6690 7ff77f272940 6691 7ff77f272986 6690->6691 6693 7ff77f272977 6690->6693 6692 7ff77f3cd8b0 18 API calls 6691->6692 6692->6693 6711 7ff77f272120 6712 7ff77f282ff0 18 API calls 6711->6712 6713 7ff77f27214b 6712->6713 6721 7ff77f277300 6722 7ff77f271190 WakeByAddressSingle 6721->6722 6723 7ff77f277328 6722->6723 6724 7ff77f271000 6725 7ff77f2710a2 6724->6725 6728 7ff77f27101c 6724->6728 6726 7ff77f3ce220 15 API calls 6725->6726 6727 7ff77f2710ae 6726->6727 6729 7ff77f271158 6727->6729 6733 7ff77f2710cc 6727->6733 6730 7ff77f27102c 6728->6730 6737 7ff77f3ac6c0 ProcessPrng 6728->6737 6731 7ff77f3ce220 15 API calls 6729->6731 6736 7ff77f271164 6731->6736 6734 7ff77f2710dc 6733->6734 6738 7ff77f3ac6c0 ProcessPrng 6733->6738 6737->6730 6738->6734
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset$CreateErrorFileFirstLastModuleModule32NameSnapshotToolhelp32memcpy
                                                • String ID: C:\Windows\System32\Resolved full path for module: $kernel32.dll$kernel32.dllNtOpenProcessNtCreateSectionNtMapViewOfSectionNtOpenFileVirtualAllocExCloseHandleWriteProcessMemoryCreateToolhelp32SnapshotModule32FirstWModule32NextWResumeThreadCreateProcessWNtClose$ntdll.dllNormalized full path for ntdll.dll:
                                                • API String ID: 2813801548-1197829175
                                                • Opcode ID: 915afac029a4fa5042799591e063d82113a0319f6232ae723ff7149c55cfd773
                                                • Instruction ID: ef17152f041eb1f30e432c66ac0524b4b754c6ac7544aba146481074f58d47cd
                                                • Opcode Fuzzy Hash: 915afac029a4fa5042799591e063d82113a0319f6232ae723ff7149c55cfd773
                                                • Instruction Fuzzy Hash: 2713A262A38BC188E771AF34D9107E9B3A0FB45788F905135DA4C5BB99EF3C9285C790
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset$Section$CloseCreateCurrentFileOpenProcessView
                                                • String ID: $ $KO_S$NtCreateSection failedNtOpenFile failed for $NtCreateSectionNtMapViewOfSectionNtOpenFileVirtualAllocExCloseHandleWriteProcessMemoryCreateToolhelp32SnapshotModule32FirstWModule32NextWResumeThreadCreateProcessWNtClose$NtMapViewOfSection failedSTATUS_IMAGE_NOT_AT_BASE detected. Module mapped at address: $`
                                                • API String ID: 2718610588-1010830500
                                                • Opcode ID: 2d32c2606abb228219da50f89074480e41de1d5579b5a3e1f66b6eac0098edb8
                                                • Instruction ID: 35edee5cac0eb4f050546e7ac2b521f5c6f8b20f95a54672699b76821f208937
                                                • Opcode Fuzzy Hash: 2d32c2606abb228219da50f89074480e41de1d5579b5a3e1f66b6eac0098edb8
                                                • Instruction Fuzzy Hash: 93F28C73A25BC189EB71AF20D9543ED73A4FB45B88F80413ADA4D4BB99DF798244C390
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: memset$DebugOutputString$memcpy
                                                • String ID:
                                                • API String ID: 170145970-0
                                                • Opcode ID: c341a6c7b7867de1eeb5e669daa106745d0a743dc945263b861972e45a3a50ec
                                                • Instruction ID: fe94df39fc9fd31e1a32433b60aa9ff6b5f90a89c7d4d4097034a1a53e2d72d8
                                                • Opcode Fuzzy Hash: c341a6c7b7867de1eeb5e669daa106745d0a743dc945263b861972e45a3a50ec
                                                • Instruction Fuzzy Hash: 36F2A233A38BC189EB329F60D9547ED6364FB45B88F80413ADA4D5BB89DF399254C390
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: memset$DebugOutputString$HandleModuleQueryVirtual
                                                • String ID: C:\Windows\System32\Resolved full path for module: $ntdll.dll$ntdll.dllNormalized full path for ntdll.dll:
                                                • API String ID: 3283594973-2956908514
                                                • Opcode ID: c979f91e1bf64c4315d2dff38b282cf704be30dc6ec98e33bff4fea9a6edb4ec
                                                • Instruction ID: b19eb4af1fa2fa3c2d2fc5893a90024eae9956a3ec21d26073b367f1a19e4ff8
                                                • Opcode Fuzzy Hash: c979f91e1bf64c4315d2dff38b282cf704be30dc6ec98e33bff4fea9a6edb4ec
                                                • Instruction Fuzzy Hash: B0A29E33A35BC189EB319F30D9557E8A764FB45B88F804236DA4D4BB9ADF399244C390

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1080 7ff77f277340-7ff77f27738b 1081 7ff77f277b53-7ff77f277b91 call 7ff77f3cd390 1080->1081 1082 7ff77f277391-7ff77f2773a1 1080->1082 1089 7ff77f277b96-7ff77f277ba4 call 7ff77f3cd220 1081->1089 1084 7ff77f2773a7-7ff77f2773b7 1082->1084 1085 7ff77f277b46-7ff77f277b4e call 7ff77f3cd2c0 1082->1085 1088 7ff77f2773bd-7ff77f2773c6 1084->1088 1084->1089 1085->1081 1092 7ff77f2773cc-7ff77f2773de 1088->1092 1093 7ff77f277baa-7ff77f277bd9 call 7ff77f3ce670 1088->1093 1089->1092 1089->1093 1096 7ff77f27759b-7ff77f277635 call 7ff77f3b8b10 memset 1092->1096 1097 7ff77f2773e4-7ff77f277529 1092->1097 1104 7ff77f277bdb-7ff77f277be9 call 7ff77f3cd380 1093->1104 1108 7ff77f27763b-7ff77f27764d 1096->1108 1109 7ff77f2777ea-7ff77f2777fe OutputDebugStringW 1096->1109 1098 7ff77f27752d-7ff77f277545 1097->1098 1101 7ff77f277547-7ff77f277562 1098->1101 1102 7ff77f277580-7ff77f27758c 1098->1102 1105 7ff77f277568-7ff77f277573 1101->1105 1106 7ff77f277660-7ff77f277733 call 7ff77f3b8b10 memset 1101->1106 1102->1096 1107 7ff77f27758e-7ff77f277599 1102->1107 1122 7ff77f277b28-7ff77f277b45 1104->1122 1105->1101 1111 7ff77f277575 1105->1111 1127 7ff77f277739-7ff77f27774b 1106->1127 1128 7ff77f277aca-7ff77f277ade OutputDebugStringW 1106->1128 1107->1098 1114 7ff77f27775e-7ff77f27778e 1108->1114 1115 7ff77f277653-7ff77f27765b 1108->1115 1112 7ff77f277811-7ff77f277832 1109->1112 1113 7ff77f277800-7ff77f27780c call 7ff77f287180 1109->1113 1111->1102 1120 7ff77f277842-7ff77f277846 1112->1120 1113->1112 1118 7ff77f277790-7ff77f2777ba 1114->1118 1121 7ff77f2777bc-7ff77f2777cd 1115->1121 1118->1118 1118->1121 1125 7ff77f277a2d-7ff77f277a40 1120->1125 1126 7ff77f27784c-7ff77f27784f 1120->1126 1124 7ff77f2777d0-7ff77f2777d7 1121->1124 1124->1109 1129 7ff77f2777d9-7ff77f2777e8 1124->1129 1134 7ff77f277b05-7ff77f277b15 1125->1134 1135 7ff77f277a46 1125->1135 1132 7ff77f277851-7ff77f277856 1126->1132 1133 7ff77f277860-7ff77f27787a 1126->1133 1136 7ff77f277a4b-7ff77f277a6e 1127->1136 1137 7ff77f277751-7ff77f277759 1127->1137 1130 7ff77f277af1-7ff77f277b03 1128->1130 1131 7ff77f277ae0-7ff77f277aec call 7ff77f287180 1128->1131 1129->1109 1129->1124 1130->1134 1141 7ff77f277b1b-7ff77f277b22 1130->1141 1131->1130 1143 7ff77f277889-7ff77f277959 call 7ff77f3b8b10 memset 1132->1143 1133->1133 1144 7ff77f27787c-7ff77f277887 1133->1144 1134->1141 1142 7ff77f277bee-7ff77f277bfb call 7ff77f3cd220 1134->1142 1135->1141 1138 7ff77f277a70-7ff77f277a9a 1136->1138 1139 7ff77f277a9c-7ff77f277aad 1137->1139 1138->1138 1138->1139 1146 7ff77f277ab0-7ff77f277ab7 1139->1146 1141->1104 1141->1122 1142->1141 1153 7ff77f277c01-7ff77f277c06 1142->1153 1151 7ff77f2779fa-7ff77f277a11 OutputDebugStringW 1143->1151 1152 7ff77f27795f-7ff77f277971 1143->1152 1144->1143 1146->1128 1149 7ff77f277ab9-7ff77f277ac8 1146->1149 1149->1128 1149->1146 1156 7ff77f277a17-7ff77f277a28 call 7ff77f287180 1151->1156 1157 7ff77f277840 1151->1157 1154 7ff77f277973-7ff77f27797b 1152->1154 1155 7ff77f277980-7ff77f27799f 1152->1155 1153->1141 1158 7ff77f2779cc-7ff77f2779dd 1154->1158 1159 7ff77f2779a0-7ff77f2779ca 1155->1159 1156->1157 1157->1120 1161 7ff77f2779e0-7ff77f2779e7 1158->1161 1159->1158 1159->1159 1161->1151 1163 7ff77f2779e9-7ff77f2779f8 1161->1163 1163->1151 1163->1161
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset
                                                • String ID: arenegyl$called `Result::unwrap()` on an `Err` value$modnarod$setybdet$uespemos
                                                • API String ID: 1084755268-2410307170
                                                • Opcode ID: 635469b62e7fa23d5de4113af9d20ef48ac53fd6ace00b17b3e29e09392acaab
                                                • Instruction ID: ae87dd668891ef165bfeedee8b0271c000e8d4827cc4d9c7afb1f37f83ded763
                                                • Opcode Fuzzy Hash: 635469b62e7fa23d5de4113af9d20ef48ac53fd6ace00b17b3e29e09392acaab
                                                • Instruction Fuzzy Hash: 5522D163A35BC185EB20AF60D9547EDA361FB05788F808236DE1D5BB99DF38D241C3A0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1164 7ff77f274d10-7ff77f274d2d 1165 7ff77f274d33-7ff77f274d48 1164->1165 1166 7ff77f274dd1-7ff77f274e1a memset 1164->1166 1167 7ff77f274d4e-7ff77f274d59 1165->1167 1168 7ff77f274e1f 1165->1168 1169 7ff77f2751cc-7ff77f2751d4 OutputDebugStringW 1166->1169 1171 7ff77f274e24-7ff77f274edf call 7ff77f3b8b10 memset 1167->1171 1172 7ff77f274d5f-7ff77f274dcc memset 1167->1172 1168->1171 1170 7ff77f2751da-7ff77f2751f3 1169->1170 1175 7ff77f274f9a-7ff77f274fba OutputDebugStringW 1171->1175 1176 7ff77f274ee5-7ff77f274ef7 1171->1176 1172->1169 1177 7ff77f274fbc-7ff77f274fc5 call 7ff77f287180 1175->1177 1178 7ff77f274fca-7ff77f274fd1 1175->1178 1179 7ff77f274ef9-7ff77f274f01 1176->1179 1180 7ff77f274f03-7ff77f274f26 1176->1180 1177->1178 1182 7ff77f274fd7-7ff77f274ff8 1178->1182 1183 7ff77f275168-7ff77f2751c3 memset 1178->1183 1184 7ff77f274f62-7ff77f274f7e 1179->1184 1185 7ff77f274f30-7ff77f274f60 1180->1185 1187 7ff77f27500c-7ff77f275062 strlen call 7ff77f3be880 1182->1187 1183->1169 1186 7ff77f274f80-7ff77f274f87 1184->1186 1185->1184 1185->1185 1186->1175 1188 7ff77f274f89-7ff77f274f98 1186->1188 1191 7ff77f275064-7ff77f275073 memcmp 1187->1191 1192 7ff77f275000-7ff77f275006 1187->1192 1188->1175 1188->1186 1191->1192 1193 7ff77f275075-7ff77f27513d call 7ff77f3b8b10 memset 1191->1193 1192->1183 1192->1187 1196 7ff77f27528a-7ff77f2752aa OutputDebugStringW 1193->1196 1197 7ff77f275143-7ff77f275155 1193->1197 1200 7ff77f2752ac-7ff77f2752b5 call 7ff77f287180 1196->1200 1201 7ff77f2752ba-7ff77f2752c6 1196->1201 1198 7ff77f27515b-7ff77f275163 1197->1198 1199 7ff77f2751f4-7ff77f275217 1197->1199 1202 7ff77f275252-7ff77f27526e 1198->1202 1203 7ff77f275220-7ff77f275250 1199->1203 1200->1201 1201->1170 1205 7ff77f275270-7ff77f275277 1202->1205 1203->1202 1203->1203 1205->1196 1206 7ff77f275279-7ff77f275288 1205->1206 1206->1196 1206->1205
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset$memcmpstrlen
                                                • String ID: c
                                                • API String ID: 2294051181-112844655
                                                • Opcode ID: a39e704dc0efe672cfbb56e1134cac08b328ef785230e71eb31994ab265e2ac8
                                                • Instruction ID: df74c91ae962c5e8da8bcb1a290d27afee1bcb0c82f522431c6aec8b1f407fbd
                                                • Opcode Fuzzy Hash: a39e704dc0efe672cfbb56e1134cac08b328ef785230e71eb31994ab265e2ac8
                                                • Instruction Fuzzy Hash: 95E19C23A38BC185EB219B24E5513EAF7A1FB85784F804235DA8D47B95EF3CD185CB60

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1207 7ff77f2769b0-7ff77f2769e0 1208 7ff77f2769e6-7ff77f2769fd 1207->1208 1209 7ff77f276c01-7ff77f276c8d call 7ff77f3b8b10 memset 1207->1209 1211 7ff77f2770c7-7ff77f277105 call 7ff77f3cd390 1208->1211 1212 7ff77f276a03-7ff77f276a12 1208->1212 1217 7ff77f276dfa-7ff77f276e15 OutputDebugStringW 1209->1217 1218 7ff77f276c93-7ff77f276ca5 1209->1218 1221 7ff77f27710a-7ff77f27711d call 7ff77f3cd220 1211->1221 1215 7ff77f2770ba-7ff77f2770c2 call 7ff77f3cd2c0 1212->1215 1216 7ff77f276a18-7ff77f276a28 1212->1216 1215->1211 1220 7ff77f276a2e-7ff77f276a3e 1216->1220 1216->1221 1228 7ff77f276e1b-7ff77f276e29 call 7ff77f287180 1217->1228 1229 7ff77f2770ac-7ff77f2770b9 1217->1229 1223 7ff77f276cab-7ff77f276cb3 1218->1223 1224 7ff77f276d76-7ff77f276d99 1218->1224 1226 7ff77f277123-7ff77f2771c0 call 7ff77f3b8b10 call 7ff77f281f30 1220->1226 1227 7ff77f276a44-7ff77f276a50 1220->1227 1221->1226 1221->1227 1232 7ff77f276dcc-7ff77f276ddd 1223->1232 1237 7ff77f276da0-7ff77f276dca 1224->1237 1254 7ff77f2771db-7ff77f27720d call 7ff77f3ce2a0 1226->1254 1255 7ff77f2771c2-7ff77f2771d6 call 7ff77f287180 1226->1255 1235 7ff77f276ee8-7ff77f276fad call 7ff77f282b80 call 7ff77f3b8b10 memset 1227->1235 1236 7ff77f276a56-7ff77f276b9a 1227->1236 1228->1229 1242 7ff77f276de0-7ff77f276de7 1232->1242 1260 7ff77f27705a-7ff77f27706e OutputDebugStringW 1235->1260 1261 7ff77f276fb3-7ff77f276fc5 1235->1261 1240 7ff77f276b9e-7ff77f276bb6 1236->1240 1237->1232 1237->1237 1244 7ff77f276bb8-7ff77f276bcf 1240->1244 1245 7ff77f276be2-7ff77f276bee 1240->1245 1242->1217 1247 7ff77f276de9-7ff77f276df8 1242->1247 1249 7ff77f276cb8-7ff77f276d4b call 7ff77f3b8b10 memset 1244->1249 1250 7ff77f276bd5-7ff77f276be0 1244->1250 1245->1235 1252 7ff77f276bf4-7ff77f276bff 1245->1252 1247->1217 1247->1242 1265 7ff77f276eba-7ff77f276ed5 OutputDebugStringW 1249->1265 1266 7ff77f276d51-7ff77f276d63 1249->1266 1250->1244 1250->1245 1252->1240 1271 7ff77f27720f-7ff77f277217 call 7ff77f3cd380 1254->1271 1255->1254 1267 7ff77f277081-7ff77f27708f 1260->1267 1268 7ff77f277070-7ff77f27707c call 7ff77f287180 1260->1268 1262 7ff77f276fc7-7ff77f276fcf 1261->1262 1263 7ff77f276fd1-7ff77f276fff 1261->1263 1269 7ff77f27702c-7ff77f27703d 1262->1269 1270 7ff77f277000-7ff77f27702a 1263->1270 1265->1235 1272 7ff77f276ed7-7ff77f276ee3 call 7ff77f287180 1265->1272 1273 7ff77f276e2e-7ff77f276e5e 1266->1273 1274 7ff77f276d69-7ff77f276d71 1266->1274 1276 7ff77f277091-7ff77f27709a 1267->1276 1277 7ff77f2770a0-7ff77f2770a6 1267->1277 1268->1267 1280 7ff77f277040-7ff77f277047 1269->1280 1270->1269 1270->1270 1271->1229 1272->1235 1279 7ff77f276e60-7ff77f276e8a 1273->1279 1282 7ff77f276e8c-7ff77f276e9d 1274->1282 1276->1277 1283 7ff77f27721c-7ff77f277223 call 7ff77f3cd220 1276->1283 1277->1229 1277->1271 1279->1279 1279->1282 1280->1260 1285 7ff77f277049-7ff77f277058 1280->1285 1286 7ff77f276ea0-7ff77f276ea7 1282->1286 1283->1277 1290 7ff77f277229-7ff77f27722d 1283->1290 1285->1260 1285->1280 1286->1265 1288 7ff77f276ea9-7ff77f276eb8 1286->1288 1288->1265 1288->1286 1290->1277
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset
                                                • String ID: arenegyl$modnarod$setybdet$uespemos
                                                • API String ID: 1084755268-66988881
                                                • Opcode ID: 7a59cb85bd82a668f3f1177c22571f97da8fa81c8e0866e3b1fe98b2cc1044c8
                                                • Instruction ID: 7fedc2c74ae95ea894137e2b67fe94e839bfd8a3add53b6f86f38d2663d6b089
                                                • Opcode Fuzzy Hash: 7a59cb85bd82a668f3f1177c22571f97da8fa81c8e0866e3b1fe98b2cc1044c8
                                                • Instruction Fuzzy Hash: 9D22B173A35BC189EB20EF60D9547ED6761EB05788F804236DE0D5BB9ADF389245C3A0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1291 7ff77f2721c0-7ff77f272204 1292 7ff77f27220a-7ff77f272219 1291->1292 1293 7ff77f272820-7ff77f27286d call 7ff77f3cd390 1291->1293 1294 7ff77f272873-7ff77f272882 call 7ff77f3cd5a0 1292->1294 1295 7ff77f27221f-7ff77f272227 1292->1295 1293->1294 1293->1295 1300 7ff77f27223a-7ff77f272246 1294->1300 1301 7ff77f272888-7ff77f2728bc call 7ff77f3ce670 1294->1301 1295->1294 1297 7ff77f27222d-7ff77f272234 1295->1297 1297->1300 1297->1301 1303 7ff77f2723fb-7ff77f272495 call 7ff77f3b8b10 memset 1300->1303 1304 7ff77f27224c-7ff77f272390 1300->1304 1311 7ff77f2728e0-7ff77f272922 1301->1311 1313 7ff77f27249b-7ff77f2724ad 1303->1313 1314 7ff77f2726aa-7ff77f2726be OutputDebugStringW 1303->1314 1306 7ff77f272394-7ff77f2723ac 1304->1306 1309 7ff77f2723ae-7ff77f2723c9 1306->1309 1310 7ff77f2723e0-7ff77f2723ec 1306->1310 1317 7ff77f2723cf-7ff77f2723da 1309->1317 1318 7ff77f2724c0-7ff77f2725f7 call 7ff77f3b8b10 memset 1309->1318 1310->1303 1319 7ff77f2723ee-7ff77f2723f9 1310->1319 1315 7ff77f272933-7ff77f272938 call 7ff77f3cd8b0 1311->1315 1316 7ff77f272924-7ff77f272932 1311->1316 1320 7ff77f2724b3-7ff77f2724bb 1313->1320 1321 7ff77f272622-7ff77f272645 1313->1321 1325 7ff77f2726d1-7ff77f2726de 1314->1325 1326 7ff77f2726c0-7ff77f2726cc call 7ff77f287180 1314->1326 1315->1316 1317->1309 1324 7ff77f2723dc 1317->1324 1335 7ff77f2725fd-7ff77f27260f 1318->1335 1336 7ff77f27276a-7ff77f27277e OutputDebugStringW 1318->1336 1319->1306 1328 7ff77f27267c-7ff77f27268d 1320->1328 1331 7ff77f272650-7ff77f27267a 1321->1331 1324->1310 1327 7ff77f2727f2-7ff77f272808 1325->1327 1326->1325 1333 7ff77f2728be-7ff77f2728c6 call 7ff77f3cd8b0 1327->1333 1334 7ff77f27280e-7ff77f27281f 1327->1334 1337 7ff77f272690-7ff77f272697 1328->1337 1331->1328 1331->1331 1333->1334 1338 7ff77f272615-7ff77f27261d 1335->1338 1339 7ff77f2726e3-7ff77f272706 1335->1339 1340 7ff77f272791-7ff77f27279f 1336->1340 1341 7ff77f272780-7ff77f27278c call 7ff77f287180 1336->1341 1337->1314 1342 7ff77f272699-7ff77f2726a8 1337->1342 1345 7ff77f27273c-7ff77f27274d 1338->1345 1344 7ff77f272710-7ff77f27273a 1339->1344 1347 7ff77f2728cb 1340->1347 1348 7ff77f2727a5-7ff77f2727a9 1340->1348 1341->1340 1342->1314 1342->1337 1344->1344 1344->1345 1350 7ff77f272750-7ff77f272757 1345->1350 1353 7ff77f2728ce-7ff77f2728db call 7ff77f3ce093 1347->1353 1351 7ff77f2727ab-7ff77f2727c8 call 7ff77f287170 1348->1351 1352 7ff77f2727d3 1348->1352 1350->1336 1355 7ff77f272759-7ff77f272768 1350->1355 1351->1353 1359 7ff77f2727ce-7ff77f2727d1 1351->1359 1357 7ff77f2727d9-7ff77f2727ee memcpy 1352->1357 1353->1311 1355->1336 1355->1350 1357->1327 1359->1357
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset$memcpy
                                                • String ID: arenegyl$called `Result::unwrap()` on an `Err` value$modnarod$setybdet$uespemos
                                                • API String ID: 293864031-2410307170
                                                • Opcode ID: 440b3c82d7a9c7c7f9c321a6ecc0ab571a12d34dd9aa247a7caafc51aba73412
                                                • Instruction ID: 2f5d85160d0a1cb786dff484116ccd30b42a6844a6682a1aabf2dfbab1158414
                                                • Opcode Fuzzy Hash: 440b3c82d7a9c7c7f9c321a6ecc0ab571a12d34dd9aa247a7caafc51aba73412
                                                • Instruction Fuzzy Hash: 8A02C073A25BC185EB20DF60D9547EDA361FB05798F808236DE1D5BB99DF389241C3A0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1360 7ff77f271350-7ff77f2713b1 1361 7ff77f2713b7-7ff77f2713c9 1360->1361 1362 7ff77f271f68-7ff77f271fa6 call 7ff77f3cd390 1360->1362 1363 7ff77f271f54-7ff77f271f5c call 7ff77f3cd780 1361->1363 1364 7ff77f2713cf-7ff77f2713df 1361->1364 1367 7ff77f271fab-7ff77f271fb8 call 7ff77f3cd220 1362->1367 1378 7ff77f271f61-7ff77f271f66 call 7ff77f3cd8b0 1363->1378 1364->1367 1368 7ff77f2713e5-7ff77f2713ed 1364->1368 1371 7ff77f271fbe-7ff77f271fed call 7ff77f3ce670 1367->1371 1372 7ff77f2713f3-7ff77f271419 call 7ff77f287170 1367->1372 1368->1371 1368->1372 1380 7ff77f272062-7ff77f2720b3 call 7ff77f282ff0 1371->1380 1382 7ff77f272053-7ff77f27205d call 7ff77f3ce0b0 1372->1382 1383 7ff77f27141f-7ff77f271be4 1372->1383 1388 7ff77f271f39-7ff77f271f53 1378->1388 1382->1380 1386 7ff77f271bfb-7ff77f271c02 1383->1386 1389 7ff77f271ee9-7ff77f271f0a call 7ff77f287180 1386->1389 1390 7ff77f271c08-7ff77f271c56 call 7ff77f280350 1386->1390 1398 7ff77f271f0c-7ff77f271f1c 1389->1398 1399 7ff77f271f22-7ff77f271f37 1389->1399 1396 7ff77f27200b-7ff77f272051 call 7ff77f3ce670 1390->1396 1397 7ff77f271c5c-7ff77f271c6a 1390->1397 1396->1380 1401 7ff77f271d24-7ff77f271d56 call 7ff77f282840 1397->1401 1402 7ff77f271c70-7ff77f271c77 1397->1402 1398->1399 1400 7ff77f271fef-7ff77f271ffc call 7ff77f3cd220 1398->1400 1399->1378 1399->1388 1400->1399 1413 7ff77f272002-7ff77f272006 1400->1413 1415 7ff77f271d6c-7ff77f271e12 call 7ff77f3b8b10 memset 1401->1415 1416 7ff77f271d58 1401->1416 1404 7ff77f271c7d-7ff77f271c8a 1402->1404 1405 7ff77f271cf9-7ff77f271d00 1402->1405 1409 7ff77f271c90-7ff77f271cf7 1404->1409 1405->1401 1411 7ff77f271d02-7ff77f271d05 1405->1411 1409->1405 1409->1409 1414 7ff77f271d10-7ff77f271d22 1411->1414 1413->1399 1414->1401 1414->1414 1421 7ff77f271eba-7ff77f271ecd OutputDebugStringW 1415->1421 1422 7ff77f271e18-7ff77f271e2a 1415->1422 1416->1415 1417 7ff77f271d5a-7ff77f271d67 call 7ff77f287180 1416->1417 1417->1415 1425 7ff77f271ed3-7ff77f271ee4 call 7ff77f287180 1421->1425 1426 7ff77f271bf0-7ff77f271bf4 1421->1426 1423 7ff77f271e2c-7ff77f271e34 1422->1423 1424 7ff77f271e40-7ff77f271e5f 1422->1424 1427 7ff77f271e8c-7ff77f271e9d 1423->1427 1428 7ff77f271e60-7ff77f271e8a 1424->1428 1425->1426 1426->1386 1430 7ff77f271ea0-7ff77f271ea7 1427->1430 1428->1427 1428->1428 1430->1421 1432 7ff77f271ea9-7ff77f271eb8 1430->1432 1432->1421 1432->1430
                                                APIs
                                                Strings
                                                • NtProtectVirtualMemoryNtAllocateVirtualMemoryNtMapViewOfSectionNtUnmapViewOfSectionNtOpenFileLdrLoadDllEtwEventWriteFullEtwEventWriteEtwEventWriteTransferWDEnableMpWDEnableMpScanStartMpSampleSubmitMpAmsiNotifyMpSampleQueryMpAmsiScanMpThreatActionNtResumeThread, xrefs: 00007FF77F271434
                                                • RtlCaptureStackBackTraceLoadLibraryAGetProcAddressLdrGetDllHandleByMappingLdrRegisterDllNotificationVirtualAllocExVirtualFreeExNtCreateSectionFailed to encrypt function name, xrefs: 00007FF77F271B0B
                                                • NtGetContextThreadNtSetContextThreadNtCloseNtCreateThreadExNtCreateProcessExNtQueryInformationThreadGetProcessIdOfThreadWriteProcessMemoryReadProcessMemoryOpenProcessVirtualProtectExCloseHandleVirtualAllocVirtualProtectOpenThreadCreateToolhelp32SnapshotThread3, xrefs: 00007FF77F2715CC
                                                • FindFirstFileWFindNextFileWNtQueryDirectoryFileRegQueryValueExWNtEnumerateKeyGetAsyncKeyStateSetWindowsHookExWLogonUserWCredEnumerateWCreateProcessWNtQueryInformationProcessVirtualQueryExGetProcessIdNtOpenProcessNtWriteVirtualMemoryNtReadVirtualMemoryLoadLibra, xrefs: 00007FF77F271962
                                                • called `Result::unwrap()` on an `Err` value, xrefs: 00007FF77F271FD1
                                                • Thread32NextVirtualFreeWaitForSingleObjectTerminateThreadSuspendThreadResumeThreadIsWow64ProcessModule32FirstWModule32NextWGetCurrentProcessIdProcess32FirstWProcess32NextWZwOpenKeyZwCreateKeyZwSetValueKeyZwCloseCreateRemoteThreadNtQuerySystemInformationEnumPro, xrefs: 00007FF77F271787
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: memcpy$memset$DebugOutputString
                                                • String ID: FindFirstFileWFindNextFileWNtQueryDirectoryFileRegQueryValueExWNtEnumerateKeyGetAsyncKeyStateSetWindowsHookExWLogonUserWCredEnumerateWCreateProcessWNtQueryInformationProcessVirtualQueryExGetProcessIdNtOpenProcessNtWriteVirtualMemoryNtReadVirtualMemoryLoadLibra$NtGetContextThreadNtSetContextThreadNtCloseNtCreateThreadExNtCreateProcessExNtQueryInformationThreadGetProcessIdOfThreadWriteProcessMemoryReadProcessMemoryOpenProcessVirtualProtectExCloseHandleVirtualAllocVirtualProtectOpenThreadCreateToolhelp32SnapshotThread3$NtProtectVirtualMemoryNtAllocateVirtualMemoryNtMapViewOfSectionNtUnmapViewOfSectionNtOpenFileLdrLoadDllEtwEventWriteFullEtwEventWriteEtwEventWriteTransferWDEnableMpWDEnableMpScanStartMpSampleSubmitMpAmsiNotifyMpSampleQueryMpAmsiScanMpThreatActionNtResumeThread$RtlCaptureStackBackTraceLoadLibraryAGetProcAddressLdrGetDllHandleByMappingLdrRegisterDllNotificationVirtualAllocExVirtualFreeExNtCreateSectionFailed to encrypt function name$Thread32NextVirtualFreeWaitForSingleObjectTerminateThreadSuspendThreadResumeThreadIsWow64ProcessModule32FirstWModule32NextWGetCurrentProcessIdProcess32FirstWProcess32NextWZwOpenKeyZwCreateKeyZwSetValueKeyZwCloseCreateRemoteThreadNtQuerySystemInformationEnumPro$called `Result::unwrap()` on an `Err` value
                                                • API String ID: 4266836622-765071994
                                                • Opcode ID: 76b8e569af6638278fab27db6c566d5d26972542400520585b4389937b4ba085
                                                • Instruction ID: cb19ea1de553b0f120cf33b648832d6dd5234baed7353481dac8faeff8803ff1
                                                • Opcode Fuzzy Hash: 76b8e569af6638278fab27db6c566d5d26972542400520585b4389937b4ba085
                                                • Instruction Fuzzy Hash: A0720937625BD19AE790DF20E9943E973E4FB08344F904239CA9C477A5DF789264C3A2

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1487 7ff77f3c75d0-7ff77f3c75f6 1488 7ff77f3c76f6-7ff77f3c76fd call 7ff77f3b8770 1487->1488 1489 7ff77f3c75fc-7ff77f3c7623 1487->1489 1497 7ff77f3c7a1f-7ff77f3c7a2f 1488->1497 1491 7ff77f3c7625-7ff77f3c7633 1489->1491 1492 7ff77f3c764b-7ff77f3c7678 call 7ff77f282110 1489->1492 1494 7ff77f3c7635-7ff77f3c7646 1491->1494 1495 7ff77f3c767d-7ff77f3c7684 1491->1495 1492->1497 1498 7ff77f3c76d4-7ff77f3c76e5 1494->1498 1495->1488 1500 7ff77f3c7686-7ff77f3c76cc 1495->1500 1498->1488 1501 7ff77f3c76e7-7ff77f3c76f4 1498->1501 1500->1488 1502 7ff77f3c76ce-7ff77f3c76d1 1500->1502 1501->1488 1503 7ff77f3c7702-7ff77f3c771e call 7ff77f287170 1501->1503 1502->1498 1505 7ff77f3c7723-7ff77f3c7726 1503->1505 1506 7ff77f3c79b1-7ff77f3c79c0 call 7ff77f3b87c0 1505->1506 1507 7ff77f3c772c-7ff77f3c7769 memset 1505->1507 1506->1497 1509 7ff77f3c79c2-7ff77f3c79c5 1507->1509 1510 7ff77f3c776f-7ff77f3c779b 1507->1510 1512 7ff77f3c79c9-7ff77f3c79f2 1509->1512 1513 7ff77f3c77a0-7ff77f3c77a4 1510->1513 1512->1497 1514 7ff77f3c79f4-7ff77f3c7a02 1512->1514 1515 7ff77f3c77a6 1513->1515 1516 7ff77f3c77ce-7ff77f3c7912 1513->1516 1514->1497 1517 7ff77f3c7a04-7ff77f3c7a1c call 7ff77f287180 1514->1517 1518 7ff77f3c77b0-7ff77f3c77c9 1515->1518 1519 7ff77f3c7914-7ff77f3c7919 1516->1519 1520 7ff77f3c7937-7ff77f3c7945 1516->1520 1517->1497 1518->1518 1524 7ff77f3c77cb 1518->1524 1525 7ff77f3c7920-7ff77f3c7935 1519->1525 1521 7ff77f3c7997-7ff77f3c79a3 1520->1521 1522 7ff77f3c7947-7ff77f3c798f 1520->1522 1521->1522 1522->1513 1526 7ff77f3c7995-7ff77f3c79af 1522->1526 1524->1516 1525->1520 1525->1525 1526->1512
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: memset
                                                • String ID: arenegyl$modnarod$setybdet$uespemos
                                                • API String ID: 2221118986-66988881
                                                • Opcode ID: 333c48aee0c375d9738b59072ff09c0bbf247d2c6b355991c5dd74ba1001759a
                                                • Instruction ID: 7923dc49d0a416f4a4598f537b47c976380565ee8bb2ccd58b2019fcd7aae9a7
                                                • Opcode Fuzzy Hash: 333c48aee0c375d9738b59072ff09c0bbf247d2c6b355991c5dd74ba1001759a
                                                • Instruction Fuzzy Hash: F8A17A63F397D582EE50AF29A9013EAA651BB44BE4F885735DEAC1B7C0EE3CD141C240

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1564 7ff77f282840-7ff77f282872 1565 7ff77f282878-7ff77f2829ae 1564->1565 1566 7ff77f282af1-7ff77f282b00 call 7ff77f3c75d0 1564->1566 1568 7ff77f2829b0-7ff77f2829c9 1565->1568 1569 7ff77f282b05 1566->1569 1570 7ff77f2829cb-7ff77f2829e4 1568->1570 1571 7ff77f282a00-7ff77f282a09 1568->1571 1579 7ff77f282b0d-7ff77f282b20 1569->1579 1574 7ff77f2829e6-7ff77f2829f1 1570->1574 1575 7ff77f282a41-7ff77f282a65 1570->1575 1572 7ff77f282a0b-7ff77f282a20 1571->1572 1573 7ff77f282a23-7ff77f282a2f 1571->1573 1572->1573 1576 7ff77f282a67-7ff77f282a6f 1573->1576 1577 7ff77f282a31-7ff77f282a3c 1573->1577 1574->1570 1580 7ff77f2829f3 1574->1580 1578 7ff77f282adf-7ff77f282af0 1575->1578 1576->1579 1581 7ff77f282a75-7ff77f282adc 1576->1581 1577->1568 1579->1581 1580->1571 1581->1578
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: arenegyl$modnarod$setybdep$uespemos
                                                • API String ID: 0-169184043
                                                • Opcode ID: d3a3a3a2dcb38399c2718415e76c7566febd4564a237f2768a8621a5bcace649
                                                • Instruction ID: a8830e99a3c1413c6e6afbf0ffc189f68e556793aa4391a3d596e7ce27ae2f2c
                                                • Opcode Fuzzy Hash: d3a3a3a2dcb38399c2718415e76c7566febd4564a237f2768a8621a5bcace649
                                                • Instruction Fuzzy Hash: AA6166A3F24BD441FB119FB96421BFD6760A716B40F80A236DE5E67742EF3892D18240

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1591 7ff77f28a540-7ff77f28a551 1592 7ff77f28a5b2 1591->1592 1593 7ff77f28a553-7ff77f28a56d 1591->1593 1595 7ff77f28a5b4-7ff77f28a5c4 1592->1595 1594 7ff77f28a578-7ff77f28a59a BCryptGenRandom 1593->1594 1596 7ff77f28a570-7ff77f28a576 1594->1596 1597 7ff77f28a59c-7ff77f28a5a8 SystemFunction036 1594->1597 1596->1592 1596->1594 1597->1596 1598 7ff77f28a5aa-7ff77f28a5b0 1597->1598 1598->1595
                                                APIs
                                                • BCryptGenRandom.BCRYPT(?,00000000,?,00007FF77F28A2E5,?,?,?,00007FF77F3C803B), ref: 00007FF77F28A592
                                                • SystemFunction036.ADVAPI32(?,?,?,00007FF77F3C803B), ref: 00007FF77F28A5A3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: CryptFunction036RandomSystem
                                                • String ID:
                                                • API String ID: 1232939966-0
                                                • Opcode ID: 09b3e44f5736cbf6c52bb49e868fdc161e79365b81e76e47616611aeb4efcf1d
                                                • Instruction ID: d5ae027b88a5571838758228acdb25216fa39e35354d6f3b879e7f9c2204826a
                                                • Opcode Fuzzy Hash: 09b3e44f5736cbf6c52bb49e868fdc161e79365b81e76e47616611aeb4efcf1d
                                                • Instruction Fuzzy Hash: D1F0F953F3919521FAB169662F044B8D5902F16BF0DA44335AC3DD7BD0ED2C9CC34560

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1433 7ff77f3ae610-7ff77f3ae647 call 7ff77f3afa40 1436 7ff77f3ae653-7ff77f3ae686 call 7ff77f3b0400 1433->1436 1437 7ff77f3ae649-7ff77f3ae64e 1433->1437 1441 7ff77f3ae690-7ff77f3ae69a 1436->1441 1442 7ff77f3ae688-7ff77f3ae68b 1436->1442 1438 7ff77f3ae827-7ff77f3ae836 1437->1438 1443 7ff77f3ae6a2-7ff77f3ae6a4 1441->1443 1444 7ff77f3ae69c-7ff77f3ae69e 1441->1444 1442->1438 1446 7ff77f3ae6a6-7ff77f3ae6aa 1443->1446 1447 7ff77f3ae701-7ff77f3ae705 1443->1447 1445 7ff77f3ae6a0 1444->1445 1444->1446 1448 7ff77f3ae6b6-7ff77f3ae6bf 1445->1448 1446->1448 1449 7ff77f3ae6ac-7ff77f3ae6b0 1446->1449 1450 7ff77f3ae7f9-7ff77f3ae806 1447->1450 1451 7ff77f3ae70b-7ff77f3ae70f 1447->1451 1453 7ff77f3ae6c1-7ff77f3ae6ca 1448->1453 1454 7ff77f3ae6d6-7ff77f3ae6d9 1448->1454 1449->1448 1449->1450 1450->1438 1452 7ff77f3ae808-7ff77f3ae822 call 7ff77f287180 1450->1452 1451->1450 1455 7ff77f3ae715-7ff77f3ae719 1451->1455 1452->1438 1457 7ff77f3ae6db-7ff77f3ae6e4 1453->1457 1458 7ff77f3ae6cc-7ff77f3ae6cf 1453->1458 1454->1457 1459 7ff77f3ae720-7ff77f3ae730 1454->1459 1455->1448 1460 7ff77f3ae71b 1455->1460 1461 7ff77f3ae6d1-7ff77f3ae6d4 1457->1461 1464 7ff77f3ae6e6-7ff77f3ae6ea 1457->1464 1458->1461 1458->1464 1459->1461 1462 7ff77f3ae732 1459->1462 1460->1450 1465 7ff77f3ae750-7ff77f3ae789 CreateFileW 1461->1465 1462->1464 1466 7ff77f3ae734-7ff77f3ae736 1464->1466 1467 7ff77f3ae6ec-7ff77f3ae6ff 1464->1467 1470 7ff77f3ae78f-7ff77f3ae796 1465->1470 1471 7ff77f3ae837-7ff77f3ae850 GetLastError 1465->1471 1468 7ff77f3ae743-7ff77f3ae745 1466->1468 1469 7ff77f3ae738-7ff77f3ae73f 1466->1469 1467->1465 1468->1450 1473 7ff77f3ae74b 1468->1473 1472 7ff77f3ae741 1469->1472 1469->1473 1476 7ff77f3ae7d3-7ff77f3ae7d8 1470->1476 1477 7ff77f3ae798-7ff77f3ae79c 1470->1477 1474 7ff77f3ae852 1471->1474 1475 7ff77f3ae7da-7ff77f3ae7f1 call 7ff77f287180 1471->1475 1472->1465 1473->1465 1478 7ff77f3ae7f4-7ff77f3ae7f7 1474->1478 1475->1478 1476->1475 1476->1478 1477->1476 1479 7ff77f3ae79e-7ff77f3ae7a9 GetLastError 1477->1479 1478->1438 1479->1476 1481 7ff77f3ae7ab-7ff77f3ae7cd SetFileInformationByHandle 1479->1481 1481->1476 1483 7ff77f3ae854-7ff77f3ae871 GetLastError CloseHandle 1481->1483 1484 7ff77f3ae873-7ff77f3ae882 call 7ff77f287180 1483->1484 1485 7ff77f3ae887-7ff77f3ae88f 1483->1485 1484->1485 1485->1438
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: ErrorLast$CloseHandle
                                                • String ID:
                                                • API String ID: 3463825546-0
                                                • Opcode ID: 8efddf8352c11683786f43e34f675905c85799a9b40432ea1239b55e5a419284
                                                • Instruction ID: c954394961cc28fd8287111afd3f7069d6eae6eeb73c32a31eaea0041232e093
                                                • Opcode Fuzzy Hash: 8efddf8352c11683786f43e34f675905c85799a9b40432ea1239b55e5a419284
                                                • Instruction Fuzzy Hash: 7171F593E392D245F725AB23C6003FD96906B00B98F944639ED5D0F7C8DE2DE485C3A2

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1529 7ff77f2729a0-7ff77f2729f9 call 7ff77f280350 1532 7ff77f272ce8-7ff77f272d4e call 7ff77f3ce670 1529->1532 1533 7ff77f2729ff-7ff77f272b2d call 7ff77f3b8b10 memset 1529->1533 1538 7ff77f272d62-7ff77f272d6b 1532->1538 1539 7ff77f272d50-7ff77f272d5d call 7ff77f287180 1532->1539 1540 7ff77f272bda-7ff77f272bee OutputDebugStringW 1533->1540 1541 7ff77f272b33-7ff77f272b45 1533->1541 1539->1538 1542 7ff77f272c01-7ff77f272c12 1540->1542 1543 7ff77f272bf0-7ff77f272bfc call 7ff77f287180 1540->1543 1545 7ff77f272b47-7ff77f272b4f 1541->1545 1546 7ff77f272b51-7ff77f272b74 1541->1546 1550 7ff77f272c27-7ff77f272c29 1542->1550 1551 7ff77f272c14-7ff77f272c1e 1542->1551 1543->1542 1547 7ff77f272bac-7ff77f272bbd 1545->1547 1548 7ff77f272b80-7ff77f272baa 1546->1548 1552 7ff77f272bc0-7ff77f272bc7 1547->1552 1548->1547 1548->1548 1555 7ff77f272cc3-7ff77f272ccd 1550->1555 1553 7ff77f272c2e-7ff77f272c37 1551->1553 1554 7ff77f272c20-7ff77f272c25 1551->1554 1552->1540 1558 7ff77f272bc9-7ff77f272bd8 1552->1558 1560 7ff77f272c40-7ff77f272c9f 1553->1560 1559 7ff77f272ca1-7ff77f272ca4 1554->1559 1556 7ff77f272cda-7ff77f272ce7 1555->1556 1557 7ff77f272ccf-7ff77f272cd5 call 7ff77f287180 1555->1557 1557->1556 1558->1540 1558->1552 1559->1555 1562 7ff77f272ca6-7ff77f272ca9 1559->1562 1560->1559 1560->1560 1563 7ff77f272cb0-7ff77f272cc1 1562->1563 1563->1555 1563->1563
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: memcpy$memset$DebugOutputString
                                                • String ID: Failed to encrypt function name
                                                • API String ID: 4266836622-2980051713
                                                • Opcode ID: b348f280c5886deb7e48c2e36410535b2abb1551aa32bfeabb5d045953f7ee87
                                                • Instruction ID: 6d6e74a329fee19f4ace2e0b1af932d2a588986c7d8a33a9b2fe4e19a47d1c3f
                                                • Opcode Fuzzy Hash: b348f280c5886deb7e48c2e36410535b2abb1551aa32bfeabb5d045953f7ee87
                                                • Instruction Fuzzy Hash: E7A1AF73A25BD188EB309F64E9447ECA760FB55758F844239CE5C1BB96DF389290C3A0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1582 7ff77f281f30-7ff77f281f64 memset 1583 7ff77f28200a-7ff77f282026 OutputDebugStringW 1582->1583 1584 7ff77f281f6a-7ff77f281f7c 1582->1584 1585 7ff77f281f7e-7ff77f281f86 1584->1585 1586 7ff77f281f88-7ff77f281fab 1584->1586 1587 7ff77f281fdc-7ff77f281fea 1585->1587 1588 7ff77f281fb0-7ff77f281fda 1586->1588 1589 7ff77f281ff0-7ff77f281ff7 1587->1589 1588->1587 1588->1588 1589->1583 1590 7ff77f281ff9-7ff77f282008 1589->1590 1590->1583 1590->1589
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset
                                                • String ID:
                                                • API String ID: 1084755268-0
                                                • Opcode ID: 67ef5dd357d15a1dcb9c2e08edcff321ef5026d28fd8d0dbfb41511f0c2045b1
                                                • Instruction ID: 69361a85100a41ba892c999c97cd3016f0d50ff1c87ba9be72345ebe0bab359c
                                                • Opcode Fuzzy Hash: 67ef5dd357d15a1dcb9c2e08edcff321ef5026d28fd8d0dbfb41511f0c2045b1
                                                • Instruction Fuzzy Hash: 91212523F38B9541EB209724E2147F9D221DBA6BD4F908335DA0E53E86EF2CC281C340
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 313767242-0
                                                • Opcode ID: 8745213f7d6b4e2c50662f10c742a2452402f125df25e8b282aabba76ecda086
                                                • Instruction ID: 471bd777c540ddbc4efd681eaff4640167de16f2d6252aa465e0b56a3af45e03
                                                • Opcode Fuzzy Hash: 8745213f7d6b4e2c50662f10c742a2452402f125df25e8b282aabba76ecda086
                                                • Instruction Fuzzy Hash: D7314D77629BC196EB60AF60E8503E9B364FB84744F84403ADA4E4BB99DF3CD548C760
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: memset
                                                • String ID: arenegyl$modnarod$setybdet$uespemos
                                                • API String ID: 2221118986-66988881
                                                • Opcode ID: 728142e8e2970c6ba44d183973f26f4e9c6d697a9647189725bccb5cc7e268d6
                                                • Instruction ID: 8866789941b772f7d26029d6f0148607f440c0c84b374477661757435f5db963
                                                • Opcode Fuzzy Hash: 728142e8e2970c6ba44d183973f26f4e9c6d697a9647189725bccb5cc7e268d6
                                                • Instruction Fuzzy Hash: C6A17963F387D546EE50AF2969013EAA651BB01BE4F889735DE6C1B7C0DE3CD641D280
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: memcpy
                                                • String ID:
                                                • API String ID: 3510742995-0
                                                • Opcode ID: 79c63f571dbc3c8831889e71356e300775830c649b71818e34f02a6ee0ea6d7f
                                                • Instruction ID: dbf57e6fc9de9ab79f442e23190ace83fd61b4e6dc8ca5cfc114c493fb1128af
                                                • Opcode Fuzzy Hash: 79c63f571dbc3c8831889e71356e300775830c649b71818e34f02a6ee0ea6d7f
                                                • Instruction Fuzzy Hash: 2E620123E396D599FB009F6486112FD7B60B712394F848639EA5D5FBC9CE38D202D3A0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                • String ID:
                                                • API String ID: 2933794660-0
                                                • Opcode ID: ff25dcc44865ea34b32b2618dd31330cffb52958c3071c833476b0f9568d8c1c
                                                • Instruction ID: d418c6d5229c81f514cdbbf80d3ca388a1a313d114e33e126d21a5a4f6a08489
                                                • Opcode Fuzzy Hash: ff25dcc44865ea34b32b2618dd31330cffb52958c3071c833476b0f9568d8c1c
                                                • Instruction Fuzzy Hash: 6F114826B24B468AEB00EF60E8542E873A4FB18758F840E35EA6D467A4DF78D154C3A0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: arenegyl$modnarod$setybdep$uespemos
                                                • API String ID: 0-169184043
                                                • Opcode ID: 6e3ec2c061a3bf1c7ccbfb7469478ffd4f1396b04d5f5e4f025989c382b900a5
                                                • Instruction ID: a811b2bdf6c083ecadca8ffa7988f377a942c3fa3d28a686a0e52757bb4e5e7e
                                                • Opcode Fuzzy Hash: 6e3ec2c061a3bf1c7ccbfb7469478ffd4f1396b04d5f5e4f025989c382b900a5
                                                • Instruction Fuzzy Hash: 0151CE43F357B602F2506FFA2941FE959605B517A0F959332ED2DA33C2E634CE438240
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Authenti$GenuineI$HygonGen
                                                • API String ID: 0-696657513
                                                • Opcode ID: 654960ae5cda296775294fbba477f0891d990b943c9a96b7ac212b37618d2a47
                                                • Instruction ID: 64b9aaf66a397657f67f16be60aa8521f9c3d8999a01da626ab1d54a2f0d8a5b
                                                • Opcode Fuzzy Hash: 654960ae5cda296775294fbba477f0891d990b943c9a96b7ac212b37618d2a47
                                                • Instruction Fuzzy Hash: 0AB14BA3B34AA102FB198A56BD12BB94991B358BC8F44743CED2F5BBC0C97CDA10C251
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: memcpymemset
                                                • String ID:
                                                • API String ID: 1297977491-0
                                                • Opcode ID: 7d63481b8d0adee69df8c2899966701fec96d6c5c45c550d2cff00693c029116
                                                • Instruction ID: 7d0633f41d13fe81dc4a19924702a782d7ab10667e4006efc52bcd0d7204e17e
                                                • Opcode Fuzzy Hash: 7d63481b8d0adee69df8c2899966701fec96d6c5c45c550d2cff00693c029116
                                                • Instruction Fuzzy Hash: 17126266D28FD941E223973968027FBAB10AFFB348E11D31BFED831E45DB1CA2419654
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 33333333$UUUUUUUU
                                                • API String ID: 0-3483174168
                                                • Opcode ID: 6d505fe06a640d61b02402825a2461e40bf8e669080e70b9912d661a04f34dee
                                                • Instruction ID: 3a81f71bb059842e67eaceedc94535e03550869ade922beb697c2acde78d5c9a
                                                • Opcode Fuzzy Hash: 6d505fe06a640d61b02402825a2461e40bf8e669080e70b9912d661a04f34dee
                                                • Instruction Fuzzy Hash: 0591E843B681F003F7624B7D1D66566EFA25545BD370DF152EEE423A86C038CC2AE3A5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 33333333$UUUUUUUU
                                                • API String ID: 0-3483174168
                                                • Opcode ID: 183f695743fe3891df1df97a016f23e840c64c4589e162bad8aa64fca70fc80d
                                                • Instruction ID: 0f8bec32a5713e29220c994287e2471ec9503f957c585ffdc4d845ef937708d5
                                                • Opcode Fuzzy Hash: 183f695743fe3891df1df97a016f23e840c64c4589e162bad8aa64fca70fc80d
                                                • Instruction Fuzzy Hash: 6691DA4375A3D48FAB52CB7E194498A6E90E12AFC835CF069CE8D27322D436D557C392
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: memcpy
                                                • String ID:
                                                • API String ID: 3510742995-0
                                                • Opcode ID: 996e0b7a46e8e94b71c362dcf6d28f2d824f547cfedb1d96f07a8217ce0343f1
                                                • Instruction ID: 43586173b0aca2827e127e44b2ccca724f242a78406e994dd73732a8df11ca44
                                                • Opcode Fuzzy Hash: 996e0b7a46e8e94b71c362dcf6d28f2d824f547cfedb1d96f07a8217ce0343f1
                                                • Instruction Fuzzy Hash: EA617D13B3D29246FB645656D6013FEAA90EB50B94F808036EE9F877C5DD7CD841E3A0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0123456789abcdefBorrowMutErroralready borrowed:
                                                • API String ID: 0-1320686809
                                                • Opcode ID: 84ab44d5a387553b4938d342cc78a884da54c60f52198ad7b8f1699f6584a0ce
                                                • Instruction ID: bcd6126b6af5a7b171c875706fe874c4a79287384d11f6209a2aa687e9a49391
                                                • Opcode Fuzzy Hash: 84ab44d5a387553b4938d342cc78a884da54c60f52198ad7b8f1699f6584a0ce
                                                • Instruction Fuzzy Hash: 14514E67F396E09EE32197789400EAC7F619B16B48F498198CFD81BF86C716C115E3A2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 598c16afa96d8262152d039735b341cfee2ebed0c0e29c9f49e5660d8555f291
                                                • Instruction ID: 11eaca3197f5aca5bc35c54e0fa1e0519c038ff98d2111b24fcc7d45e6a16d5f
                                                • Opcode Fuzzy Hash: 598c16afa96d8262152d039735b341cfee2ebed0c0e29c9f49e5660d8555f291
                                                • Instruction Fuzzy Hash: FAF1E262628BC481E6129B6AB4156A7E760FFDD7D4F45A212FFCC67B18DF38D2818700
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f2ef7aec3600bbfcb9c5f9824adc18a62e41e504a40185dcee5d5d7c69adf09a
                                                • Instruction ID: 0d16e04a6deabb447dbb2d6e78f52d62e1a79b71a99bf569bc2f70b70b9e9a6a
                                                • Opcode Fuzzy Hash: f2ef7aec3600bbfcb9c5f9824adc18a62e41e504a40185dcee5d5d7c69adf09a
                                                • Instruction Fuzzy Hash: 91E19A93F39BD601F723573955022F4A6006FA37E4A41D33BFDA975FD1DB29A282A210
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e6ed2ed2d41d172d5e521b0bc9796a526102128f06c73e2b0b42637fadbcbc99
                                                • Instruction ID: 5cdd1e0dd569089b754c886a1ee7557370970b41f6855e9031975caba0032483
                                                • Opcode Fuzzy Hash: e6ed2ed2d41d172d5e521b0bc9796a526102128f06c73e2b0b42637fadbcbc99
                                                • Instruction Fuzzy Hash: 46C159D3D3C2D245F7259A649624FFAFA8157037A0FD44339CA6E1F2D0CA3C999683A0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cd73b77d88cbaa3362a7e2c3f7f78d13480b9262cbc9493330d34446c0daa906
                                                • Instruction ID: 1609361dacfe76658450eedc558e616874850d8a72ecbe87538dec9997b905a6
                                                • Opcode Fuzzy Hash: cd73b77d88cbaa3362a7e2c3f7f78d13480b9262cbc9493330d34446c0daa906
                                                • Instruction Fuzzy Hash: 8DD1B522528BD482F2129B7DA5466EBE361FFD9394F54A311FFC826A14EF38E1C58740
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3a69eea9a13356feb155724af7f67ed3d6bd19628aa607d2d84c67b1913c863b
                                                • Instruction ID: 3593d2d230bbbbe0a3ee5c6b4de86c4cdcc3fa5b86a848bec07d7bb153ea84f5
                                                • Opcode Fuzzy Hash: 3a69eea9a13356feb155724af7f67ed3d6bd19628aa607d2d84c67b1913c863b
                                                • Instruction Fuzzy Hash: D2A14573F386E245E7589B51DA007BEAAA0FB44798F808135CE5D47BC4DF7C9891A3A0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a7129c2044a4066c2b7ac891e204a05a9f8a1a369dd49303d74f275ccfacac7a
                                                • Instruction ID: b2a159256a48b2153bd6eb00f8a47fb1eaf96f4efb1d62f8c7ff967ae059ac33
                                                • Opcode Fuzzy Hash: a7129c2044a4066c2b7ac891e204a05a9f8a1a369dd49303d74f275ccfacac7a
                                                • Instruction Fuzzy Hash: DCC14D62D19FC542E723A739A4032E6E310FFEA384F00D312FEC47596AEB69E2459650
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 380a28b1284d3b5de317376214c4cd0c2af0c8cb7462fee5ca57956e2f3eb5a3
                                                • Instruction ID: 2542ae72c4ccfa20196c65beb1892f13c0bd88adc0b991ce806802190909264d
                                                • Opcode Fuzzy Hash: 380a28b1284d3b5de317376214c4cd0c2af0c8cb7462fee5ca57956e2f3eb5a3
                                                • Instruction Fuzzy Hash: 6971A3A3754B64867A04CFF2A830897E7A5F359FC4B19B425AF8D27F18CA3CC552D640
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d7a788f7292fd4788cab6207b2dc06872d800ef6f919a4b74aed6206f18ec534
                                                • Instruction ID: d7c0ebfd299afa49ffb587958d50114989d2ef9f5137dfdcfaa612a8634d413d
                                                • Opcode Fuzzy Hash: d7a788f7292fd4788cab6207b2dc06872d800ef6f919a4b74aed6206f18ec534
                                                • Instruction Fuzzy Hash: 7761C1A3F764B653B642AEB29A139F86E10F724BD2303A532DD1A23740D974ED4FC215
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a3256a58cefda9578d56b153ee82752c2204cf8fe932200ddfb774220a9d814a
                                                • Instruction ID: d416797be00467981505a8bf5a77a3e2a1a5905893b636c8e13afd6d057c9589
                                                • Opcode Fuzzy Hash: a3256a58cefda9578d56b153ee82752c2204cf8fe932200ddfb774220a9d814a
                                                • Instruction Fuzzy Hash: 176173A3315BA4427A04CFF2BD3199BABA5F649BD8B00F435EE8D57B1CDA3CC4518640
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 41bfcae9249feb45ba5921936108771e8104ded74a652319d0698d82a72a5035
                                                • Instruction ID: 457270f5b50bb61aa528683f3fab3dfe895481d90fd9d043ceb4ef80d636bc9e
                                                • Opcode Fuzzy Hash: 41bfcae9249feb45ba5921936108771e8104ded74a652319d0698d82a72a5035
                                                • Instruction Fuzzy Hash: 0C51EB63729B14456A40CFE2BD609AB6690B758BD4F49B436FE4DA7709CE3CCB829240
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 849cd771e45404d99458ecd955205f03c5870352a694daaca452c19371504387
                                                • Instruction ID: ac863f4bedc9bddaddae5922fc041a548a0128ccda551c0194af9db404a13d21
                                                • Opcode Fuzzy Hash: 849cd771e45404d99458ecd955205f03c5870352a694daaca452c19371504387
                                                • Instruction Fuzzy Hash: 35511963725B24456A40DFF2BD609AB6650B76CFD4F49B422FE8CA7705CE3CCB869240
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bf3b7243f16a7dbeaf2c2f06039de3b540773d5dc7a4c4ddd3130ba9f9e2f708
                                                • Instruction ID: 031cdd25f8197c5c57da5a8c2ab3e41862ac2129b1330e0fbd5ef58862bbe5cf
                                                • Opcode Fuzzy Hash: bf3b7243f16a7dbeaf2c2f06039de3b540773d5dc7a4c4ddd3130ba9f9e2f708
                                                • Instruction Fuzzy Hash: 6751DAF3726A10425E45CFA2BC249B69652FA1CBD4F40D431DF1D97B09CE3CCA529340
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d32b4f0250f275c4414780030e56db43d35e46ec81cb0fb15e780e9e21dcdb7a
                                                • Instruction ID: c06ad373f088eac6773fd2505e3dcc1f82ea758196c565d403a05ddc2eec12b5
                                                • Opcode Fuzzy Hash: d32b4f0250f275c4414780030e56db43d35e46ec81cb0fb15e780e9e21dcdb7a
                                                • Instruction Fuzzy Hash: 2951D6F3725A10526E45CFA3BC24AB69652BB1CFD4F40E421DE0D9BB1ACE3CCA569340
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f3c87b679cd6303b04bf0a0a6204f790937da05826dcce1b24d56ee785f14123
                                                • Instruction ID: 483b6cafddcb58c2d63febc22e83b766fe4bb801c7eb542a8cf0cfa7ab332378
                                                • Opcode Fuzzy Hash: f3c87b679cd6303b04bf0a0a6204f790937da05826dcce1b24d56ee785f14123
                                                • Instruction Fuzzy Hash: FB41F163719A24827E58EFE2BE71877A651B75CBD0F48B436EE4E97704CE3CC5828240
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: ErrorLast$FullNamePathmemcpy
                                                • String ID: \\?\$\\?\UNC\$internal error: entered unreachable code/rustc/a4cb3c831823d9baa56c3d90514b75b2660116fa\library\alloc\src\vec\mod.rs
                                                • API String ID: 674145353-264738257
                                                • Opcode ID: 77acacb908521a9ed3e6d8bfb9aeec6658ac720f1b34805cbd793a03fbc53f77
                                                • Instruction ID: 0c4e5e856660b892c762f5f2734a57f6ec546da795bbb5da86c2c5b6ed01481e
                                                • Opcode Fuzzy Hash: 77acacb908521a9ed3e6d8bfb9aeec6658ac720f1b34805cbd793a03fbc53f77
                                                • Instruction Fuzzy Hash: 2A0291A3A386C285EB70AB15D6647F8B294FB05B94F90453ACA5D4F6C4DF3CD68183A0
                                                APIs
                                                Strings
                                                • a Display implementation returned an error unexpectedlyC:\Users\Harrison\.rustup\toolchains\nightly-x86_64-pc-windows-msvc\lib/rustlib/src/rust\library\alloc\src\string.rs, xrefs: 00007FF77F28095A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: memcpy$memset$DebugOutputString
                                                • String ID: a Display implementation returned an error unexpectedlyC:\Users\Harrison\.rustup\toolchains\nightly-x86_64-pc-windows-msvc\lib/rustlib/src/rust\library\alloc\src\string.rs
                                                • API String ID: 4266836622-2517649730
                                                • Opcode ID: f5baf9b262cd7c3996c99b447cd7070bfb517444d71a6876e1e3b78250226d46
                                                • Instruction ID: fb2d7800b22c519f8144ac81d1617f8bee7b4b8e3a7481d4f3c50a8537363cd1
                                                • Opcode Fuzzy Hash: f5baf9b262cd7c3996c99b447cd7070bfb517444d71a6876e1e3b78250226d46
                                                • Instruction Fuzzy Hash: FEF19F23A29BC189E771EF21D9007E9A764FB45788F804235DE9D4AB8ADF7C9344C390
                                                APIs
                                                Strings
                                                • a Display implementation returned an error unexpectedlyC:\Users\Harrison\.rustup\toolchains\nightly-x86_64-pc-windows-msvc\lib/rustlib/src/rust\library\alloc\src\string.rs, xrefs: 00007FF77F281016
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: memcpy$memset$DebugOutputString
                                                • String ID: a Display implementation returned an error unexpectedlyC:\Users\Harrison\.rustup\toolchains\nightly-x86_64-pc-windows-msvc\lib/rustlib/src/rust\library\alloc\src\string.rs
                                                • API String ID: 4266836622-2517649730
                                                • Opcode ID: 425e1724d133e2ec7e279fd8d60a19e56e9033bf2287769287046628edb2ce81
                                                • Instruction ID: 98f00a4a9902f9bc90035daf954a852e0690ad0782b92ef474e1e9964737c53e
                                                • Opcode Fuzzy Hash: 425e1724d133e2ec7e279fd8d60a19e56e9033bf2287769287046628edb2ce81
                                                • Instruction Fuzzy Hash: 5EE19023A29BC189E721AF21D9507E9A7A4FB44788F844135DE4D4BB86DF7CE245C390
                                                APIs
                                                Strings
                                                • internal error: entered unreachable code/rustc/a4cb3c831823d9baa56c3d90514b75b2660116fa\library\alloc\src\vec\mod.rs, xrefs: 00007FF77F3A8650
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1804231894.00007FF77F271000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77F270000, based on PE: true
                                                • Associated: 00000000.00000002.1804199669.00007FF77F270000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F3CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804530098.00007FF77F53E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804915553.00007FF77F57D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1804941046.00007FF77F57E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff77f270000_dropper.jbxd
                                                Similarity
                                                • API ID: ErrorLast$EnvironmentVariable
                                                • String ID: internal error: entered unreachable code/rustc/a4cb3c831823d9baa56c3d90514b75b2660116fa\library\alloc\src\vec\mod.rs
                                                • API String ID: 2691138088-1438511490
                                                • Opcode ID: addffc18b8a93bd66e0cf4003a8abbe35d65d7120eeb9bc914e481debd4820ef
                                                • Instruction ID: 2eedf5cc6190afc4241206ba873967ab5e4c025f7e699709fa0a8b833403121f
                                                • Opcode Fuzzy Hash: addffc18b8a93bd66e0cf4003a8abbe35d65d7120eeb9bc914e481debd4820ef
                                                • Instruction Fuzzy Hash: ABA1A063B25AC584EB70AF26D9443E9A364FB44B98F448139DE1C4F799DF38D28183A0

                                                Execution Graph

                                                Execution Coverage:6.8%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:6.7%
                                                Total number of Nodes:404
                                                Total number of Limit Nodes:64
                                                execution_graph 10769 7ffe99ad1350 10770 7ffe99ad13b7 10769->10770 10771 7ffe99ad1f68 10769->10771 10773 7ffe99ad1f54 10770->10773 10783 7ffe99ad13cf 10770->10783 10829 7ffe99b09de0 10771->10829 10815 7ffe99b0a1d0 10773->10815 10776 7ffe99ad1f39 10778 7ffe99ad209e 10780 7ffe99ad1ee9 10780->10776 10820 7ffe99b0a300 10780->10820 10781 7ffe99ad1fbe 10837 7ffe99ae3140 10781->10837 10783->10780 10783->10781 10784 7ffe99ad1dda memset 10783->10784 10785 7ffe99ad1eba OutputDebugStringW 10783->10785 10786 7ffe99ae0f60 10783->10786 10811 7ffe99ae7860 10783->10811 10784->10783 10784->10785 10785->10783 10846 7ffe99b01dd0 10786->10846 10788 7ffe99ae10ab memset 10789 7ffe99ae119a OutputDebugStringW 10788->10789 10790 7ffe99ae10e6 10788->10790 10791 7ffe99ae11bd 10789->10791 10790->10789 10792 7ffe99ae1209 10791->10792 10795 7ffe99ae1292 10791->10795 10808 7ffe99ae121a 10791->10808 10848 7ffe99aec290 memset 10792->10848 10794 7ffe99ae1215 10796 7ffe99ae12dd memcpy 10794->10796 10797 7ffe99ae12b0 memcpy memcpy 10795->10797 10798 7ffe99ae130e 10796->10798 10796->10808 10797->10796 10799 7ffe99ae135c memcpy memcpy 10798->10799 10798->10808 10800 7ffe99ae13a3 10799->10800 10801 7ffe99ae13b2 memcpy memset 10799->10801 10802 7ffe99ae1642 memset 10800->10802 10804 7ffe99ae1453 10801->10804 10803 7ffe99ae173a OutputDebugStringW 10802->10803 10806 7ffe99ae1684 10802->10806 10803->10808 10804->10800 10805 7ffe99ae14ae 10804->10805 10807 7ffe99ae1568 memset 10805->10807 10806->10803 10809 7ffe99ae18aa OutputDebugStringW 10807->10809 10810 7ffe99ae15aa 10807->10810 10808->10783 10809->10808 10810->10809 10812 7ffe99ae7b11 10811->10812 10814 7ffe99ae7898 10811->10814 10851 7ffe99b08af0 10812->10851 10814->10783 10816 7ffe99b0a1f9 10815->10816 10817 7ffe99b0a2ed 10816->10817 10818 7ffe99b0a286 WaitOnAddress 10816->10818 10817->10780 10818->10816 10819 7ffe99b0a2a3 GetLastError 10818->10819 10819->10816 10821 7ffe99b0a317 10820->10821 10822 7ffe99b0a3a9 10820->10822 10823 7ffe99b0a33f 10821->10823 10824 7ffe99b0a32a WakeByAddressSingle 10821->10824 10825 7ffe99b0a35e 10823->10825 10826 7ffe99b0a349 10823->10826 10827 7ffe99b0a370 WakeByAddressSingle 10823->10827 10825->10776 10826->10825 10828 7ffe99b0a394 WakeByAddressAll 10826->10828 10827->10825 10827->10828 10828->10825 10830 7ffe99b09ed4 10829->10830 10833 7ffe99b09e0d 10829->10833 10831 7ffe99b09e8e 10832 7ffe99b09ec2 10831->10832 10836 7ffe99b09ebc WakeByAddressAll 10831->10836 10832->10783 10833->10831 10833->10832 10834 7ffe99b09e65 WaitOnAddress 10833->10834 10834->10833 10835 7ffe99b09e82 GetLastError 10834->10835 10835->10833 10836->10832 10838 7ffe99ae3151 10837->10838 10839 7ffe99ae317a 10838->10839 10840 7ffe99b0a33f 10838->10840 10841 7ffe99b0a32a WakeByAddressSingle 10838->10841 10839->10778 10842 7ffe99b0a349 10840->10842 10843 7ffe99b0a35e 10840->10843 10844 7ffe99b0a370 WakeByAddressSingle 10840->10844 10842->10843 10845 7ffe99b0a394 WakeByAddressAll 10842->10845 10843->10778 10844->10843 10844->10845 10845->10843 10847 7ffe99b01dfa 10846->10847 10847->10788 10849 7ffe99aec2f7 10848->10849 10850 7ffe99aec7ae memcpy 10849->10850 10850->10794 10852 7ffe99b08b1c 10851->10852 10857 7ffe99b08b8e 10851->10857 10853 7ffe99b08b6b 10852->10853 10855 7ffe99b08b45 10852->10855 10858 7ffe99ae03f0 10853->10858 10856 7ffe99b08c4c memset 10855->10856 10855->10857 10856->10857 10857->10814 10860 7ffe99ae0442 10858->10860 10859 7ffe99ae0846 memcpy 10861 7ffe99ae04dc 10859->10861 10860->10859 10860->10861 10861->10857 10862 7ffe99ada350 10866 7ffe99ada38c 10862->10866 10863 7ffe99ada3ae 10864 7ffe99ada3f5 memcpy 10864->10863 10866->10863 10866->10864 10867 7ffe99ada490 10866->10867 10868 7ffe99ada55a memset 10867->10868 10869 7ffe99ada64a OutputDebugStringW 10868->10869 10870 7ffe99ada595 10868->10870 10871 7ffe99ada66d 10869->10871 10870->10869 10872 7ffe99ada761 memset 10871->10872 10873 7ffe99ada85a OutputDebugStringW 10872->10873 10876 7ffe99ada7a3 10872->10876 10874 7ffe99ada88b 10873->10874 10970 7ffe99ad29a0 10874->10970 10876->10873 10877 7ffe99ada8bd 10978 7ffe99ad52d0 10877->10978 10879 7ffe99ada8d2 10880 7ffe99adaa80 10879->10880 10882 7ffe99ada958 memset 10879->10882 10881 7ffe99ad29a0 17 API calls 10880->10881 10969 7ffe99adaa87 10880->10969 10883 7ffe99adaab8 10881->10883 10884 7ffe99adaa4a OutputDebugStringW 10882->10884 10890 7ffe99ada993 10882->10890 10885 7ffe99ad52d0 84 API calls 10883->10885 10887 7ffe99adaa6d 10884->10887 10886 7ffe99adaacd 10885->10886 10888 7ffe99adac80 10886->10888 10892 7ffe99adab5c memset 10886->10892 11044 7ffe99ae7da0 GetLastError 10887->11044 10891 7ffe99ad29a0 17 API calls 10888->10891 10888->10969 10890->10884 10893 7ffe99adacc3 10891->10893 10894 7ffe99adac4a OutputDebugStringW 10892->10894 10900 7ffe99adab97 10892->10900 10895 7ffe99ad52d0 84 API calls 10893->10895 10896 7ffe99adac6d 10894->10896 10897 7ffe99adacd8 10895->10897 11045 7ffe99ae7da0 GetLastError 10896->11045 10899 7ffe99adae80 10897->10899 10902 7ffe99adad5e memset 10897->10902 10901 7ffe99ad29a0 17 API calls 10899->10901 10899->10969 10900->10894 10903 7ffe99adaeb8 10901->10903 10905 7ffe99adae4a OutputDebugStringW 10902->10905 10909 7ffe99adad99 10902->10909 10904 7ffe99ad52d0 84 API calls 10903->10904 10906 7ffe99adaecd 10904->10906 10907 7ffe99adae6d 10905->10907 10910 7ffe99adaf53 memset 10906->10910 10915 7ffe99adb070 10906->10915 11046 7ffe99ae7da0 GetLastError 10907->11046 10909->10905 10911 7ffe99adb03a OutputDebugStringW 10910->10911 10914 7ffe99adaf8e 10910->10914 10912 7ffe99adb05d 10911->10912 11047 7ffe99ae7da0 GetLastError 10912->11047 10914->10911 10916 7ffe99adb21d memset 10915->10916 10915->10969 10917 7ffe99adb30a OutputDebugStringW 10916->10917 10922 7ffe99adb25f 10916->10922 10918 7ffe99adb33a NtOpenFile 10917->10918 10919 7ffe99adb329 10917->10919 10920 7ffe99adb4d7 10918->10920 10921 7ffe99adb372 10918->10921 10919->10918 10924 7ffe99adb543 memset 10920->10924 10923 7ffe99adb470 memset 10921->10923 10922->10917 10925 7ffe99adb63a OutputDebugStringW 10923->10925 10930 7ffe99adb4b2 10923->10930 10926 7ffe99adb7fa OutputDebugStringW 10924->10926 10928 7ffe99adb585 10924->10928 10931 7ffe99adb656 10925->10931 10927 7ffe99adb819 10926->10927 10929 7ffe99adb82f NtCreateSection 10927->10929 10928->10926 10932 7ffe99adb87b 10929->10932 10933 7ffe99adb9dd 10929->10933 10930->10925 10931->10969 11048 7ffe99ae83a0 10931->11048 10937 7ffe99adb976 memset 10932->10937 10935 7ffe99adba5b memset 10933->10935 10938 7ffe99adbc6a OutputDebugStringW 10935->10938 10939 7ffe99adba9a 10935->10939 10941 7ffe99adbb5a OutputDebugStringW 10937->10941 10942 7ffe99adb9b8 10937->10942 10943 7ffe99adbc9d GetCurrentProcess NtMapViewOfSection 10938->10943 10944 7ffe99adbc8c 10938->10944 10939->10938 10945 7ffe99adbb76 10941->10945 10942->10941 10946 7ffe99adbd12 10943->10946 10949 7ffe99adbea2 10943->10949 10944->10943 10948 7ffe99ae83a0 RoOriginateErrorW 10945->10948 10947 7ffe99adbd1d 10946->10947 10950 7ffe99adc093 10946->10950 11035 7ffe99ae2ad0 memset 10947->11035 10951 7ffe99adbbab 10948->10951 10952 7ffe99ae2ad0 2 API calls 10949->10952 10955 7ffe99ae2ad0 2 API calls 10950->10955 11053 7ffe99ae8060 GetErrorInfo 10951->11053 10959 7ffe99adbf2d 10952->10959 10960 7ffe99adc1aa 10955->10960 10956 7ffe99adbd9e 11038 7ffe99ad67d0 10956->11038 10958 7ffe99adbdcf 10964 7ffe99ae2ad0 2 API calls 10958->10964 10961 7ffe99ad67d0 15 API calls 10959->10961 11054 7ffe99ae2d40 10960->11054 10962 7ffe99adbf72 10961->10962 10968 7ffe99ae2ad0 2 API calls 10962->10968 10966 7ffe99adbe6b 10964->10966 10965 7ffe99adc1f4 10965->10965 10967 7ffe99adbe89 NtClose 10966->10967 10967->10969 10968->10969 10971 7ffe99ae0f60 15 API calls 10970->10971 10972 7ffe99ad29f5 10971->10972 10973 7ffe99ad2af4 memset 10972->10973 10975 7ffe99ad2ce8 10972->10975 10974 7ffe99ad2bda OutputDebugStringW 10973->10974 10977 7ffe99ad2b33 10973->10977 10976 7ffe99ad2bf0 10974->10976 10975->10877 10976->10877 10977->10974 10979 7ffe99b01dd0 10978->10979 10980 7ffe99ad53bb memset 10979->10980 10981 7ffe99ad54aa OutputDebugStringW 10980->10981 10985 7ffe99ad53f6 10980->10985 10982 7ffe99ad54cd 10981->10982 11061 7ffe99ad21c0 10982->11061 10984 7ffe99ad54ed 11028 7ffe99ad54fc 10984->11028 11084 7ffe99ae1af0 10984->11084 10985->10981 10987 7ffe99ad5544 10988 7ffe99ad5551 10987->10988 10991 7ffe99ad562f 10987->10991 10989 7ffe99ad55ca memset 10988->10989 10990 7ffe99ad580a OutputDebugStringW 10989->10990 10992 7ffe99ad560a 10989->10992 10990->11028 10993 7ffe99ad5715 memset 10991->10993 10992->10990 10994 7ffe99ad592a OutputDebugStringW 10993->10994 10996 7ffe99ad574e 10993->10996 10995 7ffe99ad5946 10994->10995 11112 7ffe99b01f90 10995->11112 10996->10994 10998 7ffe99ad5a27 10999 7ffe99ad5a99 memset 10998->10999 11000 7ffe99ad5b8a OutputDebugStringW 10999->11000 11004 7ffe99ad5ad5 10999->11004 11001 7ffe99ad5ba6 11000->11001 11002 7ffe99ad67d0 15 API calls 11001->11002 11003 7ffe99ad5bca 11002->11003 11005 7ffe99ad5c43 memset 11003->11005 11004->11000 11006 7ffe99ad5d2a OutputDebugStringW 11005->11006 11010 7ffe99ad5c7c 11005->11010 11007 7ffe99ad5d46 11006->11007 11121 7ffe99ad7340 11007->11121 11010->11006 11011 7ffe99ad5d6c 11015 7ffe99ad5de3 memset 11011->11015 11012 7ffe99ad5e41 memset OutputDebugStringW GetModuleHandleA 11013 7ffe99ad5f3a 11012->11013 11019 7ffe99ad5efb 11012->11019 11159 7ffe99ae7da0 GetLastError 11013->11159 11017 7ffe99ad600a OutputDebugStringW 11015->11017 11022 7ffe99ad5e1c 11015->11022 11017->11019 11018 7ffe99ad6051 11020 7ffe99ad616b 11018->11020 11021 7ffe99ad605b 11018->11021 11019->11028 11141 7ffe99ad4d10 11019->11141 11024 7ffe99ad61bf memset 11020->11024 11023 7ffe99ad6071 VirtualQuery 11021->11023 11022->11017 11025 7ffe99ad6224 11023->11025 11026 7ffe99ad6090 11023->11026 11027 7ffe99ad641a OutputDebugStringW 11024->11027 11031 7ffe99ad61ff 11024->11031 11030 7ffe99ad6286 memset 11025->11030 11026->11025 11029 7ffe99ad609d 11026->11029 11027->11028 11028->10879 11032 7ffe99ad610d memset 11029->11032 11030->11027 11030->11031 11031->11027 11033 7ffe99ad653a OutputDebugStringW 11032->11033 11034 7ffe99ad6146 11032->11034 11033->11028 11034->11033 11036 7ffe99ae2baa OutputDebugStringW 11035->11036 11037 7ffe99ae2b0a 11035->11037 11036->10956 11037->11036 11039 7ffe99b01f90 14 API calls 11038->11039 11041 7ffe99ad67f6 11039->11041 11040 7ffe99ad6848 memcpy 11043 7ffe99ad685f 11040->11043 11041->11040 11042 7ffe99ad6956 11041->11042 11042->10958 11043->10958 11044->10880 11045->10888 11046->10899 11047->10915 11182 7ffe99ae8a10 11048->11182 11050 7ffe99ae83d2 RoOriginateErrorW 11051 7ffe99adb6f3 11050->11051 11052 7ffe99ae8060 GetErrorInfo 11051->11052 11052->10969 11053->10969 11055 7ffe99ae2d4a 11054->11055 11056 7ffe99ae2d5f 11054->11056 11057 7ffe99ae83a0 RoOriginateErrorW 11055->11057 11056->10965 11058 7ffe99ae2d51 11057->11058 11184 7ffe99ae8060 GetErrorInfo 11058->11184 11060 7ffe99ae2d58 11060->10965 11062 7ffe99ad220a 11061->11062 11063 7ffe99ad2820 11061->11063 11067 7ffe99ad222d 11062->11067 11160 7ffe99b09ff0 11062->11160 11064 7ffe99b09de0 3 API calls 11063->11064 11064->11062 11066 7ffe99ad23fb 11068 7ffe99ad2455 memset 11066->11068 11067->11066 11069 7ffe99ad2888 11067->11069 11071 7ffe99ad24c0 11067->11071 11070 7ffe99ad26aa OutputDebugStringW 11068->11070 11074 7ffe99ad249b 11068->11074 11072 7ffe99b0a300 3 API calls 11069->11072 11076 7ffe99ad2924 11069->11076 11073 7ffe99ad26c0 11070->11073 11075 7ffe99ad25b7 memset 11071->11075 11072->11076 11077 7ffe99ad280e 11073->11077 11079 7ffe99b0a300 3 API calls 11073->11079 11074->11070 11078 7ffe99ad276a OutputDebugStringW 11075->11078 11080 7ffe99ad25fd 11075->11080 11076->10984 11077->10984 11083 7ffe99ad2780 11078->11083 11079->11077 11080->11078 11081 7ffe99ad27ce memcpy 11081->11073 11083->11069 11083->11081 11085 7ffe99b01dd0 11084->11085 11086 7ffe99ae1c31 memset 11085->11086 11087 7ffe99ae1d1a OutputDebugStringW 11086->11087 11088 7ffe99ae1c6c 11086->11088 11089 7ffe99ae1d3d 11087->11089 11088->11087 11090 7ffe99ae1dfc memset 11089->11090 11106 7ffe99ae1e5f 11089->11106 11091 7ffe99ae1f4a OutputDebugStringW 11090->11091 11092 7ffe99ae1e3e 11090->11092 11096 7ffe99ae1f66 11091->11096 11092->11091 11093 7ffe99ae1fc9 11094 7ffe99aec290 2 API calls 11093->11094 11095 7ffe99ae1fd5 11094->11095 11098 7ffe99ae209e memcpy 11095->11098 11096->11093 11097 7ffe99ae2053 11096->11097 11099 7ffe99ae2071 memcpy memcpy 11097->11099 11101 7ffe99ae20d0 11098->11101 11098->11106 11099->11098 11100 7ffe99ae2107 memcpy memcpy 11102 7ffe99ae21d2 11100->11102 11105 7ffe99ae2149 11100->11105 11101->11100 11101->11106 11103 7ffe99ae2241 memset 11102->11103 11104 7ffe99ae233a OutputDebugStringW 11103->11104 11107 7ffe99ae2283 11103->11107 11104->11106 11105->11102 11108 7ffe99ae242a 11105->11108 11106->10987 11107->11104 11109 7ffe99ae24f4 memset 11108->11109 11110 7ffe99ae25ea OutputDebugStringW 11109->11110 11111 7ffe99ae2536 11109->11111 11110->11106 11111->11110 11116 7ffe99b01fbf 11112->11116 11118 7ffe99b021fc 11112->11118 11114 7ffe99b02831 memcpy 11114->11116 11115 7ffe99b025e8 memcpy 11115->11116 11116->11114 11116->11115 11117 7ffe99b0212f memcpy 11116->11117 11116->11118 11119 7ffe99b026e0 memcpy 11116->11119 11120 7ffe99b02780 memcpy 11116->11120 11165 7ffe99b078d0 11116->11165 11117->11116 11118->10998 11119->11116 11120->11116 11122 7ffe99ad7b4e 11121->11122 11123 7ffe99ad7391 11121->11123 11124 7ffe99b09de0 3 API calls 11122->11124 11127 7ffe99ad73a7 11123->11127 11176 7ffe99b09d10 11123->11176 11124->11127 11126 7ffe99ad759b 11128 7ffe99ad75f5 memset 11126->11128 11127->11126 11129 7ffe99ad7660 11127->11129 11136 7ffe99ad7a2d 11127->11136 11130 7ffe99ad77ea OutputDebugStringW 11128->11130 11134 7ffe99ad763b 11128->11134 11133 7ffe99ad76ec memset 11129->11133 11137 7ffe99ad7800 11130->11137 11132 7ffe99ad5d62 11132->11011 11132->11012 11135 7ffe99ad7aca OutputDebugStringW 11133->11135 11138 7ffe99ad7739 11133->11138 11134->11130 11135->11136 11136->11132 11181 7ffe99b09dd0 WakeByAddressSingle 11136->11181 11137->11136 11139 7ffe99ad7921 memset 11137->11139 11140 7ffe99ad79fa OutputDebugStringW 11137->11140 11138->11135 11139->11137 11139->11140 11140->11137 11142 7ffe99ad4d33 11141->11142 11143 7ffe99ad4dd1 memset 11141->11143 11144 7ffe99ad4e1f 11142->11144 11146 7ffe99ad4d5f memset 11142->11146 11145 7ffe99ad51cc OutputDebugStringW 11143->11145 11147 7ffe99ad4ead memset 11144->11147 11157 7ffe99ad51da 11145->11157 11146->11145 11148 7ffe99ad4f9a OutputDebugStringW 11147->11148 11151 7ffe99ad4ee5 11147->11151 11152 7ffe99ad4fbc 11148->11152 11149 7ffe99ad5168 memset 11149->11145 11150 7ffe99ad500c strlen 11150->11152 11151->11148 11152->11149 11152->11150 11153 7ffe99ad5064 memcmp 11152->11153 11153->11152 11154 7ffe99ad5075 11153->11154 11155 7ffe99ad510b memset 11154->11155 11156 7ffe99ad528a OutputDebugStringW 11155->11156 11158 7ffe99ad5143 11155->11158 11156->11157 11157->11018 11158->11156 11159->11019 11164 7ffe99b0a00c 11160->11164 11161 7ffe99b0a190 11161->11067 11162 7ffe99b0a132 WaitOnAddress 11163 7ffe99b0a154 GetLastError 11162->11163 11162->11164 11163->11164 11164->11161 11164->11162 11167 7ffe99b078fe 11165->11167 11166 7ffe99b079fc 11166->11116 11167->11166 11170 7ffe99b0823c IsProcessorFeaturePresent 11167->11170 11169 7ffe99b07c15 11171 7ffe99b08262 11170->11171 11172 7ffe99b08270 memset RtlCaptureContext RtlLookupFunctionEntry 11171->11172 11173 7ffe99b082e6 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11172->11173 11174 7ffe99b082aa RtlVirtualUnwind 11172->11174 11175 7ffe99b08366 11173->11175 11174->11173 11175->11169 11177 7ffe99b09d29 11176->11177 11178 7ffe99b09d50 11177->11178 11179 7ffe99b09d7c WaitOnAddress 11177->11179 11178->11122 11179->11177 11180 7ffe99b09d99 GetLastError 11179->11180 11180->11177 11183 7ffe99ae8a3a 11182->11183 11183->11050 11184->11060 11185 7ffe99ae64b0 11211 7ffe99ae6500 11185->11211 11186 7ffe99ae6534 LsaOpenPolicy 11186->11211 11187 7ffe99ae6585 GetCurrentProcess OpenProcessToken 11187->11211 11188 7ffe99ae83a0 RoOriginateErrorW 11188->11211 11189 7ffe99ae65ce GetTokenInformation 11189->11211 11190 7ffe99ae6735 LsaClose 11190->11211 11191 7ffe99ae6860 memset 11196 7ffe99ae693a OutputDebugStringW 11191->11196 11191->11211 11192 7ffe99ae7da0 GetLastError 11192->11211 11193 7ffe99ae7138 11194 7ffe99ae6a19 memset 11197 7ffe99ae6afa OutputDebugStringW 11194->11197 11194->11211 11195 7ffe99ae6652 LsaAddAccountRights LsaClose 11195->11211 11196->11211 11197->11211 11198 7ffe99ae6788 LsaClose 11199 7ffe99ae83a0 RoOriginateErrorW 11198->11199 11199->11211 11200 7ffe99ae6b33 GetCurrentProcess OpenProcessToken 11200->11211 11201 7ffe99ae8060 GetErrorInfo 11201->11211 11202 7ffe99ae6ba0 LookupPrivilegeValueW 11204 7ffe99ae6bcd AdjustTokenPrivileges 11202->11204 11202->11211 11203 7ffe99ae6e99 memset 11205 7ffe99ae703a OutputDebugStringW 11203->11205 11203->11211 11206 7ffe99ae6c16 GetLastError 11204->11206 11204->11211 11205->11211 11206->11211 11207 7ffe99ae6c83 memset 11209 7ffe99ae6dba OutputDebugStringW 11207->11209 11207->11211 11208 7ffe99ae6f55 memset 11210 7ffe99ae710a OutputDebugStringW 11208->11210 11208->11211 11209->11211 11210->11211 11211->11186 11211->11187 11211->11188 11211->11189 11211->11190 11211->11191 11211->11192 11211->11193 11211->11194 11211->11195 11211->11196 11211->11197 11211->11198 11211->11200 11211->11201 11211->11202 11211->11203 11211->11205 11211->11206 11211->11207 11211->11208 11211->11209 11211->11210
                                                APIs
                                                Strings
                                                • , xrefs: 00007FFE99ADB84A
                                                • KO_S, xrefs: 00007FFE99ADB749
                                                • NtOpenFileZwOpenKeyZwCreateKeyZwSetValueKeyZwCloseVirtualAllocExGetCurrentProcessIdOpenProcessCloseHandleWriteProcessMemoryCreateToolhelp32SnapshotModule32FirstWModule32NextWThread32FirstThread32NextOpenThreadSuspendThreadResumeThreadGetProcessIdOfThreadNtClos, xrefs: 00007FFE99ADA8A6
                                                • NtCreateSection failedNtOpenFile failed for , xrefs: 00007FFE99ADBB97
                                                • `, xrefs: 00007FFE99ADB33A
                                                • NtCreateSectionNtMapViewOfSectionNtOpenFileZwOpenKeyZwCreateKeyZwSetValueKeyZwCloseVirtualAllocExGetCurrentProcessIdOpenProcessCloseHandleWriteProcessMemoryCreateToolhelp32SnapshotModule32FirstWModule32NextWThread32FirstThread32NextOpenThreadSuspendThreadResum, xrefs: 00007FFE99ADAAA1
                                                • C:\Windows\System32\Resolved full path for module: , xrefs: 00007FFE99ADA371
                                                • , xrefs: 00007FFE99ADBCD6
                                                • NtMapViewOfSection failedSTATUS_IMAGE_NOT_AT_BASE detected. Module mapped at address: , xrefs: 00007FFE99ADC1E2
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset$Section$CloseCreateCurrentFileOpenProcessViewmemcpy
                                                • String ID: $ $C:\Windows\System32\Resolved full path for module: $KO_S$NtCreateSection failedNtOpenFile failed for $NtCreateSectionNtMapViewOfSectionNtOpenFileZwOpenKeyZwCreateKeyZwSetValueKeyZwCloseVirtualAllocExGetCurrentProcessIdOpenProcessCloseHandleWriteProcessMemoryCreateToolhelp32SnapshotModule32FirstWModule32NextWThread32FirstThread32NextOpenThreadSuspendThreadResum$NtMapViewOfSection failedSTATUS_IMAGE_NOT_AT_BASE detected. Module mapped at address: $NtOpenFileZwOpenKeyZwCreateKeyZwSetValueKeyZwCloseVirtualAllocExGetCurrentProcessIdOpenProcessCloseHandleWriteProcessMemoryCreateToolhelp32SnapshotModule32FirstWModule32NextWThread32FirstThread32NextOpenThreadSuspendThreadResumeThreadGetProcessIdOfThreadNtClos$`
                                                • API String ID: 3957571157-2112406324
                                                • Opcode ID: 9c13dbbbf62c97a09b02e238b84ba6271a1d9cc978cdb01b50f037080ccc1bb6
                                                • Instruction ID: b1f3ed427c2897e3f148d530104d1c10ec945ba82b7fee6daaf0acec0e4b39b9
                                                • Opcode Fuzzy Hash: 9c13dbbbf62c97a09b02e238b84ba6271a1d9cc978cdb01b50f037080ccc1bb6
                                                • Instruction Fuzzy Hash: C9F2AE72A15BC589EB718F20D8543ED33A4FB49B88F404236DA4D4BBA9EFB99344C354
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: memset$DebugOutputString$HandleModuleQueryVirtual
                                                • String ID: C:\Windows\System32\Resolved full path for module: $ntdll.dll$ntdll.dllNormalized full path for ntdll.dll:
                                                • API String ID: 3283594973-2956908514
                                                • Opcode ID: 56c8bbb21f6cb79abe90494a4d47813693f27385212ba3fad7a57e821685ebdf
                                                • Instruction ID: f7420aee736acdab24d2eff51d00b4db62fb197fce10068ce7282512419a45d0
                                                • Opcode Fuzzy Hash: 56c8bbb21f6cb79abe90494a4d47813693f27385212ba3fad7a57e821685ebdf
                                                • Instruction Fuzzy Hash: 61A28A72A19BC589EB318F30D8547ED33A5FB45B88F444236DA4D4BBAAEF799244C310

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 490 7ffe99ae64b0-7ffe99ae64ef 491 7ffe99ae6503-7ffe99ae6509 490->491 492 7ffe99ae7138-7ffe99ae7152 491->492 493 7ffe99ae650f-7ffe99ae6555 call 7ffe99ae7c60 call 7ffe99ae7c40 LsaOpenPolicy 491->493 498 7ffe99ae6557-7ffe99ae655f 493->498 499 7ffe99ae6580-7ffe99ae65a9 call 7ffe99ae7c40 GetCurrentProcess OpenProcessToken 493->499 501 7ffe99ae6566-7ffe99ae6574 call 7ffe99ae83a0 call 7ffe99ae8060 498->501 505 7ffe99ae670a-7ffe99ae671e call 7ffe99ae7da0 499->505 506 7ffe99ae65af-7ffe99ae65c8 call 7ffe99ae7bd0 499->506 513 7ffe99ae657a 501->513 514 7ffe99ae67de-7ffe99ae6898 call 7ffe99b01dd0 memset 501->514 505->506 515 7ffe99ae6724-7ffe99ae6727 505->515 516 7ffe99ae7153-7ffe99ae71be call 7ffe99b0aae3 call 7ffe99ae7bb0 506->516 517 7ffe99ae65ce-7ffe99ae660b GetTokenInformation 506->517 518 7ffe99ae69c0-7ffe99ae6a51 call 7ffe99b01dd0 memset 513->518 534 7ffe99ae693a-7ffe99ae694d OutputDebugStringW 514->534 535 7ffe99ae689e-7ffe99ae68b0 514->535 519 7ffe99ae6729-7ffe99ae6730 call 7ffe99ae8dd0 515->519 520 7ffe99ae6735-7ffe99ae6751 LsaClose 515->520 521 7ffe99ae6756-7ffe99ae6771 call 7ffe99ae7da0 517->521 522 7ffe99ae6611-7ffe99ae66ab call 7ffe99ae54d0 LsaAddAccountRights LsaClose 517->522 539 7ffe99ae6afa-7ffe99ae6b0d OutputDebugStringW 518->539 540 7ffe99ae6a57-7ffe99ae6a69 518->540 519->520 520->501 521->522 537 7ffe99ae6777-7ffe99ae677a 521->537 543 7ffe99ae697f-7ffe99ae6989 522->543 544 7ffe99ae66b1-7ffe99ae66ea call 7ffe99ae83a0 call 7ffe99ae8060 522->544 541 7ffe99ae694f-7ffe99ae695b call 7ffe99ae7bb0 534->541 542 7ffe99ae6960-7ffe99ae6968 534->542 545 7ffe99ae68bc-7ffe99ae68db 535->545 546 7ffe99ae68b2-7ffe99ae68ba 535->546 548 7ffe99ae677c-7ffe99ae6783 call 7ffe99ae8dd0 537->548 549 7ffe99ae6788-7ffe99ae67b6 LsaClose call 7ffe99ae83a0 call 7ffe99ae8060 537->549 556 7ffe99ae6b0f-7ffe99ae6b1b call 7ffe99ae7bb0 539->556 557 7ffe99ae6b20-7ffe99ae6b57 call 7ffe99ae7c40 GetCurrentProcess OpenProcessToken 539->557 551 7ffe99ae6a6b-7ffe99ae6a73 540->551 552 7ffe99ae6a75-7ffe99ae6a94 540->552 541->542 554 7ffe99ae696e-7ffe99ae697a call 7ffe99ae8dd0 542->554 555 7ffe99ae6500 542->555 558 7ffe99ae698b-7ffe99ae6997 call 7ffe99ae7bb0 543->558 559 7ffe99ae699c-7ffe99ae69b3 call 7ffe99ae7bb0 543->559 585 7ffe99ae67bd-7ffe99ae67d8 call 7ffe99ae7bb0 544->585 586 7ffe99ae66f0-7ffe99ae6705 call 7ffe99ae7bb0 544->586 550 7ffe99ae68e0-7ffe99ae690a 545->550 547 7ffe99ae690c-7ffe99ae691d 546->547 569 7ffe99ae6920-7ffe99ae6927 547->569 548->549 549->585 550->547 550->550 564 7ffe99ae6acc-7ffe99ae6add 551->564 565 7ffe99ae6aa0-7ffe99ae6aca 552->565 554->555 555->491 556->557 581 7ffe99ae6b5d-7ffe99ae6bc7 call 7ffe99ae5900 call 7ffe99ae7c50 LookupPrivilegeValueW 557->581 582 7ffe99ae6ce2-7ffe99ae6ce9 call 7ffe99ae7da0 557->582 558->559 559->518 577 7ffe99ae6ae0-7ffe99ae6ae7 564->577 565->564 565->565 569->534 575 7ffe99ae6929-7ffe99ae6938 569->575 575->534 575->569 577->539 580 7ffe99ae6ae9-7ffe99ae6af8 577->580 580->539 580->577 601 7ffe99ae6bcd-7ffe99ae6c10 AdjustTokenPrivileges 581->601 602 7ffe99ae6cf4-7ffe99ae6cfb call 7ffe99ae7da0 581->602 593 7ffe99ae6e17-7ffe99ae6ed1 call 7ffe99b01dd0 memset 582->593 594 7ffe99ae6cef 582->594 585->514 585->518 586->585 603 7ffe99ae703a-7ffe99ae704d OutputDebugStringW 593->603 604 7ffe99ae6ed7-7ffe99ae6ee9 593->604 594->581 606 7ffe99ae6d06-7ffe99ae6d0d call 7ffe99ae7da0 601->606 607 7ffe99ae6c16-7ffe99ae6c24 GetLastError 601->607 617 7ffe99ae6de5-7ffe99ae6def 602->617 618 7ffe99ae6d01 602->618 614 7ffe99ae704f-7ffe99ae705b call 7ffe99ae7bb0 603->614 615 7ffe99ae7060-7ffe99ae7068 603->615 608 7ffe99ae6fb8-7ffe99ae6fd7 604->608 609 7ffe99ae6eef-7ffe99ae6ef7 604->609 606->617 631 7ffe99ae6d13 606->631 612 7ffe99ae6c2a-7ffe99ae6cbb call 7ffe99b01dd0 memset 607->612 613 7ffe99ae6d18-7ffe99ae6d22 607->613 619 7ffe99ae6fe0-7ffe99ae700a 608->619 616 7ffe99ae700c-7ffe99ae701d 609->616 640 7ffe99ae6dba-7ffe99ae6dcd OutputDebugStringW 612->640 641 7ffe99ae6cc1-7ffe99ae6cd3 612->641 621 7ffe99ae6efc-7ffe99ae6f8d call 7ffe99b01dd0 memset 613->621 622 7ffe99ae6d28-7ffe99ae6d39 call 7ffe99ae7bb0 613->622 614->615 624 7ffe99ae706e-7ffe99ae707d call 7ffe99ae8dd0 615->624 625 7ffe99ae7130-7ffe99ae7133 615->625 632 7ffe99ae7020-7ffe99ae7027 616->632 629 7ffe99ae6e0f-7ffe99ae6e11 617->629 630 7ffe99ae6df1-7ffe99ae6e0c call 7ffe99ae7bb0 617->630 618->606 619->616 619->619 644 7ffe99ae710a-7ffe99ae711d OutputDebugStringW 621->644 645 7ffe99ae6f93-7ffe99ae6fa5 621->645 622->621 624->491 625->491 629->593 629->621 630->629 631->607 632->603 636 7ffe99ae7029-7ffe99ae7038 632->636 636->603 636->632 642 7ffe99ae6dcf-7ffe99ae6ddb call 7ffe99ae7bb0 640->642 643 7ffe99ae6de0 call 7ffe99ae7da0 640->643 647 7ffe99ae6cd5-7ffe99ae6cdd 641->647 648 7ffe99ae6d3e-7ffe99ae6d5d 641->648 642->643 643->617 644->625 654 7ffe99ae711f-7ffe99ae712b call 7ffe99ae7bb0 644->654 649 7ffe99ae6fab-7ffe99ae6fb3 645->649 650 7ffe99ae7082-7ffe99ae70ae 645->650 655 7ffe99ae6d8c-7ffe99ae6d9d 647->655 651 7ffe99ae6d60-7ffe99ae6d8a 648->651 658 7ffe99ae70dc-7ffe99ae70ed 649->658 657 7ffe99ae70b0-7ffe99ae70da 650->657 651->651 651->655 654->625 656 7ffe99ae6da0-7ffe99ae6da7 655->656 656->640 660 7ffe99ae6da9-7ffe99ae6db8 656->660 657->657 657->658 661 7ffe99ae70f0-7ffe99ae70f7 658->661 660->640 660->656 661->644 662 7ffe99ae70f9-7ffe99ae7108 661->662 662->644 662->661
                                                APIs
                                                Strings
                                                • Failed to add privilegeFailed to get token informationFailed to open process tokenFailed to open LSA policyAdjustTokenPrivileges failed with error: , xrefs: 00007FFE99AE66C0
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: ErrorOpenProcessTokenmemset$AccountCloseCurrentDebugInfoInformationOriginateOutputPolicyRightsString
                                                • String ID: Failed to add privilegeFailed to get token informationFailed to open process tokenFailed to open LSA policyAdjustTokenPrivileges failed with error:
                                                • API String ID: 4216219486-1190080770
                                                • Opcode ID: 5e1eb3a5bac596d883ce99500fa040dab2781b57ad354ec38aee42d2f0b55acc
                                                • Instruction ID: 658cba25b7af10afb1ddbd28c3d0cc141493aaadb747af15e526eef53cc073f7
                                                • Opcode Fuzzy Hash: 5e1eb3a5bac596d883ce99500fa040dab2781b57ad354ec38aee42d2f0b55acc
                                                • Instruction Fuzzy Hash: 60629B62B04B8689EB708FB1D8883ED3365FB45788F448235DA4D4BBA9EF7D9245C310

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 663 7ffe99ae1af0-7ffe99ae1c66 call 7ffe99b01dd0 memset 666 7ffe99ae1d1a-7ffe99ae1d3b OutputDebugStringW 663->666 667 7ffe99ae1c6c-7ffe99ae1c7e 663->667 668 7ffe99ae1d4b-7ffe99ae1d53 666->668 669 7ffe99ae1d3d-7ffe99ae1d46 call 7ffe99ae7bb0 666->669 670 7ffe99ae1c8a-7ffe99ae1cad 667->670 671 7ffe99ae1c80-7ffe99ae1c88 667->671 675 7ffe99ae1d59-7ffe99ae1d61 668->675 676 7ffe99ae1e5f-7ffe99ae1e78 call 7ffe99ae7ba0 668->676 669->668 673 7ffe99ae1cb0-7ffe99ae1ce0 670->673 672 7ffe99ae1ce2-7ffe99ae1cfe 671->672 678 7ffe99ae1d00-7ffe99ae1d07 672->678 673->672 673->673 675->676 679 7ffe99ae1d67-7ffe99ae1e38 call 7ffe99b01dd0 memset 675->679 683 7ffe99ae2639-7ffe99ae264a call 7ffe99b0aae3 676->683 684 7ffe99ae1e7e-7ffe99ae1eae 676->684 678->666 681 7ffe99ae1d09-7ffe99ae1d18 678->681 688 7ffe99ae1f4a-7ffe99ae1f64 OutputDebugStringW 679->688 689 7ffe99ae1e3e-7ffe99ae1e50 679->689 681->666 681->678 690 7ffe99ae264f 683->690 687 7ffe99ae2413-7ffe99ae2429 684->687 691 7ffe99ae1f77-7ffe99ae1f89 688->691 692 7ffe99ae1f66-7ffe99ae1f72 call 7ffe99ae7bb0 688->692 693 7ffe99ae1eb3-7ffe99ae1ed6 689->693 694 7ffe99ae1e52-7ffe99ae1e5a 689->694 695 7ffe99ae2652-7ffe99ae266b call 7ffe99b0aae3 690->695 698 7ffe99ae1f8b-7ffe99ae1fa4 691->698 699 7ffe99ae1fda-7ffe99ae2008 call 7ffe99b0ada2 691->699 692->691 696 7ffe99ae1ee0-7ffe99ae1f10 693->696 700 7ffe99ae1f12-7ffe99ae1f2e 694->700 712 7ffe99ae2698-7ffe99ae26d6 695->712 696->696 696->700 704 7ffe99ae200d-7ffe99ae203b call 7ffe99b0ada2 698->704 705 7ffe99ae1fa6-7ffe99ae1fb9 698->705 699->704 703 7ffe99ae1f30-7ffe99ae1f37 700->703 703->688 708 7ffe99ae1f39-7ffe99ae1f48 703->708 711 7ffe99ae2040-7ffe99ae204d call 7ffe99b098f0 704->711 709 7ffe99ae2053-7ffe99ae2099 call 7ffe99aef6e0 call 7ffe99ae0c50 memcpy * 2 705->709 710 7ffe99ae1fbf-7ffe99ae1fc7 705->710 708->688 708->703 721 7ffe99ae209e-7ffe99ae20ca memcpy 709->721 710->711 714 7ffe99ae1fc9-7ffe99ae1fd5 call 7ffe99aec290 710->714 711->709 711->714 714->721 721->690 723 7ffe99ae20d0-7ffe99ae20d7 721->723 724 7ffe99ae20d9-7ffe99ae20f6 call 7ffe99ae7ba0 723->724 725 7ffe99ae2101 723->725 724->695 731 7ffe99ae20fc-7ffe99ae20ff 724->731 727 7ffe99ae2107-7ffe99ae2143 memcpy * 2 725->727 729 7ffe99ae2149-7ffe99ae218d call 7ffe99ae5d50 727->729 730 7ffe99ae21d2-7ffe99ae227d call 7ffe99b01dd0 memset 727->730 729->730 738 7ffe99ae218f-7ffe99ae21a3 729->738 736 7ffe99ae233a-7ffe99ae2354 OutputDebugStringW 730->736 737 7ffe99ae2283-7ffe99ae2295 730->737 731->727 741 7ffe99ae2367-7ffe99ae23da call 7ffe99aefc90 736->741 742 7ffe99ae2356-7ffe99ae2362 call 7ffe99ae7bb0 736->742 739 7ffe99ae2297-7ffe99ae229f 737->739 740 7ffe99ae22a1-7ffe99ae22cf 737->740 738->730 743 7ffe99ae21a5-7ffe99ae21be 738->743 744 7ffe99ae2302-7ffe99ae231e 739->744 745 7ffe99ae22d0-7ffe99ae2300 740->745 756 7ffe99ae266d-7ffe99ae2693 call 7ffe99b0af30 741->756 757 7ffe99ae23e0-7ffe99ae2400 741->757 742->741 748 7ffe99ae21c0-7ffe99ae21c3 743->748 749 7ffe99ae2320-7ffe99ae2327 744->749 745->744 745->745 751 7ffe99ae242a-7ffe99ae243a 748->751 752 7ffe99ae21c9-7ffe99ae21d0 748->752 749->736 755 7ffe99ae2329-7ffe99ae2338 749->755 753 7ffe99ae243c 751->753 754 7ffe99ae2443-7ffe99ae2530 call 7ffe99b01dd0 memset 751->754 752->730 752->748 753->754 763 7ffe99ae25ea-7ffe99ae2604 OutputDebugStringW 754->763 764 7ffe99ae2536-7ffe99ae2548 754->764 755->736 755->749 756->712 757->687 760 7ffe99ae2402-7ffe99ae240e call 7ffe99ae7bb0 757->760 760->687 767 7ffe99ae2617-7ffe99ae2634 763->767 768 7ffe99ae2606-7ffe99ae2612 call 7ffe99ae7bb0 763->768 765 7ffe99ae254a-7ffe99ae2552 764->765 766 7ffe99ae2554-7ffe99ae2577 764->766 769 7ffe99ae25b2-7ffe99ae25ce 765->769 770 7ffe99ae2580-7ffe99ae25b0 766->770 767->687 768->767 772 7ffe99ae25d0-7ffe99ae25d7 769->772 770->769 770->770 772->763 773 7ffe99ae25d9-7ffe99ae25e8 772->773 773->763 773->772
                                                APIs
                                                Strings
                                                • a Display implementation returned an error unexpectedlyC:\Users\Harrison\.rustup\toolchains\nightly-x86_64-pc-windows-msvc\lib/rustlib/src/rust\library\alloc\src\string.rs, xrefs: 00007FFE99AE2679
                                                • , xrefs: 00007FFE99AE1B9E
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: memcpy$DebugOutputStringmemset
                                                • String ID: $a Display implementation returned an error unexpectedlyC:\Users\Harrison\.rustup\toolchains\nightly-x86_64-pc-windows-msvc\lib/rustlib/src/rust\library\alloc\src\string.rs
                                                • API String ID: 4201822616-3424599729
                                                • Opcode ID: 6d08d2bde3247fd92df4833feea13ccd8ef0045056b4b366b267f72772be4a84
                                                • Instruction ID: 9ebb7a28c9d2bca675965a561a485fdf0b4d08df25d4224a26d8f833df9528d7
                                                • Opcode Fuzzy Hash: 6d08d2bde3247fd92df4833feea13ccd8ef0045056b4b366b267f72772be4a84
                                                • Instruction Fuzzy Hash: B2527B62A19BC588EB31CF70D8547EE3364FB45788F405236DA4D4BBAAEF799285C310

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 774 7ffe99ae0f60-7ffe99ae10e0 call 7ffe99b01dd0 memset 777 7ffe99ae119a-7ffe99ae11bb OutputDebugStringW 774->777 778 7ffe99ae10e6-7ffe99ae10f8 774->778 781 7ffe99ae11cb-7ffe99ae11d3 777->781 782 7ffe99ae11bd-7ffe99ae11c6 call 7ffe99ae7bb0 777->782 779 7ffe99ae10fa-7ffe99ae1102 778->779 780 7ffe99ae1104-7ffe99ae1127 778->780 783 7ffe99ae1162-7ffe99ae117e 779->783 784 7ffe99ae1130-7ffe99ae1160 780->784 786 7ffe99ae121a-7ffe99ae1233 call 7ffe99ae7ba0 781->786 787 7ffe99ae11d5-7ffe99ae11dd 781->787 782->781 789 7ffe99ae1180-7ffe99ae1187 783->789 784->783 784->784 797 7ffe99ae190b-7ffe99ae191c call 7ffe99b0aae3 786->797 798 7ffe99ae1239-7ffe99ae127a 786->798 787->786 790 7ffe99ae11df-7ffe99ae11f9 787->790 789->777 792 7ffe99ae1189-7ffe99ae1198 789->792 793 7ffe99ae1292-7ffe99ae12d8 call 7ffe99aef6e0 call 7ffe99ae0c50 memcpy * 2 790->793 794 7ffe99ae11ff-7ffe99ae1207 790->794 792->777 792->789 809 7ffe99ae12dd-7ffe99ae1308 memcpy 793->809 795 7ffe99ae1209-7ffe99ae1215 call 7ffe99aec290 794->795 796 7ffe99ae127f-7ffe99ae128c call 7ffe99b098f0 794->796 795->809 796->793 796->795 806 7ffe99ae1921 797->806 802 7ffe99ae18f4-7ffe99ae190a 798->802 810 7ffe99ae1923-7ffe99ae193c call 7ffe99b0aae3 806->810 809->806 812 7ffe99ae130e 809->812 818 7ffe99ae19a1-7ffe99ae19dd 810->818 814 7ffe99ae1314-7ffe99ae1330 call 7ffe99ae7bd0 812->814 815 7ffe99ae193e-7ffe99ae1954 812->815 814->810 824 7ffe99ae1336-7ffe99ae1356 814->824 819 7ffe99ae195b-7ffe99ae1974 call 7ffe99b0afd0 815->819 822 7ffe99ae19df-7ffe99ae19ec call 7ffe99ae7bb0 818->822 823 7ffe99ae19f1-7ffe99ae1a0a 818->823 819->818 822->823 824->819 827 7ffe99ae135c-7ffe99ae13a1 memcpy * 2 824->827 828 7ffe99ae13a3-7ffe99ae13ad 827->828 829 7ffe99ae13b2-7ffe99ae14a8 memcpy memset call 7ffe99ae5ef0 call 7ffe99ae5e50 827->829 830 7ffe99ae15cf-7ffe99ae167e call 7ffe99b01dd0 memset 828->830 829->830 841 7ffe99ae14ae-7ffe99ae14bd 829->841 836 7ffe99ae173a-7ffe99ae1754 OutputDebugStringW 830->836 837 7ffe99ae1684-7ffe99ae1696 830->837 842 7ffe99ae1767-7ffe99ae17da call 7ffe99aefc70 836->842 843 7ffe99ae1756-7ffe99ae1762 call 7ffe99ae7bb0 836->843 839 7ffe99ae1698-7ffe99ae16a0 837->839 840 7ffe99ae16a2-7ffe99ae16c5 837->840 845 7ffe99ae1702-7ffe99ae171e 839->845 846 7ffe99ae16d0-7ffe99ae1700 840->846 847 7ffe99ae14c6-7ffe99ae15a4 call 7ffe99b01dd0 memset 841->847 848 7ffe99ae14bf 841->848 854 7ffe99ae1976-7ffe99ae199c call 7ffe99b0af30 842->854 855 7ffe99ae17e0-7ffe99ae180e call 7ffe99ae7bb0 842->855 843->842 851 7ffe99ae1720-7ffe99ae1727 845->851 846->845 846->846 857 7ffe99ae18aa-7ffe99ae18c4 OutputDebugStringW 847->857 858 7ffe99ae15aa-7ffe99ae15bc 847->858 848->847 851->836 856 7ffe99ae1729-7ffe99ae1738 851->856 854->818 855->802 856->836 856->851 864 7ffe99ae18d7-7ffe99ae18ed 857->864 865 7ffe99ae18c6-7ffe99ae18d2 call 7ffe99ae7bb0 857->865 861 7ffe99ae1813-7ffe99ae1836 858->861 862 7ffe99ae15c2-7ffe99ae15ca 858->862 867 7ffe99ae1840-7ffe99ae1870 861->867 866 7ffe99ae1872-7ffe99ae188e 862->866 864->802 865->864 869 7ffe99ae1890-7ffe99ae1897 866->869 867->866 867->867 869->857 870 7ffe99ae1899-7ffe99ae18a8 869->870 870->857 870->869
                                                APIs
                                                Strings
                                                • a Display implementation returned an error unexpectedlyC:\Users\Harrison\.rustup\toolchains\nightly-x86_64-pc-windows-msvc\lib/rustlib/src/rust\library\alloc\src\string.rs, xrefs: 00007FFE99AE1982
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: memcpy$memset$DebugOutputString
                                                • String ID: a Display implementation returned an error unexpectedlyC:\Users\Harrison\.rustup\toolchains\nightly-x86_64-pc-windows-msvc\lib/rustlib/src/rust\library\alloc\src\string.rs
                                                • API String ID: 4266836622-2517649730
                                                • Opcode ID: d5c55b5b4d732b5c1e843844f69b4c43f9b7da710976431f4a7c4dbac1f21961
                                                • Instruction ID: f8b65e8c2a7be2c58da7b20b9cb570faf6420a1eef54db9eeb2a93a538fb9a88
                                                • Opcode Fuzzy Hash: d5c55b5b4d732b5c1e843844f69b4c43f9b7da710976431f4a7c4dbac1f21961
                                                • Instruction Fuzzy Hash: B9427B62A19BC589EB718F30D8543ED3364FB55788F404235DA8D0ABAAEFBD9384C351

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 871 7ffe99ad7340-7ffe99ad738b 872 7ffe99ad7b53-7ffe99ad7b91 call 7ffe99b09de0 871->872 873 7ffe99ad7391-7ffe99ad73a1 871->873 880 7ffe99ad7b96-7ffe99ad7ba4 call 7ffe99b09ce0 872->880 875 7ffe99ad7b46-7ffe99ad7b4e call 7ffe99b09d10 873->875 876 7ffe99ad73a7-7ffe99ad73b7 873->876 875->872 879 7ffe99ad73bd-7ffe99ad73c6 876->879 876->880 883 7ffe99ad7baa-7ffe99ad7bd9 call 7ffe99b0af30 879->883 884 7ffe99ad73cc-7ffe99ad73de 879->884 880->883 880->884 895 7ffe99ad7bdb-7ffe99ad7be9 call 7ffe99b09dd0 883->895 887 7ffe99ad759b-7ffe99ad7635 call 7ffe99b01dd0 memset 884->887 888 7ffe99ad73e4-7ffe99ad7529 884->888 899 7ffe99ad77ea-7ffe99ad77fe OutputDebugStringW 887->899 900 7ffe99ad763b-7ffe99ad764d 887->900 889 7ffe99ad752d-7ffe99ad7545 888->889 892 7ffe99ad7547-7ffe99ad7562 889->892 893 7ffe99ad7580-7ffe99ad758c 889->893 896 7ffe99ad7568-7ffe99ad7573 892->896 897 7ffe99ad7660-7ffe99ad7733 call 7ffe99b01dd0 memset 892->897 893->887 898 7ffe99ad758e-7ffe99ad7599 893->898 913 7ffe99ad7b28-7ffe99ad7b45 895->913 896->892 902 7ffe99ad7575 896->902 918 7ffe99ad7aca-7ffe99ad7ade OutputDebugStringW 897->918 919 7ffe99ad7739-7ffe99ad774b 897->919 898->889 903 7ffe99ad7800-7ffe99ad780c call 7ffe99ae7bb0 899->903 904 7ffe99ad7811-7ffe99ad7832 899->904 905 7ffe99ad7653-7ffe99ad765b 900->905 906 7ffe99ad775e-7ffe99ad778e 900->906 902->893 903->904 911 7ffe99ad7842-7ffe99ad7846 904->911 912 7ffe99ad77bc-7ffe99ad77cd 905->912 909 7ffe99ad7790-7ffe99ad77ba 906->909 909->909 909->912 916 7ffe99ad784c-7ffe99ad784f 911->916 917 7ffe99ad7a2d-7ffe99ad7a40 911->917 915 7ffe99ad77d0-7ffe99ad77d7 912->915 915->899 920 7ffe99ad77d9-7ffe99ad77e8 915->920 923 7ffe99ad7860-7ffe99ad787a 916->923 924 7ffe99ad7851-7ffe99ad7856 916->924 925 7ffe99ad7a46 917->925 926 7ffe99ad7b05-7ffe99ad7b15 917->926 921 7ffe99ad7ae0-7ffe99ad7aec call 7ffe99ae7bb0 918->921 922 7ffe99ad7af1-7ffe99ad7b03 918->922 927 7ffe99ad7a4b-7ffe99ad7a6e 919->927 928 7ffe99ad7751-7ffe99ad7759 919->928 920->899 920->915 921->922 922->926 932 7ffe99ad7b1b-7ffe99ad7b22 922->932 923->923 935 7ffe99ad787c-7ffe99ad7887 923->935 934 7ffe99ad7889-7ffe99ad7959 call 7ffe99b01dd0 memset 924->934 925->932 926->932 933 7ffe99ad7bee-7ffe99ad7bfb call 7ffe99b09ce0 926->933 929 7ffe99ad7a70-7ffe99ad7a9a 927->929 930 7ffe99ad7a9c-7ffe99ad7aad 928->930 929->929 929->930 937 7ffe99ad7ab0-7ffe99ad7ab7 930->937 932->895 932->913 933->932 944 7ffe99ad7c01-7ffe99ad7c06 933->944 942 7ffe99ad79fa-7ffe99ad7a11 OutputDebugStringW 934->942 943 7ffe99ad795f-7ffe99ad7971 934->943 935->934 937->918 940 7ffe99ad7ab9-7ffe99ad7ac8 937->940 940->918 940->937 947 7ffe99ad7a17-7ffe99ad7a28 call 7ffe99ae7bb0 942->947 948 7ffe99ad7840 942->948 945 7ffe99ad7973-7ffe99ad797b 943->945 946 7ffe99ad7980-7ffe99ad799f 943->946 944->932 949 7ffe99ad79cc-7ffe99ad79dd 945->949 950 7ffe99ad79a0-7ffe99ad79ca 946->950 947->948 948->911 952 7ffe99ad79e0-7ffe99ad79e7 949->952 950->949 950->950 952->942 954 7ffe99ad79e9-7ffe99ad79f8 952->954 954->942 954->952
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset
                                                • String ID: arenegyl$called `Result::unwrap()` on an `Err` value$modnarod$setybdet$uespemos
                                                • API String ID: 1084755268-2410307170
                                                • Opcode ID: 327f11d4c3f2890d9f145d13a2e87829bf2df45a23a5cbd6d1eeafb6a0bfdd3f
                                                • Instruction ID: cf07b0066b0fd7eb0c63416267112f59edab16a091edbafcb5b4ee981b1a5ff8
                                                • Opcode Fuzzy Hash: 327f11d4c3f2890d9f145d13a2e87829bf2df45a23a5cbd6d1eeafb6a0bfdd3f
                                                • Instruction Fuzzy Hash: AD22DDA2A15B8685EB34CF60D8547ED3365FB05788F808236DE0D5BBA9EF7C8641C310

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 955 7ffe99ad4d10-7ffe99ad4d2d 956 7ffe99ad4d33-7ffe99ad4d48 955->956 957 7ffe99ad4dd1-7ffe99ad4e1a memset 955->957 958 7ffe99ad4d4e-7ffe99ad4d59 956->958 959 7ffe99ad4e1f 956->959 960 7ffe99ad51cc-7ffe99ad51d4 OutputDebugStringW 957->960 962 7ffe99ad4e24-7ffe99ad4edf call 7ffe99b01dd0 memset 958->962 963 7ffe99ad4d5f-7ffe99ad4dcc memset 958->963 959->962 961 7ffe99ad51da-7ffe99ad51f3 960->961 966 7ffe99ad4f9a-7ffe99ad4fba OutputDebugStringW 962->966 967 7ffe99ad4ee5-7ffe99ad4ef7 962->967 963->960 968 7ffe99ad4fca-7ffe99ad4fd1 966->968 969 7ffe99ad4fbc-7ffe99ad4fc5 call 7ffe99ae7bb0 966->969 970 7ffe99ad4ef9-7ffe99ad4f01 967->970 971 7ffe99ad4f03-7ffe99ad4f26 967->971 973 7ffe99ad4fd7-7ffe99ad4ff8 968->973 974 7ffe99ad5168-7ffe99ad51c3 memset 968->974 969->968 975 7ffe99ad4f62-7ffe99ad4f7e 970->975 976 7ffe99ad4f30-7ffe99ad4f60 971->976 977 7ffe99ad500c-7ffe99ad5062 strlen call 7ffe99b032e0 973->977 974->960 978 7ffe99ad4f80-7ffe99ad4f87 975->978 976->975 976->976 982 7ffe99ad5064-7ffe99ad5073 memcmp 977->982 983 7ffe99ad5000-7ffe99ad5006 977->983 978->966 980 7ffe99ad4f89-7ffe99ad4f98 978->980 980->966 980->978 982->983 984 7ffe99ad5075-7ffe99ad513d call 7ffe99b01dd0 memset 982->984 983->974 983->977 987 7ffe99ad528a-7ffe99ad52aa OutputDebugStringW 984->987 988 7ffe99ad5143-7ffe99ad5155 984->988 989 7ffe99ad52ba-7ffe99ad52c6 987->989 990 7ffe99ad52ac-7ffe99ad52b5 call 7ffe99ae7bb0 987->990 991 7ffe99ad515b-7ffe99ad5163 988->991 992 7ffe99ad51f4-7ffe99ad5217 988->992 989->961 990->989 995 7ffe99ad5252-7ffe99ad526e 991->995 993 7ffe99ad5220-7ffe99ad5250 992->993 993->993 993->995 996 7ffe99ad5270-7ffe99ad5277 995->996 996->987 997 7ffe99ad5279-7ffe99ad5288 996->997 997->987 997->996
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset$memcmpstrlen
                                                • String ID: c
                                                • API String ID: 2294051181-112844655
                                                • Opcode ID: 59292d1c13a59e704b0c10077167ed1d69cb01fed6f65719ec45703d5eb15069
                                                • Instruction ID: 61870f8f0ab8ed13a027ca828c4ba68e64026a152545bc149b060c83e9c23d96
                                                • Opcode Fuzzy Hash: 59292d1c13a59e704b0c10077167ed1d69cb01fed6f65719ec45703d5eb15069
                                                • Instruction Fuzzy Hash: 7CE17F62A18BC585EB718F14E4417BEB7A1FB89784F404235DA8D03BA9EF7DD185C710

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 998 7ffe99ad21c0-7ffe99ad2204 999 7ffe99ad220a-7ffe99ad2219 998->999 1000 7ffe99ad2820-7ffe99ad286d call 7ffe99b09de0 998->1000 1001 7ffe99ad2873-7ffe99ad2882 call 7ffe99b09ff0 999->1001 1002 7ffe99ad221f-7ffe99ad2227 999->1002 1000->1001 1000->1002 1007 7ffe99ad223a-7ffe99ad2246 1001->1007 1008 7ffe99ad2888-7ffe99ad28bc call 7ffe99b0af30 1001->1008 1002->1001 1004 7ffe99ad222d-7ffe99ad2234 1002->1004 1004->1007 1004->1008 1010 7ffe99ad23fb-7ffe99ad2495 call 7ffe99b01dd0 memset 1007->1010 1011 7ffe99ad224c-7ffe99ad2390 1007->1011 1019 7ffe99ad28e0-7ffe99ad2922 1008->1019 1020 7ffe99ad26aa-7ffe99ad26be OutputDebugStringW 1010->1020 1021 7ffe99ad249b-7ffe99ad24ad 1010->1021 1013 7ffe99ad2394-7ffe99ad23ac 1011->1013 1017 7ffe99ad23ae-7ffe99ad23c9 1013->1017 1018 7ffe99ad23e0-7ffe99ad23ec 1013->1018 1024 7ffe99ad23cf-7ffe99ad23da 1017->1024 1025 7ffe99ad24c0-7ffe99ad25f7 call 7ffe99b01dd0 memset 1017->1025 1018->1010 1026 7ffe99ad23ee-7ffe99ad23f9 1018->1026 1022 7ffe99ad2933-7ffe99ad2938 call 7ffe99b0a300 1019->1022 1023 7ffe99ad2924-7ffe99ad2932 1019->1023 1032 7ffe99ad26c0-7ffe99ad26cc call 7ffe99ae7bb0 1020->1032 1033 7ffe99ad26d1-7ffe99ad26de 1020->1033 1027 7ffe99ad2622-7ffe99ad2645 1021->1027 1028 7ffe99ad24b3-7ffe99ad24bb 1021->1028 1022->1023 1024->1017 1031 7ffe99ad23dc 1024->1031 1042 7ffe99ad276a-7ffe99ad277e OutputDebugStringW 1025->1042 1043 7ffe99ad25fd-7ffe99ad260f 1025->1043 1026->1013 1038 7ffe99ad2650-7ffe99ad267a 1027->1038 1035 7ffe99ad267c-7ffe99ad268d 1028->1035 1031->1018 1032->1033 1034 7ffe99ad27f2-7ffe99ad2808 1033->1034 1040 7ffe99ad28be-7ffe99ad28c6 call 7ffe99b0a300 1034->1040 1041 7ffe99ad280e-7ffe99ad281f 1034->1041 1044 7ffe99ad2690-7ffe99ad2697 1035->1044 1038->1035 1038->1038 1040->1041 1045 7ffe99ad2780-7ffe99ad278c call 7ffe99ae7bb0 1042->1045 1046 7ffe99ad2791-7ffe99ad279f 1042->1046 1047 7ffe99ad26e3-7ffe99ad270f 1043->1047 1048 7ffe99ad2615-7ffe99ad261d 1043->1048 1044->1020 1049 7ffe99ad2699-7ffe99ad26a8 1044->1049 1045->1046 1054 7ffe99ad28cb 1046->1054 1055 7ffe99ad27a5-7ffe99ad27a9 1046->1055 1051 7ffe99ad2710-7ffe99ad273a 1047->1051 1053 7ffe99ad273c-7ffe99ad274d 1048->1053 1049->1020 1049->1044 1051->1051 1051->1053 1058 7ffe99ad2750-7ffe99ad2757 1053->1058 1057 7ffe99ad28ce-7ffe99ad28db call 7ffe99b0aae3 1054->1057 1059 7ffe99ad27ab-7ffe99ad27c8 call 7ffe99ae7ba0 1055->1059 1060 7ffe99ad27d3 1055->1060 1057->1019 1058->1042 1063 7ffe99ad2759-7ffe99ad2768 1058->1063 1059->1057 1066 7ffe99ad27ce-7ffe99ad27d1 1059->1066 1061 7ffe99ad27d9-7ffe99ad27ee memcpy 1060->1061 1061->1034 1063->1042 1063->1058 1066->1061
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset$memcpy
                                                • String ID: arenegyl$called `Result::unwrap()` on an `Err` value$modnarod$setybdet$uespemos
                                                • API String ID: 293864031-2410307170
                                                • Opcode ID: f136285ef0416b8e524c5ffc8491f0cf1b1ec2f1ff6a6c55cd536488d3d3e596
                                                • Instruction ID: c5451dd9110b9f62986413002d44aee9708a3f7602cde6b16ecf9756a685d610
                                                • Opcode Fuzzy Hash: f136285ef0416b8e524c5ffc8491f0cf1b1ec2f1ff6a6c55cd536488d3d3e596
                                                • Instruction Fuzzy Hash: 7F02BDB2A15B8589EB318F60E8547ED3361FB05798F408236DE1D5BBAAEF7C9241C350

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1067 7ffe99ad1350-7ffe99ad13b1 1068 7ffe99ad13b7-7ffe99ad13c9 1067->1068 1069 7ffe99ad1f68-7ffe99ad1fa6 call 7ffe99b09de0 1067->1069 1071 7ffe99ad1f54-7ffe99ad1f5c call 7ffe99b0a1d0 1068->1071 1072 7ffe99ad13cf-7ffe99ad13df 1068->1072 1075 7ffe99ad1fab-7ffe99ad1fb8 call 7ffe99b09ce0 1069->1075 1086 7ffe99ad1f61-7ffe99ad1f66 call 7ffe99b0a300 1071->1086 1072->1075 1076 7ffe99ad13e5-7ffe99ad13ed 1072->1076 1077 7ffe99ad13f3-7ffe99ad1419 call 7ffe99ae7ba0 1075->1077 1078 7ffe99ad1fbe-7ffe99ad1fed call 7ffe99b0af30 1075->1078 1076->1077 1076->1078 1087 7ffe99ad2053-7ffe99ad205d call 7ffe99b0ab00 1077->1087 1088 7ffe99ad141f-7ffe99ad1be4 1077->1088 1089 7ffe99ad2062-7ffe99ad20b3 call 7ffe99ae3140 1078->1089 1095 7ffe99ad1f39-7ffe99ad1f53 1086->1095 1087->1089 1093 7ffe99ad1bfb-7ffe99ad1c02 1088->1093 1096 7ffe99ad1c08-7ffe99ad1c56 call 7ffe99ae0f60 1093->1096 1097 7ffe99ad1ee9-7ffe99ad1f0a call 7ffe99ae7bb0 1093->1097 1105 7ffe99ad200b-7ffe99ad2051 call 7ffe99b0af30 1096->1105 1106 7ffe99ad1c5c-7ffe99ad1c6a 1096->1106 1103 7ffe99ad1f0c-7ffe99ad1f1c 1097->1103 1104 7ffe99ad1f22-7ffe99ad1f37 1097->1104 1103->1104 1108 7ffe99ad1fef-7ffe99ad1ffc call 7ffe99b09ce0 1103->1108 1104->1086 1104->1095 1105->1089 1109 7ffe99ad1d24-7ffe99ad1d56 call 7ffe99ae7860 1106->1109 1110 7ffe99ad1c70-7ffe99ad1c77 1106->1110 1108->1104 1122 7ffe99ad2002-7ffe99ad2006 1108->1122 1120 7ffe99ad1d6c-7ffe99ad1e12 call 7ffe99b01dd0 memset 1109->1120 1121 7ffe99ad1d58 1109->1121 1113 7ffe99ad1c7d-7ffe99ad1c8a 1110->1113 1114 7ffe99ad1cf9-7ffe99ad1d00 1110->1114 1117 7ffe99ad1c90-7ffe99ad1cf7 1113->1117 1114->1109 1119 7ffe99ad1d02-7ffe99ad1d05 1114->1119 1117->1114 1117->1117 1123 7ffe99ad1d10-7ffe99ad1d22 1119->1123 1128 7ffe99ad1eba-7ffe99ad1ecd OutputDebugStringW 1120->1128 1129 7ffe99ad1e18-7ffe99ad1e2a 1120->1129 1121->1120 1124 7ffe99ad1d5a-7ffe99ad1d67 call 7ffe99ae7bb0 1121->1124 1122->1104 1123->1109 1123->1123 1124->1120 1130 7ffe99ad1ed3-7ffe99ad1ee4 call 7ffe99ae7bb0 1128->1130 1131 7ffe99ad1bf0-7ffe99ad1bf4 1128->1131 1132 7ffe99ad1e2c-7ffe99ad1e34 1129->1132 1133 7ffe99ad1e40-7ffe99ad1e5f 1129->1133 1130->1131 1131->1093 1135 7ffe99ad1e8c-7ffe99ad1e9d 1132->1135 1136 7ffe99ad1e60-7ffe99ad1e8a 1133->1136 1138 7ffe99ad1ea0-7ffe99ad1ea7 1135->1138 1136->1135 1136->1136 1138->1128 1139 7ffe99ad1ea9-7ffe99ad1eb8 1138->1139 1139->1128 1139->1138
                                                APIs
                                                Strings
                                                • NtGetContextThreadNtSetContextThreadNtCloseNtCreateThreadExNtCreateProcessExNtQueryInformationThreadGetProcessIdOfThreadWriteProcessMemoryReadProcessMemoryOpenProcessVirtualProtectExCloseHandleVirtualAllocVirtualProtectOpenThreadCreateToolhelp32SnapshotThread3, xrefs: 00007FFE99AD15CC
                                                • called `Result::unwrap()` on an `Err` value, xrefs: 00007FFE99AD1FD1
                                                • RtlCaptureStackBackTraceLoadLibraryAGetProcAddressLdrGetDllHandleByMappingLdrRegisterDllNotificationVirtualAllocExVirtualFreeExNtCreateSectionFailed to encrypt function name, xrefs: 00007FFE99AD1B0B
                                                • Thread32NextVirtualFreeWaitForSingleObjectTerminateThreadSuspendThreadResumeThreadIsWow64ProcessModule32FirstWModule32NextWGetCurrentProcessIdProcess32FirstWProcess32NextWZwOpenKeyZwCreateKeyZwSetValueKeyZwCloseCreateRemoteThreadNtQuerySystemInformationEnumPro, xrefs: 00007FFE99AD1787
                                                • NtProtectVirtualMemoryNtAllocateVirtualMemoryNtMapViewOfSectionNtUnmapViewOfSectionNtOpenFileLdrLoadDllEtwEventWriteFullEtwEventWriteEtwEventWriteTransferWDEnableMpWDEnableMpScanStartMpSampleSubmitMpAmsiNotifyMpSampleQueryMpAmsiScanMpThreatActionNtResumeThread, xrefs: 00007FFE99AD1434
                                                • FindFirstFileWFindNextFileWNtQueryDirectoryFileRegQueryValueExWNtEnumerateKeyGetAsyncKeyStateSetWindowsHookExWLogonUserWCredEnumerateWCreateProcessWNtQueryInformationProcessVirtualQueryExGetProcessIdNtOpenProcessNtWriteVirtualMemoryNtReadVirtualMemoryLoadLibra, xrefs: 00007FFE99AD1962
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset
                                                • String ID: FindFirstFileWFindNextFileWNtQueryDirectoryFileRegQueryValueExWNtEnumerateKeyGetAsyncKeyStateSetWindowsHookExWLogonUserWCredEnumerateWCreateProcessWNtQueryInformationProcessVirtualQueryExGetProcessIdNtOpenProcessNtWriteVirtualMemoryNtReadVirtualMemoryLoadLibra$NtGetContextThreadNtSetContextThreadNtCloseNtCreateThreadExNtCreateProcessExNtQueryInformationThreadGetProcessIdOfThreadWriteProcessMemoryReadProcessMemoryOpenProcessVirtualProtectExCloseHandleVirtualAllocVirtualProtectOpenThreadCreateToolhelp32SnapshotThread3$NtProtectVirtualMemoryNtAllocateVirtualMemoryNtMapViewOfSectionNtUnmapViewOfSectionNtOpenFileLdrLoadDllEtwEventWriteFullEtwEventWriteEtwEventWriteTransferWDEnableMpWDEnableMpScanStartMpSampleSubmitMpAmsiNotifyMpSampleQueryMpAmsiScanMpThreatActionNtResumeThread$RtlCaptureStackBackTraceLoadLibraryAGetProcAddressLdrGetDllHandleByMappingLdrRegisterDllNotificationVirtualAllocExVirtualFreeExNtCreateSectionFailed to encrypt function name$Thread32NextVirtualFreeWaitForSingleObjectTerminateThreadSuspendThreadResumeThreadIsWow64ProcessModule32FirstWModule32NextWGetCurrentProcessIdProcess32FirstWProcess32NextWZwOpenKeyZwCreateKeyZwSetValueKeyZwCloseCreateRemoteThreadNtQuerySystemInformationEnumPro$called `Result::unwrap()` on an `Err` value
                                                • API String ID: 1084755268-765071994
                                                • Opcode ID: f1c8b0e6c060211fb1766e29a7ba94a146872f52eb31716a581db07394a87e05
                                                • Instruction ID: c0176ab1d34d593e1e159966674b8899d620ca4e1bc8eb92164737b98f6cbdf7
                                                • Opcode Fuzzy Hash: f1c8b0e6c060211fb1766e29a7ba94a146872f52eb31716a581db07394a87e05
                                                • Instruction Fuzzy Hash: E872D676605B959AE7A1CF10E8847ED33E4FB08348F904239DA8C437A5EF7D9268C356

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1140 7ffe99ad29a0-7ffe99ad29f9 call 7ffe99ae0f60 1143 7ffe99ad2ce8-7ffe99ad2d4e call 7ffe99b0af30 1140->1143 1144 7ffe99ad29ff-7ffe99ad2b2d call 7ffe99b01dd0 memset 1140->1144 1151 7ffe99ad2d62-7ffe99ad2d6b 1143->1151 1152 7ffe99ad2d50-7ffe99ad2d5d call 7ffe99ae7bb0 1143->1152 1149 7ffe99ad2bda-7ffe99ad2bee OutputDebugStringW 1144->1149 1150 7ffe99ad2b33-7ffe99ad2b45 1144->1150 1155 7ffe99ad2bf0-7ffe99ad2bfc call 7ffe99ae7bb0 1149->1155 1156 7ffe99ad2c01-7ffe99ad2c12 1149->1156 1153 7ffe99ad2b47-7ffe99ad2b4f 1150->1153 1154 7ffe99ad2b51-7ffe99ad2b74 1150->1154 1152->1151 1158 7ffe99ad2bac-7ffe99ad2bbd 1153->1158 1159 7ffe99ad2b80-7ffe99ad2baa 1154->1159 1155->1156 1161 7ffe99ad2c27-7ffe99ad2c29 1156->1161 1162 7ffe99ad2c14-7ffe99ad2c1e 1156->1162 1166 7ffe99ad2bc0-7ffe99ad2bc7 1158->1166 1159->1158 1159->1159 1165 7ffe99ad2cc3-7ffe99ad2ccd 1161->1165 1163 7ffe99ad2c2e-7ffe99ad2c37 1162->1163 1164 7ffe99ad2c20-7ffe99ad2c25 1162->1164 1168 7ffe99ad2c40-7ffe99ad2c9f 1163->1168 1167 7ffe99ad2ca1-7ffe99ad2ca4 1164->1167 1169 7ffe99ad2cda-7ffe99ad2ce7 1165->1169 1170 7ffe99ad2ccf-7ffe99ad2cd5 call 7ffe99ae7bb0 1165->1170 1166->1149 1171 7ffe99ad2bc9-7ffe99ad2bd8 1166->1171 1167->1165 1172 7ffe99ad2ca6-7ffe99ad2ca9 1167->1172 1168->1167 1168->1168 1170->1169 1171->1149 1171->1166 1174 7ffe99ad2cb0-7ffe99ad2cc1 1172->1174 1174->1165 1174->1174
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset
                                                • String ID: Failed to encrypt function name
                                                • API String ID: 1084755268-2980051713
                                                • Opcode ID: e952cd8ba08672367ee5891e1b4cfda630dbc77aa4e7d0272bc00ad289f4a3cb
                                                • Instruction ID: 330a302850ecf8aa6e115695cbc1459063996d5c732bee318bd126821be78783
                                                • Opcode Fuzzy Hash: e952cd8ba08672367ee5891e1b4cfda630dbc77aa4e7d0272bc00ad289f4a3cb
                                                • Instruction Fuzzy Hash: 33A1AF72A14BD588EB308F64E8487EC7760FB55758F444239CE9C1BBAADFB89690C350

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1175 7ffe99ae2ad0-7ffe99ae2b04 memset 1176 7ffe99ae2baa-7ffe99ae2bc6 OutputDebugStringW 1175->1176 1177 7ffe99ae2b0a-7ffe99ae2b1c 1175->1177 1178 7ffe99ae2b28-7ffe99ae2b4b 1177->1178 1179 7ffe99ae2b1e-7ffe99ae2b26 1177->1179 1181 7ffe99ae2b50-7ffe99ae2b7a 1178->1181 1180 7ffe99ae2b7c-7ffe99ae2b8a 1179->1180 1182 7ffe99ae2b90-7ffe99ae2b97 1180->1182 1181->1180 1181->1181 1182->1176 1183 7ffe99ae2b99-7ffe99ae2ba8 1182->1183 1183->1176 1183->1182
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset
                                                • String ID:
                                                • API String ID: 1084755268-0
                                                • Opcode ID: 71e5a0ab9070645d2b623d502a8ac68524ab3ed1327f336b016f01bf93f7ca64
                                                • Instruction ID: 7eab602f69e122ab1f8d33c080551f150c3c3abef96ff5134db2f3705c7a92c6
                                                • Opcode Fuzzy Hash: 71e5a0ab9070645d2b623d502a8ac68524ab3ed1327f336b016f01bf93f7ca64
                                                • Instruction Fuzzy Hash: E9213A53F2869541EB308F64E1547BDA221DB967D4F509331DE0E13FAAEF5CC2818714

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2719 1e9ec5d64b0-1e9ec5d64ef 2720 1e9ec5d6503-1e9ec5d6509 2719->2720 2721 1e9ec5d7138-1e9ec5d7152 2720->2721 2722 1e9ec5d650f-1e9ec5d6555 call 1e9ec5d7c60 call 1e9ec5d7c40 LsaOpenPolicy 2720->2722 2727 1e9ec5d6557-1e9ec5d655f 2722->2727 2728 1e9ec5d6580-1e9ec5d65a9 call 1e9ec5d7c40 GetCurrentProcess OpenProcessToken 2722->2728 2730 1e9ec5d6566-1e9ec5d6574 call 1e9ec5d83a0 call 1e9ec5d8060 2727->2730 2733 1e9ec5d65af-1e9ec5d65c8 call 1e9ec5d7bd0 2728->2733 2734 1e9ec5d670a-1e9ec5d671e call 1e9ec5d7da0 2728->2734 2742 1e9ec5d67de-1e9ec5d6898 call 1e9ec5f1dd0 memset 2730->2742 2743 1e9ec5d657a 2730->2743 2745 1e9ec5d7153-1e9ec5d71be call 1e9ec5faae3 call 1e9ec5d7bb0 2733->2745 2746 1e9ec5d65ce-1e9ec5d660b GetTokenInformation 2733->2746 2734->2733 2744 1e9ec5d6724-1e9ec5d6727 2734->2744 2762 1e9ec5d689e-1e9ec5d68b0 2742->2762 2763 1e9ec5d693a-1e9ec5d694d OutputDebugStringW 2742->2763 2747 1e9ec5d69c0-1e9ec5d6a51 call 1e9ec5f1dd0 memset 2743->2747 2748 1e9ec5d6735-1e9ec5d6751 LsaClose 2744->2748 2749 1e9ec5d6729-1e9ec5d6730 call 1e9ec5d8dd0 2744->2749 2750 1e9ec5d6756-1e9ec5d6771 call 1e9ec5d7da0 2746->2750 2751 1e9ec5d6611-1e9ec5d66ab call 1e9ec5d54d0 LsaAddAccountRights LsaClose 2746->2751 2767 1e9ec5d6a57-1e9ec5d6a69 2747->2767 2768 1e9ec5d6afa-1e9ec5d6b0d OutputDebugStringW 2747->2768 2748->2730 2749->2748 2750->2751 2775 1e9ec5d6777-1e9ec5d677a 2750->2775 2771 1e9ec5d66b1-1e9ec5d66ea call 1e9ec5d83a0 call 1e9ec5d8060 2751->2771 2772 1e9ec5d697f-1e9ec5d6989 2751->2772 2773 1e9ec5d68b2-1e9ec5d68ba 2762->2773 2774 1e9ec5d68bc-1e9ec5d68db 2762->2774 2769 1e9ec5d6960-1e9ec5d6968 2763->2769 2770 1e9ec5d694f-1e9ec5d695b call 1e9ec5d7bb0 2763->2770 2776 1e9ec5d6a75-1e9ec5d6a94 2767->2776 2777 1e9ec5d6a6b-1e9ec5d6a73 2767->2777 2781 1e9ec5d6b20-1e9ec5d6b57 call 1e9ec5d7c40 GetCurrentProcess OpenProcessToken 2768->2781 2782 1e9ec5d6b0f-1e9ec5d6b1b call 1e9ec5d7bb0 2768->2782 2779 1e9ec5d696e-1e9ec5d697a call 1e9ec5d8dd0 2769->2779 2780 1e9ec5d6500 2769->2780 2770->2769 2814 1e9ec5d67bd-1e9ec5d67d8 call 1e9ec5d7bb0 2771->2814 2815 1e9ec5d66f0-1e9ec5d6705 call 1e9ec5d7bb0 2771->2815 2783 1e9ec5d699c-1e9ec5d69b3 call 1e9ec5d7bb0 2772->2783 2784 1e9ec5d698b-1e9ec5d6997 call 1e9ec5d7bb0 2772->2784 2786 1e9ec5d690c-1e9ec5d691d 2773->2786 2787 1e9ec5d68e0-1e9ec5d690a 2774->2787 2788 1e9ec5d6788-1e9ec5d67b6 LsaClose call 1e9ec5d83a0 call 1e9ec5d8060 2775->2788 2789 1e9ec5d677c-1e9ec5d6783 call 1e9ec5d8dd0 2775->2789 2793 1e9ec5d6aa0-1e9ec5d6aca 2776->2793 2792 1e9ec5d6acc-1e9ec5d6add 2777->2792 2779->2780 2780->2720 2810 1e9ec5d6ce2-1e9ec5d6ce9 call 1e9ec5d7da0 2781->2810 2811 1e9ec5d6b5d-1e9ec5d6bc7 call 1e9ec5d5900 call 1e9ec5d7c50 LookupPrivilegeValueW 2781->2811 2782->2781 2783->2747 2784->2783 2797 1e9ec5d6920-1e9ec5d6927 2786->2797 2787->2786 2787->2787 2788->2814 2789->2788 2803 1e9ec5d6ae0-1e9ec5d6ae7 2792->2803 2793->2792 2793->2793 2797->2763 2801 1e9ec5d6929-1e9ec5d6938 2797->2801 2801->2763 2801->2797 2803->2768 2809 1e9ec5d6ae9-1e9ec5d6af8 2803->2809 2809->2768 2809->2803 2825 1e9ec5d6e17-1e9ec5d6ed1 call 1e9ec5f1dd0 memset 2810->2825 2826 1e9ec5d6cef 2810->2826 2829 1e9ec5d6cf4-1e9ec5d6cfb call 1e9ec5d7da0 2811->2829 2830 1e9ec5d6bcd-1e9ec5d6c10 AdjustTokenPrivileges 2811->2830 2814->2742 2814->2747 2815->2814 2835 1e9ec5d6ed7-1e9ec5d6ee9 2825->2835 2836 1e9ec5d703a-1e9ec5d704d OutputDebugStringW 2825->2836 2826->2811 2846 1e9ec5d6de5-1e9ec5d6def 2829->2846 2847 1e9ec5d6d01 2829->2847 2833 1e9ec5d6d06-1e9ec5d6d0d call 1e9ec5d7da0 2830->2833 2834 1e9ec5d6c16-1e9ec5d6c24 GetLastError 2830->2834 2833->2846 2860 1e9ec5d6d13 2833->2860 2841 1e9ec5d6d18-1e9ec5d6d22 2834->2841 2842 1e9ec5d6c2a-1e9ec5d6cbb call 1e9ec5f1dd0 memset 2834->2842 2837 1e9ec5d6fb8-1e9ec5d6fd7 2835->2837 2838 1e9ec5d6eef-1e9ec5d6ef7 2835->2838 2843 1e9ec5d7060-1e9ec5d7068 2836->2843 2844 1e9ec5d704f-1e9ec5d705b call 1e9ec5d7bb0 2836->2844 2848 1e9ec5d6fe0-1e9ec5d700a 2837->2848 2845 1e9ec5d700c-1e9ec5d701d 2838->2845 2850 1e9ec5d6d28-1e9ec5d6d39 call 1e9ec5d7bb0 2841->2850 2851 1e9ec5d6efc-1e9ec5d6f8d call 1e9ec5f1dd0 memset 2841->2851 2869 1e9ec5d6cc1-1e9ec5d6cd3 2842->2869 2870 1e9ec5d6dba-1e9ec5d6dcd OutputDebugStringW 2842->2870 2853 1e9ec5d706e-1e9ec5d707d call 1e9ec5d8dd0 2843->2853 2854 1e9ec5d7130-1e9ec5d7133 2843->2854 2844->2843 2861 1e9ec5d7020-1e9ec5d7027 2845->2861 2858 1e9ec5d6df1-1e9ec5d6e0c call 1e9ec5d7bb0 2846->2858 2859 1e9ec5d6e0f-1e9ec5d6e11 2846->2859 2847->2833 2848->2845 2848->2848 2850->2851 2873 1e9ec5d6f93-1e9ec5d6fa5 2851->2873 2874 1e9ec5d710a-1e9ec5d711d OutputDebugStringW 2851->2874 2853->2720 2854->2720 2858->2859 2859->2825 2859->2851 2860->2834 2861->2836 2865 1e9ec5d7029-1e9ec5d7038 2861->2865 2865->2836 2865->2861 2876 1e9ec5d6cd5-1e9ec5d6cdd 2869->2876 2877 1e9ec5d6d3e-1e9ec5d6d5d 2869->2877 2871 1e9ec5d6de0 call 1e9ec5d7da0 2870->2871 2872 1e9ec5d6dcf-1e9ec5d6ddb call 1e9ec5d7bb0 2870->2872 2871->2846 2872->2871 2878 1e9ec5d7082-1e9ec5d70ae 2873->2878 2879 1e9ec5d6fab-1e9ec5d6fb3 2873->2879 2874->2854 2883 1e9ec5d711f-1e9ec5d712b call 1e9ec5d7bb0 2874->2883 2884 1e9ec5d6d8c-1e9ec5d6d9d 2876->2884 2880 1e9ec5d6d60-1e9ec5d6d8a 2877->2880 2886 1e9ec5d70b0-1e9ec5d70da 2878->2886 2887 1e9ec5d70dc-1e9ec5d70ed 2879->2887 2880->2880 2880->2884 2883->2854 2885 1e9ec5d6da0-1e9ec5d6da7 2884->2885 2885->2870 2889 1e9ec5d6da9-1e9ec5d6db8 2885->2889 2886->2886 2886->2887 2890 1e9ec5d70f0-1e9ec5d70f7 2887->2890 2889->2870 2889->2885 2890->2874 2891 1e9ec5d70f9-1e9ec5d7108 2890->2891 2891->2874 2891->2890
                                                APIs
                                                Strings
                                                • Failed to add privilegeFailed to get token informationFailed to open process tokenFailed to open LSA policyAdjustTokenPrivileges failed with error: , xrefs: 000001E9EC5D66C0
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: ErrorOpenProcessTokenmemset$AccountCloseCurrentDebugInfoInformationOriginateOutputPolicyRightsString
                                                • String ID: Failed to add privilegeFailed to get token informationFailed to open process tokenFailed to open LSA policyAdjustTokenPrivileges failed with error:
                                                • API String ID: 4216219486-1190080770
                                                • Opcode ID: f0365ac049b538c78f0e95891fd3e23798699803a5e5b600bb6fa08e43e87c79
                                                • Instruction ID: 372dd262aedeef38b53e136ac211ca60adc7905f11c6a135d7cdd473db0eb91c
                                                • Opcode Fuzzy Hash: f0365ac049b538c78f0e95891fd3e23798699803a5e5b600bb6fa08e43e87c79
                                                • Instruction Fuzzy Hash: EE629272725BC089EB78DF21D8547DE2761F745788F84822ADF894BB99EF398246C340
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset
                                                • String ID: %$&$.$C:\Windows\Temp\tempdll.dllReading DLL from disk at path: $CreateToolhelp32SnapshotModule32FirstWModule32NextWThread32FirstThread32NextOpenThreadSuspendThreadResumeThreadGetProcessIdOfThreadNtCloseC:\Users\Harrison\.rustup\toolchains\nightly-x86_64-pc-windows-msvc\lib/rustlib/src/rust\library\alloc\src\raw_vec.rs$Injecting DLL into the target process...DLL injected successfully into target process ID: $OfThread$arenegyl$called `Result::unwrap()` on an `Err` valueC:\Users\Harrison\.rustup\toolchains\nightly-x86_64-pc-windows-msvc\lib/rustlib/src/rust\library\alloc\src\slice.rs$kernel32.dllNtCreateSectionNtMapViewOfSectionNtOpenFileZwOpenKeyZwCreateKeyZwSetValueKeyZwCloseVirtualAllocExGetCurrentProcessIdOpenProcessCloseHandleWriteProcessMemoryCreateToolhelp32SnapshotModule32FirstWModule32NextWThread32FirstThread32NextOpenThreadSuspen$modnarod$rocessId$setybdep$uespemos
                                                • API String ID: 1084755268-4246452893
                                                • Opcode ID: adfbac403abdf54412c57a0255b7050f6983f4b6456407f91f50882bd3c586fc
                                                • Instruction ID: d36aed53f9c13bee81cb8e7bd1dc377e2939613d5ce31be4fe0ff237b232d89d
                                                • Opcode Fuzzy Hash: adfbac403abdf54412c57a0255b7050f6983f4b6456407f91f50882bd3c586fc
                                                • Instruction Fuzzy Hash: 08D25832619BC089EB69DF20E8547ED33A4F785788F544226DFC95BB99EF788684C340
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset$memcmpstrlen
                                                • String ID: c
                                                • API String ID: 2294051181-112844655
                                                • Opcode ID: aa4935efa726f5b0d85e02858928254634528146cad2ae050e304662c9da26b0
                                                • Instruction ID: 4ffeca8decfa2127936006c90a246d26f7b7313b65a61f198eb8c402187f6d81
                                                • Opcode Fuzzy Hash: aa4935efa726f5b0d85e02858928254634528146cad2ae050e304662c9da26b0
                                                • Instruction Fuzzy Hash: 77E16D32618BC485EB29CB25E4457EEB7A1FB95785F804215DFC953B99EF38C185CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset
                                                • String ID: arenegyl$modnarod$setybdet$uespemos
                                                • API String ID: 1084755268-66988881
                                                • Opcode ID: c06fe066c2c51e97055d11419c6965f910673c575a8c079ae1b182c6852b61e7
                                                • Instruction ID: a0ac8920f50216d61392183c5553b15e8aa25b0cd5be31941735aa1032271e4b
                                                • Opcode Fuzzy Hash: c06fe066c2c51e97055d11419c6965f910673c575a8c079ae1b182c6852b61e7
                                                • Instruction Fuzzy Hash: 9D22A072A15BC089FB69CFA0E8547DD2361F755798F408226DF895BB9AEF38C285C340
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset$memcpy
                                                • String ID: arenegyl$called `Result::unwrap()` on an `Err` value$modnarod$setybdet$uespemos
                                                • API String ID: 293864031-2410307170
                                                • Opcode ID: eb2fe97cf8fb7ed79596155638160da53a240791291b21dd57310361de979c4c
                                                • Instruction ID: eebd5d3f470dac4ab4c006e85bb1fbd9bcce88869a4e08f92eb4ac2786cfaf57
                                                • Opcode Fuzzy Hash: eb2fe97cf8fb7ed79596155638160da53a240791291b21dd57310361de979c4c
                                                • Instruction Fuzzy Hash: 7102F372715BC089EB29CF60D8947ED3361F745798F408626DF995BB9AEF388245C340
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 313767242-0
                                                • Opcode ID: ad4ee760863346af12ab9c2fcb83e68bcaeda163bf42e38de1a9b78bbba1fd07
                                                • Instruction ID: 48a9473355ac0eb0e2e9cd4a2859773e08af4facbd92502104de571335272d97
                                                • Opcode Fuzzy Hash: ad4ee760863346af12ab9c2fcb83e68bcaeda163bf42e38de1a9b78bbba1fd07
                                                • Instruction Fuzzy Hash: F73110B2609B858AEB709F60E8507ED7364FB84744F444039DA4E47BA9EF3DD648C728
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 313767242-0
                                                • Opcode ID: ad4ee760863346af12ab9c2fcb83e68bcaeda163bf42e38de1a9b78bbba1fd07
                                                • Instruction ID: 40bde4576163ceef4d506bb3a159b6b5b2cc1e86ffa2659200338fa93f451cad
                                                • Opcode Fuzzy Hash: ad4ee760863346af12ab9c2fcb83e68bcaeda163bf42e38de1a9b78bbba1fd07
                                                • Instruction Fuzzy Hash: B431F872209BC08AEB68DF60E8507EE6364F785748F44442ADF8E47B99DF78C658CB14
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: Error$FileFormatHandleLastMessageModuleObjectSingleStatusWaitWrite
                                                • String ID: NTDLL.DLL
                                                • API String ID: 415079386-1613819793
                                                • Opcode ID: ae30bc12579a4fd44caf334d2ac3c060800a7f7f116e97185e49df4c551f6b29
                                                • Instruction ID: 41de631bad406565a919c003e87fac4c648b1965d30b474ccada934627dd8183
                                                • Opcode Fuzzy Hash: ae30bc12579a4fd44caf334d2ac3c060800a7f7f116e97185e49df4c551f6b29
                                                • Instruction Fuzzy Hash: E4D18272A09B8299F7358F24D9447EC36A4FB443A4F544235DA5E07BA8EFBC96C5C320
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: Error$FileFormatHandleLastMessageModuleObjectSingleStatusWaitWrite
                                                • String ID: NTDLL.DLL
                                                • API String ID: 415079386-1613819793
                                                • Opcode ID: 0dc03c870cc34e79efa0c312cbd82a3526a7be48651888c90e9b879ce0f25483
                                                • Instruction ID: bb76f33de519db5370ca5b960507e452525d7056c1b370b8617405a089533572
                                                • Opcode Fuzzy Hash: 0dc03c870cc34e79efa0c312cbd82a3526a7be48651888c90e9b879ce0f25483
                                                • Instruction Fuzzy Hash: 71D19B32619BC199EB39CF28E8407ED27A4F744798F544226DFDA46BD8DF788685E300
                                                APIs
                                                Strings
                                                • C:\Windows\Temp\tempdll.dllReading DLL from disk at path: , xrefs: 000001E9EC5E80E9
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: CloseFind$FileFirstHandlememset
                                                • String ID: C:\Windows\Temp\tempdll.dllReading DLL from disk at path:
                                                • API String ID: 4181070385-2284096931
                                                • Opcode ID: 1f5d8e78e5529ffb2bb3d7fecbd4bdf1ebe20296fd3f760c43f0ae97025c0489
                                                • Instruction ID: 9ec48e29158c767d0ab423851bc20b5020b3f3648524c3dabab15290b2bc62ed
                                                • Opcode Fuzzy Hash: 1f5d8e78e5529ffb2bb3d7fecbd4bdf1ebe20296fd3f760c43f0ae97025c0489
                                                • Instruction Fuzzy Hash: 65517E72604BC08AE778CF66E8943EE77A0F7557A8F104215CFA90BB9ADF789185D700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: memset
                                                • String ID: arenegyl$modnarod$setybdet$uespemos
                                                • API String ID: 2221118986-66988881
                                                • Opcode ID: 7850b9a25abebf8a805a91993aa305af0fc4939c406f044a0eb7ba2218ce80cf
                                                • Instruction ID: 2cd5aa575e7c92d129447df9888a02dafd7c08a94331552b26d3c4b1f224c842
                                                • Opcode Fuzzy Hash: 7850b9a25abebf8a805a91993aa305af0fc4939c406f044a0eb7ba2218ce80cf
                                                • Instruction Fuzzy Hash: 2BA12062B197D486EE58DB29A8113DE6691F302BE4F489721DFEC5B7C0EF38C281D200
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: memset
                                                • String ID: arenegyl$modnarod$setybdet$uespemos
                                                • API String ID: 2221118986-66988881
                                                • Opcode ID: 847e34ae381857511d2cef68fb33d9049ba522e82b940c28283977987dcc6b78
                                                • Instruction ID: f7a0557b219a275a086f0ce65c862e5680f13ab4d963275d4d5d7dade08340df
                                                • Opcode Fuzzy Hash: 847e34ae381857511d2cef68fb33d9049ba522e82b940c28283977987dcc6b78
                                                • Instruction Fuzzy Hash: 54A18AA2F1A79946FE309F69A8012AE6651FB04BE4F485731DE6C177E4EE3DD241C204
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: memset
                                                • String ID: arenegyl$modnarod$setybdet$uespemos
                                                • API String ID: 2221118986-66988881
                                                • Opcode ID: 847e34ae381857511d2cef68fb33d9049ba522e82b940c28283977987dcc6b78
                                                • Instruction ID: 47ab95de27fefa929301af9009d73ecef2d39ec4bf5d8c7d9cf3c42520309844
                                                • Opcode Fuzzy Hash: 847e34ae381857511d2cef68fb33d9049ba522e82b940c28283977987dcc6b78
                                                • Instruction Fuzzy Hash: 39A11372B19BD486EE58DF29A8113DE6691B746BE4F889721DFAC5B7C0EF38C141D200
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: memset
                                                • String ID: arenegyl$modnarod$setybdet$uespemos
                                                • API String ID: 2221118986-66988881
                                                • Opcode ID: 7bc7b56c58e87379a11c0b7f58ff09954355a8998299991405329364fdf03c45
                                                • Instruction ID: cedf1ae23610af389cddc24ddb056105e4d7630410737f5cc55ed8d9d5ababe9
                                                • Opcode Fuzzy Hash: 7bc7b56c58e87379a11c0b7f58ff09954355a8998299991405329364fdf03c45
                                                • Instruction Fuzzy Hash: 8AA13976B28BE482FA58DF29E4047DF6A52B305BE8F985711DFA9573C1DB78C941C200
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: ErrorLast$FullNamePathmemcpy
                                                • String ID: \\?\$\\?\UNC\$internal error: entered unreachable code/rustc/a4cb3c831823d9baa56c3d90514b75b2660116fa\library\alloc\src\vec\mod.rs
                                                • API String ID: 674145353-264738257
                                                • Opcode ID: cdc58f047174edbe09fe1bb4429721cd42af564c8b086c4d9d49d9129386da63
                                                • Instruction ID: 70f9c31b1b1a85d6c6c979113efe4242db40e6d893cf07d0da2fe2ffb3fe9142
                                                • Opcode Fuzzy Hash: cdc58f047174edbe09fe1bb4429721cd42af564c8b086c4d9d49d9129386da63
                                                • Instruction Fuzzy Hash: 450289B2608BE0CAEB79DB25D9443ED23A5F704B98F408526DFD94B798DF74C681A300
                                                APIs
                                                Strings
                                                • internal error: entered unreachable code/rustc/a4cb3c831823d9baa56c3d90514b75b2660116fa\library\alloc\src\vec\mod.rs, xrefs: 00007FFE99AF1C90
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: ErrorLast$EnvironmentVariable
                                                • String ID: internal error: entered unreachable code/rustc/a4cb3c831823d9baa56c3d90514b75b2660116fa\library\alloc\src\vec\mod.rs
                                                • API String ID: 2691138088-1438511490
                                                • Opcode ID: 42836bdd331fd01704c8ac91f60ebe6b4309310be564457133c9afcc5b2bb3bc
                                                • Instruction ID: d7a1d1d9be09fd735eceadace083b82e081ed0cbe844b154b379a73fcb96d5d9
                                                • Opcode Fuzzy Hash: 42836bdd331fd01704c8ac91f60ebe6b4309310be564457133c9afcc5b2bb3bc
                                                • Instruction Fuzzy Hash: 44A19EA2B04AC585EB718F62D8843ED3364FB54B98F048235CE5D5BBA9DF78D6C18360
                                                APIs
                                                Strings
                                                • internal error: entered unreachable code/rustc/a4cb3c831823d9baa56c3d90514b75b2660116fa\library\alloc\src\vec\mod.rs, xrefs: 000001E9EC5E1C90
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: ErrorLast$EnvironmentVariable
                                                • String ID: internal error: entered unreachable code/rustc/a4cb3c831823d9baa56c3d90514b75b2660116fa\library\alloc\src\vec\mod.rs
                                                • API String ID: 2691138088-1438511490
                                                • Opcode ID: 3fb882367e22ef1d7c2ebb5f5477e9d9569ced35f9baaf2c896a372a48ba444d
                                                • Instruction ID: f3e902a4786ff44e14b6b1300bce06f7f20ae25091436b959ecc1e23d328d564
                                                • Opcode Fuzzy Hash: 3fb882367e22ef1d7c2ebb5f5477e9d9569ced35f9baaf2c896a372a48ba444d
                                                • Instruction Fuzzy Hash: D0A158B2204BC489EB79CF26D8543EE2365F744B98F048129EF9D5BB9ADF34C2819351
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: ErrorLast$CloseHandle
                                                • String ID:
                                                • API String ID: 3463825546-0
                                                • Opcode ID: 7fd1b3aded18135650c0e9b403aca52676852183c9535f50630510857dd445c3
                                                • Instruction ID: 8f9f8c126f794d57ff4e515a27b397a52857ca3dc234ecfcac3ff9c50e89a370
                                                • Opcode Fuzzy Hash: 7fd1b3aded18135650c0e9b403aca52676852183c9535f50630510857dd445c3
                                                • Instruction Fuzzy Hash: 0171CFB160C6D44AFB2ECB21D5447ED2AE5A755BE8F148519CFC907BC8EE29C846A310
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: Handle$CloseConsoleErrorLastMode
                                                • String ID: called `Result::unwrap()` on an `Err` value
                                                • API String ID: 1170577072-2333694755
                                                • Opcode ID: 4d2a2789e7f7f2f7adcc169b016dc3608063e037644578440fc4f490b8169932
                                                • Instruction ID: 21efc44d2c7ad8388445c0cada0dda6f5598069e6cfedf4182a10c92dbd1b588
                                                • Opcode Fuzzy Hash: 4d2a2789e7f7f2f7adcc169b016dc3608063e037644578440fc4f490b8169932
                                                • Instruction Fuzzy Hash: 3791B162A08B8689FB308F65E5043FD3760EF147A8F448231DE5E52AA9EF7CD185C324
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: Handle$CloseConsoleErrorLastMode
                                                • String ID: called `Result::unwrap()` on an `Err` value
                                                • API String ID: 1170577072-2333694755
                                                • Opcode ID: 1a931da6d844fcf82843d3df45dfb9b7a8a6155efccbd12fbcb61feaec07c7cb
                                                • Instruction ID: 5f95bbe6a705587090e47f3a42517e5431b2011172966e5276192a2ac710a25b
                                                • Opcode Fuzzy Hash: 1a931da6d844fcf82843d3df45dfb9b7a8a6155efccbd12fbcb61feaec07c7cb
                                                • Instruction Fuzzy Hash: B891BC72608BD08CFB29CBA9E9413ED27A0B725798F448222DFD917B99DF38C185D310
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
                                                • String ID:
                                                • API String ID: 1956605914-0
                                                • Opcode ID: e774be1eaafd22d3717303af73d03c4c675adf8e946f387759df2666e0976de1
                                                • Instruction ID: d0423ca459e4b42db98396f2b6d30e49a61bce2a846a2bc8f9bc9d62c69cfff6
                                                • Opcode Fuzzy Hash: e774be1eaafd22d3717303af73d03c4c675adf8e946f387759df2666e0976de1
                                                • Instruction Fuzzy Hash: CE51AE72A0869685F7308F65D9483FE6252FB44BA4F444231E94E47AE8EFBDA5C58320
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
                                                • String ID:
                                                • API String ID: 1956605914-0
                                                • Opcode ID: e774be1eaafd22d3717303af73d03c4c675adf8e946f387759df2666e0976de1
                                                • Instruction ID: 47724826fb8e950d5554ee8db481d71e6198c985120ebfe00b9c16840b7b1fad
                                                • Opcode Fuzzy Hash: e774be1eaafd22d3717303af73d03c4c675adf8e946f387759df2666e0976de1
                                                • Instruction Fuzzy Hash: 6A51DF726087D189F739CB64E8483EE6252F744B94F844231EFC99BBD8EF398585A300
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3685457042.00007FFE99AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFE99AD0000, based on PE: true
                                                • Associated: 00000002.00000002.3684558307.00007FFE99AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3686700641.00007FFE99B0C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3687675474.00007FFE99B21000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3688518188.00007FFE99B22000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_7ffe99ad0000_cmd.jbxd
                                                Similarity
                                                • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                • String ID:
                                                • API String ID: 2933794660-0
                                                • Opcode ID: 9006692ecece78be87c8b48e9331bceba46c8bb88b90ffb5ac0db0e4ab0f6dd8
                                                • Instruction ID: 95cfe2c3ead3fa5de32590fb464c6b0017bc337b40d7b120f139bbc38b4bf2fc
                                                • Opcode Fuzzy Hash: 9006692ecece78be87c8b48e9331bceba46c8bb88b90ffb5ac0db0e4ab0f6dd8
                                                • Instruction Fuzzy Hash: 5E113C26B14F058AEB20CF60E8552BD33A4FB19B58F440E31EA6D477A8EF7CD5948350
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                • String ID:
                                                • API String ID: 2933794660-0
                                                • Opcode ID: 9006692ecece78be87c8b48e9331bceba46c8bb88b90ffb5ac0db0e4ab0f6dd8
                                                • Instruction ID: dcfc548bc5c9fe565496493ef5e62ab6889b25c2f837101d16a724f6006f18a2
                                                • Opcode Fuzzy Hash: 9006692ecece78be87c8b48e9331bceba46c8bb88b90ffb5ac0db0e4ab0f6dd8
                                                • Instruction Fuzzy Hash: A8111836714BC18AEB04CB60E8553AD33B4F319B59F440E25EFAD867A4DF78D5A88740
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset
                                                • String ID: Failed to encrypt function name
                                                • API String ID: 1084755268-2980051713
                                                • Opcode ID: 3b17a0b8c7044f3955418983333a695e11199cf6e9448208612b6090d4ebe569
                                                • Instruction ID: 5c22803d27f343fa1757ceb5c31e855cdd53f58d1ac03ddba875b65f6d91a787
                                                • Opcode Fuzzy Hash: 3b17a0b8c7044f3955418983333a695e11199cf6e9448208612b6090d4ebe569
                                                • Instruction Fuzzy Hash: D5A1AD73A14BD088EB35CF64E844BEC6760F755798F448629CF985BB9ADF788294C380
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.3678364031.000001E9EC5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 000001E9EC5C0000, based on PE: true
                                                • Associated: 00000002.00000002.3677555074.000001E9EC5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3679635109.000001E9EC5FC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3680635130.000001E9EC611000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000002.00000002.3681419955.000001E9EC612000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_1e9ec5c0000_cmd.jbxd
                                                Similarity
                                                • API ID: DebugOutputStringmemset
                                                • String ID: LL file.
                                                • API String ID: 1084755268-1255835901
                                                • Opcode ID: aa5c5458ee5261e837a4428924d09fd7038ad6956e4f0886f84691be4aa59aec
                                                • Instruction ID: 97ae2be77830c09d5dd76c6f37715925c83cbf089215b969518e798917e09189
                                                • Opcode Fuzzy Hash: aa5c5458ee5261e837a4428924d09fd7038ad6956e4f0886f84691be4aa59aec
                                                • Instruction Fuzzy Hash: A0717D32615BC488EB69CF21D8507ED2760F789B88F44812ADF895BB99EF35D685C340