Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xmr.exe

Overview

General Information

Sample name:xmr.exe
Analysis ID:1585418
MD5:154202154e41175e801a698ca940eb0c
SHA1:6ce074d67c91cb00016cb1095319b00afab396a8
SHA256:0612bfb5a51b0b413ba960f7d52bc647bd4cf7530fd760c0d6006aa829e806e2
Tags:CoinMinerexeuser-aachum
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Stop EventLog
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Loading BitLocker PowerShell Module
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Writes to foreign memory regions
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • xmr.exe (PID: 7660 cmdline: "C:\Users\user\Desktop\xmr.exe" MD5: 154202154E41175E801A698CA940EB0C)
    • powershell.exe (PID: 7712 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7884 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • cmd.exe (PID: 7940 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wusa.exe (PID: 8016 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
    • sc.exe (PID: 7948 cmdline: C:\Windows\system32\sc.exe stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 7964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 8036 cmdline: C:\Windows\system32\sc.exe stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 8044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 8080 cmdline: C:\Windows\system32\sc.exe stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 8088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 8120 cmdline: C:\Windows\system32\sc.exe stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 8128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 8168 cmdline: C:\Windows\system32\sc.exe stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 8176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • dialer.exe (PID: 7188 cmdline: C:\Windows\system32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
      • winlogon.exe (PID: 556 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
      • lsass.exe (PID: 640 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
      • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dwm.exe (PID: 984 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
      • svchost.exe (PID: 364 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 372 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 772 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 888 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 660 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1044 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1200 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1224 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1352 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1392 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1404 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1412 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1476 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1596 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1648 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1704 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1716 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1740 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1800 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1876 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 2012 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • sc.exe (PID: 3636 cmdline: C:\Windows\system32\sc.exe delete "ARIBLEUL" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 3344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 1848 cmdline: C:\Windows\system32\sc.exe create "ARIBLEUL" binpath= "C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe" start= "auto" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 7256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 2168 cmdline: C:\Windows\system32\sc.exe stop eventlog MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 1984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 1976 cmdline: C:\Windows\system32\sc.exe start "ARIBLEUL" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 1928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • lrgkmixyjzta.exe (PID: 2340 cmdline: C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe MD5: 154202154E41175E801A698CA940EB0C)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\xmr.exe", ParentImage: C:\Users\user\Desktop\xmr.exe, ParentProcessId: 7660, ParentProcessName: xmr.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 7712, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\xmr.exe", ParentImage: C:\Users\user\Desktop\xmr.exe, ParentProcessId: 7660, ParentProcessName: xmr.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 7712, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\system32\dialer.exe, ParentImage: C:\Windows\System32\dialer.exe, ParentProcessId: 7188, ParentProcessName: dialer.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 920, ProcessName: svchost.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: C:\Windows\system32\sc.exe create "ARIBLEUL" binpath= "C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe" start= "auto", CommandLine: C:\Windows\system32\sc.exe create "ARIBLEUL" binpath= "C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe" start= "auto", CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\Desktop\xmr.exe", ParentImage: C:\Users\user\Desktop\xmr.exe, ParentProcessId: 7660, ParentProcessName: xmr.exe, ProcessCommandLine: C:\Windows\system32\sc.exe create "ARIBLEUL" binpath= "C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe" start= "auto", ProcessId: 1848, ProcessName: sc.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\xmr.exe", ParentImage: C:\Users\user\Desktop\xmr.exe, ParentProcessId: 7660, ParentProcessName: xmr.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 7712, ProcessName: powershell.exe

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\sc.exe stop eventlog, CommandLine: C:\Windows\system32\sc.exe stop eventlog, CommandLine|base64offset|contains: ), Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\Desktop\xmr.exe", ParentImage: C:\Users\user\Desktop\xmr.exe, ParentProcessId: 7660, ParentProcessName: xmr.exe, ProcessCommandLine: C:\Windows\system32\sc.exe stop eventlog, ProcessId: 2168, ProcessName: sc.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exeReversingLabs: Detection: 76%
Source: xmr.exeReversingLabs: Detection: 76%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: xmr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC1DCE0 FindFirstFileExW,4_2_000001F25AC1DCE0
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E99175DCE0 FindFirstFileExW,23_2_000002E99175DCE0
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCEDCE0 FindFirstFileExW,28_2_00000213BDCEDCE0
Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000158709DDCE0 FindFirstFileExW,30_2_00000158709DDCE0
Source: C:\Windows\System32\dwm.exeCode function: 31_2_0000026DB16DDCE0 FindFirstFileExW,31_2_0000026DB16DDCE0
Source: C:\Windows\System32\svchost.exeCode function: 32_2_000002A3F066DCE0 FindFirstFileExW,32_2_000002A3F066DCE0
Source: C:\Windows\System32\svchost.exeCode function: 33_2_000002C9AFBBDCE0 FindFirstFileExW,33_2_000002C9AFBBDCE0
Source: C:\Windows\System32\svchost.exeCode function: 34_2_000002C06FD4DCE0 FindFirstFileExW,34_2_000002C06FD4DCE0
Source: C:\Windows\System32\svchost.exeCode function: 35_2_000002917C3BDCE0 FindFirstFileExW,35_2_000002917C3BDCE0
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002238278DCE0 FindFirstFileExW,36_2_000002238278DCE0
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000028A1B88DCE0 FindFirstFileExW,37_2_0000028A1B88DCE0
Source: C:\Windows\System32\svchost.exeCode function: 38_2_000001486AD7DCE0 FindFirstFileExW,38_2_000001486AD7DCE0
Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000024BD3CDDCE0 FindFirstFileExW,39_2_0000024BD3CDDCE0
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001FA73D6DCE0 FindFirstFileExW,40_2_000001FA73D6DCE0
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD0240DCE0 FindFirstFileExW,41_2_000001CD0240DCE0
Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA66DCE0 FindFirstFileExW,42_2_00000269BA66DCE0
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000022054DBDCE0 FindFirstFileExW,43_2_0000022054DBDCE0
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000027C57DDDCE0 FindFirstFileExW,44_2_0000027C57DDDCE0
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A333B7DCE0 FindFirstFileExW,45_2_000002A333B7DCE0
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000001F17456DCE0 FindFirstFileExW,46_2_000001F17456DCE0
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000002331577DCE0 FindFirstFileExW,47_2_000002331577DCE0
Source: lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484316271.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
Source: lsass.exe, 0000001C.00000002.2727831855.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484316271.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2725471719.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484198639.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2727063204.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: lsass.exe, 0000001C.00000000.1483799757.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2718147779.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484227127.00000213BD471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2726112210.00000213BD471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
Source: lsass.exe, 0000001C.00000002.2732193110.00000213BD613000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2723251844.00000213BD400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
Source: lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484316271.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
Source: lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484316271.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: lsass.exe, 0000001C.00000000.1483799757.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2718147779.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484227127.00000213BD471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2726112210.00000213BD471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 0000001C.00000002.2727831855.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484316271.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2725471719.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484198639.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2727063204.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: lsass.exe, 0000001C.00000002.2732193110.00000213BD613000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2723251844.00000213BD400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
Source: lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484316271.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
Source: lsass.exe, 0000001C.00000002.2727831855.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484316271.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2725471719.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484198639.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2727063204.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484316271.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: lsass.exe, 0000001C.00000000.1483908790.00000213BCEB8000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2720639866.00000213BCEB8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: lsass.exe, 0000001C.00000002.2723251844.00000213BD400000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484058252.00000213BD400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: lsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
Source: lsass.exe, 0000001C.00000000.1483799757.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2718147779.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
Source: lsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: lsass.exe, 0000001C.00000002.2732193110.00000213BD613000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2727831855.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484316271.00000213BD551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2725471719.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484198639.00000213BD460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1483799757.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2723251844.00000213BD400000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2718147779.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2727063204.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484227127.00000213BD471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484316271.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2726112210.00000213BD471000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
Source: lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484316271.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
Source: lsass.exe, 0000001C.00000002.2727063204.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
Source: lsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
Source: lsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: lsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1483799757.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2718147779.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
Source: lsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: lsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
Source: lsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
Source: lsass.exe, 0000001C.00000000.1484277029.00000213BD4BD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1484316271.00000213BD5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: C:\Windows\System32\dialer.exeCode function: 18_2_00000001400010C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,18_2_00000001400010C0
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E9917528C8 NtEnumerateValueKey,NtEnumerateValueKey,23_2_000002E9917528C8
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCE253C NtQueryDirectoryFileEx,GetFileType,StrCpyW,28_2_00000213BDCE253C
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCE202C NtQuerySystemInformation,StrCmpNIW,28_2_00000213BDCE202C
Source: C:\Windows\System32\dwm.exeCode function: 31_2_0000026DB16D28C8 NtEnumerateValueKey,NtEnumerateValueKey,31_2_0000026DB16D28C8
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002238278202C NtQuerySystemInformation,StrCmpNIW,36_2_000002238278202C
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25ABE1F2C4_2_000001F25ABE1F2C
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25ABF38A84_2_000001F25ABF38A8
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25ABED0E04_2_000001F25ABED0E0
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC12B2C4_2_000001F25AC12B2C
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC244A84_2_000001F25AC244A8
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC1DCE04_2_000001F25AC1DCE0
Source: C:\Windows\System32\dialer.exeCode function: 18_2_000000014000226C18_2_000000014000226C
Source: C:\Windows\System32\dialer.exeCode function: 18_2_00000001400014D818_2_00000001400014D8
Source: C:\Windows\System32\dialer.exeCode function: 18_2_000000014000256018_2_0000000140002560
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E991721F2C23_2_000002E991721F2C
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E99172D0E023_2_000002E99172D0E0
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E9917338A823_2_000002E9917338A8
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E991752B2C23_2_000002E991752B2C
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E99175DCE023_2_000002E99175DCE0
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E9917644A823_2_000002E9917644A8
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCBD0E028_2_00000213BDCBD0E0
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCC38A828_2_00000213BDCC38A8
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCB1F2C28_2_00000213BDCB1F2C
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCEDCE028_2_00000213BDCEDCE0
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCF44A828_2_00000213BDCF44A8
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCE2B2C28_2_00000213BDCE2B2C
Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000158709A1F2C30_2_00000158709A1F2C
Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000158709AD0E030_2_00000158709AD0E0
Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000158709B38A830_2_00000158709B38A8
Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000158709D2B2C30_2_00000158709D2B2C
Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000158709DDCE030_2_00000158709DDCE0
Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000158709E44A830_2_00000158709E44A8
Source: C:\Windows\System32\dwm.exeCode function: 31_2_0000026DB16AD0E031_2_0000026DB16AD0E0
Source: C:\Windows\System32\dwm.exeCode function: 31_2_0000026DB16B38A831_2_0000026DB16B38A8
Source: C:\Windows\System32\dwm.exeCode function: 31_2_0000026DB16A1F2C31_2_0000026DB16A1F2C
Source: C:\Windows\System32\dwm.exeCode function: 31_2_0000026DB16DDCE031_2_0000026DB16DDCE0
Source: C:\Windows\System32\dwm.exeCode function: 31_2_0000026DB16E44A831_2_0000026DB16E44A8
Source: C:\Windows\System32\dwm.exeCode function: 31_2_0000026DB16D2B2C31_2_0000026DB16D2B2C
Source: C:\Windows\System32\svchost.exeCode function: 32_2_000002A3EFFCD0E032_2_000002A3EFFCD0E0
Source: C:\Windows\System32\svchost.exeCode function: 32_2_000002A3EFFD38A832_2_000002A3EFFD38A8
Source: C:\Windows\System32\svchost.exeCode function: 32_2_000002A3EFFC1F2C32_2_000002A3EFFC1F2C
Source: C:\Windows\System32\svchost.exeCode function: 32_2_000002A3F0662B2C32_2_000002A3F0662B2C
Source: C:\Windows\System32\svchost.exeCode function: 32_2_000002A3F06744A832_2_000002A3F06744A8
Source: C:\Windows\System32\svchost.exeCode function: 32_2_000002A3F066DCE032_2_000002A3F066DCE0
Source: C:\Windows\System32\svchost.exeCode function: 33_2_000002C9AFB8D0E033_2_000002C9AFB8D0E0
Source: C:\Windows\System32\svchost.exeCode function: 33_2_000002C9AFB938A833_2_000002C9AFB938A8
Source: C:\Windows\System32\svchost.exeCode function: 33_2_000002C9AFB81F2C33_2_000002C9AFB81F2C
Source: C:\Windows\System32\svchost.exeCode function: 33_2_000002C9AFBBDCE033_2_000002C9AFBBDCE0
Source: C:\Windows\System32\svchost.exeCode function: 33_2_000002C9AFBC44A833_2_000002C9AFBC44A8
Source: C:\Windows\System32\svchost.exeCode function: 33_2_000002C9AFBB2B2C33_2_000002C9AFBB2B2C
Source: C:\Windows\System32\svchost.exeCode function: 34_2_000002C06F7BD0E034_2_000002C06F7BD0E0
Source: C:\Windows\System32\svchost.exeCode function: 34_2_000002C06F7C38A834_2_000002C06F7C38A8
Source: C:\Windows\System32\svchost.exeCode function: 34_2_000002C06F7B1F2C34_2_000002C06F7B1F2C
Source: C:\Windows\System32\svchost.exeCode function: 34_2_000002C06FD4DCE034_2_000002C06FD4DCE0
Source: C:\Windows\System32\svchost.exeCode function: 34_2_000002C06FD544A834_2_000002C06FD544A8
Source: C:\Windows\System32\svchost.exeCode function: 34_2_000002C06FD42B2C34_2_000002C06FD42B2C
Source: C:\Windows\System32\svchost.exeCode function: 35_2_000002917C3938A835_2_000002917C3938A8
Source: C:\Windows\System32\svchost.exeCode function: 35_2_000002917C38D0E035_2_000002917C38D0E0
Source: C:\Windows\System32\svchost.exeCode function: 35_2_000002917C381F2C35_2_000002917C381F2C
Source: C:\Windows\System32\svchost.exeCode function: 35_2_000002917C3C44A835_2_000002917C3C44A8
Source: C:\Windows\System32\svchost.exeCode function: 35_2_000002917C3BDCE035_2_000002917C3BDCE0
Source: C:\Windows\System32\svchost.exeCode function: 35_2_000002917C3B2B2C35_2_000002917C3B2B2C
Source: C:\Windows\System32\svchost.exeCode function: 36_2_00000223827944A836_2_00000223827944A8
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002238278DCE036_2_000002238278DCE0
Source: C:\Windows\System32\svchost.exeCode function: 36_2_0000022382782B2C36_2_0000022382782B2C
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000028A1B88DCE037_2_0000028A1B88DCE0
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000028A1B8944A837_2_0000028A1B8944A8
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000028A1B882B2C37_2_0000028A1B882B2C
Source: C:\Windows\System32\svchost.exeCode function: 38_2_000001486AD72B2C38_2_000001486AD72B2C
Source: C:\Windows\System32\svchost.exeCode function: 38_2_000001486AD7DCE038_2_000001486AD7DCE0
Source: C:\Windows\System32\svchost.exeCode function: 38_2_000001486AD844A838_2_000001486AD844A8
Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000024BD3CAD0E039_2_0000024BD3CAD0E0
Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000024BD3CB38A839_2_0000024BD3CB38A8
Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000024BD3CA1F2C39_2_0000024BD3CA1F2C
Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000024BD3CDDCE039_2_0000024BD3CDDCE0
Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000024BD3CE44A839_2_0000024BD3CE44A8
Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000024BD3CD2B2C39_2_0000024BD3CD2B2C
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001FA73D3D0E040_2_000001FA73D3D0E0
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001FA73D438A840_2_000001FA73D438A8
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001FA73D31F2C40_2_000001FA73D31F2C
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001FA73D6DCE040_2_000001FA73D6DCE0
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001FA73D744A840_2_000001FA73D744A8
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001FA73D62B2C40_2_000001FA73D62B2C
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD021B1F2C41_2_000001CD021B1F2C
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD021C38A841_2_000001CD021C38A8
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD021BD0E041_2_000001CD021BD0E0
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD02402B2C41_2_000001CD02402B2C
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD024144A841_2_000001CD024144A8
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD0240DCE041_2_000001CD0240DCE0
Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269B9FD1F2C42_2_00000269B9FD1F2C
Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269B9FDD0E042_2_00000269B9FDD0E0
Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269B9FE38A842_2_00000269B9FE38A8
Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA6744A842_2_00000269BA6744A8
Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA66DCE042_2_00000269BA66DCE0
Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA662B2C42_2_00000269BA662B2C
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000022054D81F2C43_2_0000022054D81F2C
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000022054D8D0E043_2_0000022054D8D0E0
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000022054D938A843_2_0000022054D938A8
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000022054DB2B2C43_2_0000022054DB2B2C
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000022054DBDCE043_2_0000022054DBDCE0
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000022054DC44A843_2_0000022054DC44A8
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000027C57DAD0E044_2_0000027C57DAD0E0
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000027C57DB38A844_2_0000027C57DB38A8
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000027C57DA1F2C44_2_0000027C57DA1F2C
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000027C57DDDCE044_2_0000027C57DDDCE0
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000027C57DE44A844_2_0000027C57DE44A8
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000027C57DD2B2C44_2_0000027C57DD2B2C
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A333B4D0E045_2_000002A333B4D0E0
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A333B538A845_2_000002A333B538A8
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A333B41F2C45_2_000002A333B41F2C
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A333B7DCE045_2_000002A333B7DCE0
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A333B844A845_2_000002A333B844A8
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A333B72B2C45_2_000002A333B72B2C
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000001F1745438A846_2_000001F1745438A8
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000001F17453D0E046_2_000001F17453D0E0
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000001F174531F2C46_2_000001F174531F2C
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000001F1745744A846_2_000001F1745744A8
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000001F17456DCE046_2_000001F17456DCE0
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000001F174562B2C46_2_000001F174562B2C
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000002331574D0E047_2_000002331574D0E0
Source: C:\Windows\System32\svchost.exeCode function: 47_2_00000233157538A847_2_00000233157538A8
Source: C:\Windows\System32\svchost.exeCode function: 47_2_0000023315741F2C47_2_0000023315741F2C
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000002331577DCE047_2_000002331577DCE0
Source: C:\Windows\System32\svchost.exeCode function: 47_2_00000233157844A847_2_00000233157844A8
Source: C:\Windows\System32\svchost.exeCode function: 47_2_0000023315772B2C47_2_0000023315772B2C
Source: Joe Sandbox ViewDropped File: C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe 0612BFB5A51B0B413BA960F7D52BC647BD4CF7530FD760C0D6006AA829E806E2
Source: dialer.exe, 00000012.00000002.2707653386.000001A0E80A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ;.VBP
Source: classification engineClassification label: mal100.evad.winEXE@40/66@0/1
Source: C:\Windows\System32\dialer.exeCode function: 18_2_000000014000226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,18_2_000000014000226C
Source: C:\Windows\System32\dialer.exeCode function: 18_2_00000001400019C4 SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,18_2_00000001400019C4
Source: C:\Windows\System32\dialer.exeCode function: 18_2_000000014000226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,18_2_000000014000226C
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7720:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7956:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7964:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8176:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7256:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1928:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8088:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1984:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8128:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8044:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3344:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yyc01ryo.1ig.ps1Jump to behavior
Source: xmr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\xmr.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: xmr.exeReversingLabs: Detection: 76%
Source: C:\Users\user\Desktop\xmr.exeFile read: C:\Users\user\Desktop\xmr.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\xmr.exe "C:\Users\user\Desktop\xmr.exe"
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvc
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauserv
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bits
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvc
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exe
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "ARIBLEUL"
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "ARIBLEUL" binpath= "C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe" start= "auto"
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "ARIBLEUL"
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvcJump to behavior
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop WaaSMedicSvcJump to behavior
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop wuauservJump to behavior
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop bitsJump to behavior
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop dosvcJump to behavior
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exeJump to behavior
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "ARIBLEUL"Jump to behavior
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "ARIBLEUL" binpath= "C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe" start= "auto"Jump to behavior
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlogJump to behavior
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "ARIBLEUL"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
Source: C:\Users\user\Desktop\xmr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: dpx.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wusa.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: xmr.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: xmr.exeStatic file information: File size 5468672 > 1048576
Source: xmr.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x52a800
Source: xmr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: xmr.exeStatic PE information: section name: .00cfg
Source: lrgkmixyjzta.exe.0.drStatic PE information: section name: .00cfg
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25ABFACDD push rcx; retf 003Fh4_2_000001F25ABFACDE
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC262B0 push rbp; retf 4_2_000001F25AC262B3
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26238 push rbp; retf 4_2_000001F25AC2623B
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26208 push rsi; retf 4_2_000001F25AC2620B
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26218 push rbp; retf 4_2_000001F25AC2621B
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26168 push rsi; retf 4_2_000001F25AC261D3
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC262C8 push rbp; retf 4_2_000001F25AC262B3
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC262C8 push rbp; retf 4_2_000001F25AC262CB
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC2C6DD push rcx; retf 003Fh4_2_000001F25AC2C6DE
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26078 push rbp; retf 4_2_000001F25AC26083
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26080 push rbp; retf 4_2_000001F25AC26083
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC260A8 push rbp; retf 4_2_000001F25AC260AB
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26038 push r14; retf 4_2_000001F25AC26043
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26070 push rbp; retf 4_2_000001F25AC26073
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26180 push rbp; retf 4_2_000001F25AC26183
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26198 push rbp; retf 4_2_000001F25AC2619B
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26138 push rsi; retf 4_2_000001F25AC26143
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26160 push rbp; retf 4_2_000001F25AC26163
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26168 push rsi; retf 4_2_000001F25AC261D3
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26130 push rbp; retf 4_2_000001F25AC26133
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC260E0 push r14; retf 4_2_000001F25AC260EB
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC260F0 push rbp; retf 4_2_000001F25AC260F3
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E99173ACDD push rcx; retf 003Fh23_2_000002E99173ACDE
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E99176C6DD push rcx; retf 003Fh23_2_000002E99176C6DE
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E991759FA4 push rbp; retf 23_2_000002E99176626B
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E991766130 push rbp; retf 23_2_000002E991766133
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E991766138 push rsi; retf 23_2_000002E991766143
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E991766100 push rbp; retf 23_2_000002E99176610B
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E991766100 push rbp; retf 23_2_000002E99176610B
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E9917660F0 push rbp; retf 23_2_000002E9917660F3
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E9917660E0 push r14; retf 23_2_000002E9917660EB

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\Desktop\xmr.exeFile created: C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exeJump to dropped file
Source: C:\Users\user\Desktop\xmr.exeFile created: C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exeJump to dropped file
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop UsoSvc

Hooking and other Techniques for Hiding and Protection

barindex
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
Source: C:\Windows\System32\lsass.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,18_2_00000001400010C0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5578Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4200Jump to behavior
Source: C:\Windows\System32\dialer.exeWindow / User API: threadDelayed 1608Jump to behavior
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 4851Jump to behavior
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 5149Jump to behavior
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 8203Jump to behavior
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 1767Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1567Jump to behavior
Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 9871Jump to behavior
Source: C:\Windows\System32\lsass.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_28-15427
Source: C:\Windows\System32\wbem\WmiPrvSE.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_4-14963
Source: C:\Windows\System32\dwm.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_31-15095
Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_30-14943
Source: C:\Windows\System32\winlogon.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_23-16956
Source: C:\Windows\System32\dialer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_18-409
Source: C:\Windows\System32\wbem\WmiPrvSE.exeAPI coverage: 5.1 %
Source: C:\Windows\System32\lsass.exeAPI coverage: 7.4 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.8 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.2 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.9 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 6.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.6 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.9 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 6.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.8 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.8 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.8 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.2 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.1 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7792Thread sleep count: 5578 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7796Thread sleep count: 4200 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7868Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe TID: 5472Thread sleep count: 255 > 30Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe TID: 5472Thread sleep time: -255000s >= -30000sJump to behavior
Source: C:\Windows\System32\dialer.exe TID: 7184Thread sleep count: 1608 > 30Jump to behavior
Source: C:\Windows\System32\dialer.exe TID: 7184Thread sleep time: -160800s >= -30000sJump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 2344Thread sleep count: 4851 > 30Jump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 2344Thread sleep time: -4851000s >= -30000sJump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 2344Thread sleep count: 5149 > 30Jump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 2344Thread sleep time: -5149000s >= -30000sJump to behavior
Source: C:\Windows\System32\lsass.exe TID: 7428Thread sleep count: 8203 > 30Jump to behavior
Source: C:\Windows\System32\lsass.exe TID: 7428Thread sleep time: -8203000s >= -30000sJump to behavior
Source: C:\Windows\System32\lsass.exe TID: 7428Thread sleep count: 1767 > 30Jump to behavior
Source: C:\Windows\System32\lsass.exe TID: 7428Thread sleep time: -1767000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7416Thread sleep count: 1567 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7416Thread sleep time: -1567000s >= -30000sJump to behavior
Source: C:\Windows\System32\dwm.exe TID: 4152Thread sleep count: 9871 > 30Jump to behavior
Source: C:\Windows\System32\dwm.exe TID: 4152Thread sleep time: -9871000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2512Thread sleep count: 260 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2512Thread sleep time: -260000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2828Thread sleep count: 253 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2828Thread sleep time: -253000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2952Thread sleep count: 252 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2952Thread sleep time: -252000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3984Thread sleep count: 257 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3984Thread sleep time: -257000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5296Thread sleep count: 194 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5296Thread sleep time: -194000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3120Thread sleep count: 259 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3120Thread sleep time: -259000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1280Thread sleep count: 253 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1280Thread sleep time: -253000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2940Thread sleep count: 249 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2940Thread sleep time: -249000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3032Thread sleep count: 252 > 30
Source: C:\Windows\System32\svchost.exe TID: 3032Thread sleep time: -252000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 4128Thread sleep count: 244 > 30
Source: C:\Windows\System32\svchost.exe TID: 4128Thread sleep time: -244000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 4032Thread sleep count: 257 > 30
Source: C:\Windows\System32\svchost.exe TID: 4032Thread sleep time: -257000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3552Thread sleep count: 258 > 30
Source: C:\Windows\System32\svchost.exe TID: 3552Thread sleep time: -258000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3832Thread sleep count: 259 > 30
Source: C:\Windows\System32\svchost.exe TID: 3832Thread sleep time: -259000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6136Thread sleep count: 259 > 30
Source: C:\Windows\System32\svchost.exe TID: 6136Thread sleep time: -259000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 4300Thread sleep count: 250 > 30
Source: C:\Windows\System32\svchost.exe TID: 4300Thread sleep time: -250000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2848Thread sleep count: 261 > 30
Source: C:\Windows\System32\svchost.exe TID: 2848Thread sleep time: -261000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 636Thread sleep count: 257 > 30
Source: C:\Windows\System32\svchost.exe TID: 636Thread sleep time: -257000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2616Thread sleep count: 260 > 30
Source: C:\Windows\System32\svchost.exe TID: 2616Thread sleep time: -260000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6556Thread sleep count: 253 > 30
Source: C:\Windows\System32\svchost.exe TID: 6556Thread sleep time: -253000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3500Thread sleep count: 258 > 30
Source: C:\Windows\System32\svchost.exe TID: 3500Thread sleep time: -258000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6816Thread sleep count: 251 > 30
Source: C:\Windows\System32\svchost.exe TID: 6816Thread sleep time: -251000s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC1DCE0 FindFirstFileExW,4_2_000001F25AC1DCE0
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E99175DCE0 FindFirstFileExW,23_2_000002E99175DCE0
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCEDCE0 FindFirstFileExW,28_2_00000213BDCEDCE0
Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000158709DDCE0 FindFirstFileExW,30_2_00000158709DDCE0
Source: C:\Windows\System32\dwm.exeCode function: 31_2_0000026DB16DDCE0 FindFirstFileExW,31_2_0000026DB16DDCE0
Source: C:\Windows\System32\svchost.exeCode function: 32_2_000002A3F066DCE0 FindFirstFileExW,32_2_000002A3F066DCE0
Source: C:\Windows\System32\svchost.exeCode function: 33_2_000002C9AFBBDCE0 FindFirstFileExW,33_2_000002C9AFBBDCE0
Source: C:\Windows\System32\svchost.exeCode function: 34_2_000002C06FD4DCE0 FindFirstFileExW,34_2_000002C06FD4DCE0
Source: C:\Windows\System32\svchost.exeCode function: 35_2_000002917C3BDCE0 FindFirstFileExW,35_2_000002917C3BDCE0
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002238278DCE0 FindFirstFileExW,36_2_000002238278DCE0
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000028A1B88DCE0 FindFirstFileExW,37_2_0000028A1B88DCE0
Source: C:\Windows\System32\svchost.exeCode function: 38_2_000001486AD7DCE0 FindFirstFileExW,38_2_000001486AD7DCE0
Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000024BD3CDDCE0 FindFirstFileExW,39_2_0000024BD3CDDCE0
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001FA73D6DCE0 FindFirstFileExW,40_2_000001FA73D6DCE0
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD0240DCE0 FindFirstFileExW,41_2_000001CD0240DCE0
Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA66DCE0 FindFirstFileExW,42_2_00000269BA66DCE0
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000022054DBDCE0 FindFirstFileExW,43_2_0000022054DBDCE0
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000027C57DDDCE0 FindFirstFileExW,44_2_0000027C57DDDCE0
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A333B7DCE0 FindFirstFileExW,45_2_000002A333B7DCE0
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000001F17456DCE0 FindFirstFileExW,46_2_000001F17456DCE0
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000002331577DCE0 FindFirstFileExW,47_2_000002331577DCE0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: lsass.exe, 0000001C.00000000.1483872661.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
Source: lsass.exe, 0000001C.00000000.1483872661.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
Source: lsass.exe, 0000001C.00000000.1483872661.00000213BCE89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
Source: lsass.exe, 0000001C.00000002.2716144470.00000213BCE13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1483592352.00000213BCE13000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end nodegraph_18-477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC1D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_000001F25AC1D2A4
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC11268 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,4_2_000001F25AC11268
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\dialer.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC1D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_000001F25AC1D2A4
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC26218 SetUnhandledExceptionFilter,4_2_000001F25AC26218
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC17D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_000001F25AC17D90
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E991766218 SetUnhandledExceptionFilter,23_2_000002E991766218
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E99175D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000002E99175D2A4
Source: C:\Windows\System32\winlogon.exeCode function: 23_2_000002E991757D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000002E991757D90
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCE7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_00000213BDCE7D90
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_00000213BDCED2A4
Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000213BDCF6218 SetUnhandledExceptionFilter,28_2_00000213BDCF6218
Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000158709DD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_00000158709DD2A4
Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000158709E6218 SetUnhandledExceptionFilter,30_2_00000158709E6218
Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000158709D7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_00000158709D7D90
Source: C:\Windows\System32\dwm.exeCode function: 31_2_0000026DB16E6218 SetUnhandledExceptionFilter,31_2_0000026DB16E6218
Source: C:\Windows\System32\dwm.exeCode function: 31_2_0000026DB16DD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_0000026DB16DD2A4
Source: C:\Windows\System32\dwm.exeCode function: 31_2_0000026DB16D7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_0000026DB16D7D90
Source: C:\Windows\System32\svchost.exeCode function: 32_2_000002A3F066D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,32_2_000002A3F066D2A4
Source: C:\Windows\System32\svchost.exeCode function: 32_2_000002A3F0667D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,32_2_000002A3F0667D90
Source: C:\Windows\System32\svchost.exeCode function: 32_2_000002A3F0676218 SetUnhandledExceptionFilter,32_2_000002A3F0676218
Source: C:\Windows\System32\svchost.exeCode function: 33_2_000002C9AFBB7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_000002C9AFBB7D90
Source: C:\Windows\System32\svchost.exeCode function: 33_2_000002C9AFBBD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_000002C9AFBBD2A4
Source: C:\Windows\System32\svchost.exeCode function: 33_2_000002C9AFBC6218 SetUnhandledExceptionFilter,33_2_000002C9AFBC6218
Source: C:\Windows\System32\svchost.exeCode function: 34_2_000002C06FD4D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,34_2_000002C06FD4D2A4
Source: C:\Windows\System32\svchost.exeCode function: 34_2_000002C06FD56218 SetUnhandledExceptionFilter,34_2_000002C06FD56218
Source: C:\Windows\System32\svchost.exeCode function: 34_2_000002C06FD47D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,34_2_000002C06FD47D90
Source: C:\Windows\System32\svchost.exeCode function: 35_2_000002917C3B7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,35_2_000002917C3B7D90
Source: C:\Windows\System32\svchost.exeCode function: 35_2_000002917C3C6218 SetUnhandledExceptionFilter,35_2_000002917C3C6218
Source: C:\Windows\System32\svchost.exeCode function: 35_2_000002917C3BD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,35_2_000002917C3BD2A4
Source: C:\Windows\System32\svchost.exeCode function: 36_2_0000022382787D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,36_2_0000022382787D90
Source: C:\Windows\System32\svchost.exeCode function: 36_2_0000022382796218 SetUnhandledExceptionFilter,36_2_0000022382796218
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002238278D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,36_2_000002238278D2A4
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000028A1B88D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_0000028A1B88D2A4
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000028A1B896218 SetUnhandledExceptionFilter,37_2_0000028A1B896218
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000028A1B887D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_0000028A1B887D90
Source: C:\Windows\System32\svchost.exeCode function: 38_2_000001486AD7D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_000001486AD7D2A4
Source: C:\Windows\System32\svchost.exeCode function: 38_2_000001486AD86218 SetUnhandledExceptionFilter,38_2_000001486AD86218
Source: C:\Windows\System32\svchost.exeCode function: 38_2_000001486AD77D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_000001486AD77D90
Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000024BD3CDD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_0000024BD3CDD2A4
Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000024BD3CE6218 SetUnhandledExceptionFilter,39_2_0000024BD3CE6218
Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000024BD3CD7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_0000024BD3CD7D90
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001FA73D6D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_000001FA73D6D2A4
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001FA73D76218 SetUnhandledExceptionFilter,40_2_000001FA73D76218
Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001FA73D67D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_000001FA73D67D90
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD0240D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000001CD0240D2A4
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD02407D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_000001CD02407D90
Source: C:\Windows\System32\svchost.exeCode function: 41_2_000001CD02416218 SetUnhandledExceptionFilter,41_2_000001CD02416218
Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA667D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_00000269BA667D90
Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA676218 SetUnhandledExceptionFilter,42_2_00000269BA676218
Source: C:\Windows\System32\svchost.exeCode function: 42_2_00000269BA66D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,42_2_00000269BA66D2A4
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000022054DBD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,43_2_0000022054DBD2A4
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000022054DC6218 SetUnhandledExceptionFilter,43_2_0000022054DC6218
Source: C:\Windows\System32\svchost.exeCode function: 43_2_0000022054DB7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,43_2_0000022054DB7D90
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000027C57DDD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,44_2_0000027C57DDD2A4
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000027C57DE6218 SetUnhandledExceptionFilter,44_2_0000027C57DE6218
Source: C:\Windows\System32\svchost.exeCode function: 44_2_0000027C57DD7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,44_2_0000027C57DD7D90
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A333B86218 SetUnhandledExceptionFilter,45_2_000002A333B86218
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A333B77D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_000002A333B77D90
Source: C:\Windows\System32\svchost.exeCode function: 45_2_000002A333B7D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_000002A333B7D2A4
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000001F174567D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,46_2_000001F174567D90
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000001F174576218 SetUnhandledExceptionFilter,46_2_000001F174576218
Source: C:\Windows\System32\svchost.exeCode function: 46_2_000001F17456D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,46_2_000001F17456D2A4
Source: C:\Windows\System32\svchost.exeCode function: 47_2_0000023315777D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,47_2_0000023315777D90
Source: C:\Windows\System32\svchost.exeCode function: 47_2_0000023315786218 SetUnhandledExceptionFilter,47_2_0000023315786218
Source: C:\Windows\System32\svchost.exeCode function: 47_2_000002331577D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,47_2_000002331577D2A4

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 2E991720000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 213BDCB0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 158709A0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 26DB16A0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A3EFFC0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2C9AFB80000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2C06F7B0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2917C380000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22382750000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 28A1B1D0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1486AD40000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24BD3CA0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1FA73D30000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1CD021B0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 269B9FD0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22054D80000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 27C57DA0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A333B40000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F174530000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23315740000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A9C8540000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1EC212A0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1876D540000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22CD8950000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 15104330000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22308E70000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1AB19360000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E731800000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A6DD9B0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E2FA1C0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\spoolsv.exe base: D50000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 209D2560000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1FC05190000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2AFD1A00000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D6B0F90000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2036E550000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 150FC6C0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2480FAC0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2671A930000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2C588F90000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A8857C0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 174DEDC0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 282A2110000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DA09D90000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 287FBEC0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sihost.exe base: 2537C620000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29B59750000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20CAB590000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BBF95A0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D49EEE0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 26E2B2E0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B0CC6E0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\explorer.exe base: 9850000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23014DD0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21744F70000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F02ED50000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dasHost.exe base: 1B2E6AF0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 25A84C20000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 194A0780000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2AD4DDB0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 1C0F4C90000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1F3A5110000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 2164ACF0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 19985DA0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 26D10B40000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 23F7CDE0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2EE94180000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 23954370000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1C996D40000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1FD7ADE0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 18BF4190000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1DF00850000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 22F97EC0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2341F720000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A326350000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F25ABE0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\MpCmdRun.exe base: 1943F410000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 23170BD0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 2610B9F0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 2610BA50000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeCode function: 18_2_0000000140001C88 CreateProcessW,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,OpenProcess,TerminateProcess,18_2_0000000140001C88
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\winlogon.exe EIP: 9172273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\lsass.exe EIP: BDCB273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 709A273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\dwm.exe EIP: B16A273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: EFFC273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: AFB8273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 6F7B273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 7C38273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 8275273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 1B1D273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 6AD4273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: D3CA273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 73D3273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 21B273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: B9FD273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 54D8273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 57DA273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 33B4273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 7453273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 1574273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: C854273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 212A273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 6D54273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: D895273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 433273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8E7273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1936273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3180273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DD9B273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FA1C273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D5273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D256273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 519273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D1A0273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B0F9273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6E55273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FC6C273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FAC273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1A93273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 88F9273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 857C273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DEDC273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A211273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9D9273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FBEC273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7C62273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5975273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AB59273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F95A273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9EEE273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2B2E273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CC6E273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 985273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 14DD273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 44F7273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2ED5273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E6AF273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 84C2273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A078273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4DDB273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F4C9273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A511273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4ACF273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 85DA273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 10B4273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7CDE273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9418273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5437273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 96D4273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7ADE273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F419273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 85273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 97EC273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1F72273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2635273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5ABE273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3F41273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 70BD273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BA5273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B9F273CJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2E991720000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 213BDCB0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 158709A0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 26DB16A0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A3EFFC0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C9AFB80000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C06F7B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2917C380000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22382750000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28A1B1D0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1486AD40000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24BD3CA0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA73D30000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD021B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 269B9FD0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22054D80000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 27C57DA0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A333B40000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F174530000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23315740000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A9C8540000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC212A0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1876D540000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22CD8950000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15104330000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22308E70000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AB19360000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E731800000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A6DD9B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2FA1C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: D50000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 209D2560000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FC05190000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2AFD1A00000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0F90000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2036E550000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 150FC6C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2480FAC0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2671A930000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C588F90000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A8857C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 174DEDC0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 282A2110000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1DA09D90000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 287FBEC0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 2537C620000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29B59750000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20CAB590000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BBF95A0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D49EEE0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 26E2B2E0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0CC6E0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 9850000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23014DD0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21744F70000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F02ED50000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 1B2E6AF0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 25A84C20000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 194A0780000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2AD4DDB0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 1C0F4C90000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F3A5110000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 2164ACF0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19985DA0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 26D10B40000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 23F7CDE0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2EE94180000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 23954370000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1C996D40000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1FD7ADE0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 18BF4190000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1DF00850000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 22F97EC0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2341F720000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A326350000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F25ABE0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 1943F410000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 23170BD0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 2610B9F0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 2610BA50000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: PID: 4084 base: 9850000 value: 4DJump to behavior
Source: C:\Users\user\Desktop\xmr.exeThread register set: target process: 7188Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2E991720000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 213BDCB0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 158709A0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 26DB16A0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A3EFFC0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C9AFB80000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C06F7B0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2917C380000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22382750000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28A1B1D0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1486AD40000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24BD3CA0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA73D30000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD021B0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 269B9FD0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22054D80000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 27C57DA0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A333B40000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F174530000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23315740000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A9C8540000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC212A0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1876D540000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22CD8950000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15104330000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22308E70000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AB19360000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E731800000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A6DD9B0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2FA1C0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: D50000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 209D2560000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FC05190000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2AFD1A00000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D6B0F90000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2036E550000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 150FC6C0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2480FAC0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2671A930000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2C588F90000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A8857C0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 174DEDC0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 282A2110000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1DA09D90000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 287FBEC0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 2537C620000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29B59750000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20CAB590000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BBF95A0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D49EEE0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 26E2B2E0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0CC6E0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 9850000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23014DD0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21744F70000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F02ED50000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 1B2E6AF0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 25A84C20000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 194A0780000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2AD4DDB0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 1C0F4C90000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F3A5110000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 2164ACF0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19985DA0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 26D10B40000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 23F7CDE0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2EE94180000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 23954370000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1C996D40000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1FD7ADE0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 18BF4190000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1DF00850000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 22F97EC0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2341F720000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A326350000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F25ABE0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 1943F410000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 23170BD0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 2610B9F0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 2610BA50000Jump to behavior
Source: C:\Users\user\Desktop\xmr.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\system32\dialer.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
Source: C:\Windows\System32\dialer.exeCode function: 18_2_0000000140001B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,18_2_0000000140001B54
Source: C:\Windows\System32\dialer.exeCode function: 18_2_0000000140001B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,18_2_0000000140001B54
Source: winlogon.exe, 00000017.00000002.2726637979.000002E991B71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000017.00000000.1481022199.000002E991B70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: winlogon.exe, 00000017.00000002.2726637979.000002E991B71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000017.00000000.1481022199.000002E991B70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: winlogon.exe, 00000017.00000002.2726637979.000002E991B71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000017.00000000.1481022199.000002E991B70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: 0Program Manager
Source: winlogon.exe, 00000017.00000002.2726637979.000002E991B71000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000017.00000000.1481022199.000002E991B70000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25ABF36F0 cpuid 4_2_000001F25ABF36F0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
Source: C:\Windows\System32\dialer.exeCode function: 18_2_0000000140001B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,18_2_0000000140001B54
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001F25AC17960 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_000001F25AC17960
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Service Execution
1
Windows Service
1
Access Token Manipulation
4
Rootkit
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Credential API Hooking
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
1
Windows Service
1
Disable or Modify Tools
LSASS Memory221
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)713
Process Injection
1
Modify Registry
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
NTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Access Token Manipulation
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts713
Process Injection
Cached Domain Credentials1
Remote System Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Hidden Files and Directories
DCSync1
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Obfuscated Files or Information
Proc Filesystem22
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Install Root Certificate
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
DLL Side-Loading
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1585418 Sample: xmr.exe Startdate: 07/01/2025 Architecture: WINDOWS Score: 100 46 Multi AV Scanner detection for submitted file 2->46 48 Sigma detected: Stop EventLog 2->48 50 Hooks registry keys query functions (used to hide registry keys) 2->50 52 5 other signatures 2->52 7 xmr.exe 1 2 2->7         started        11 lrgkmixyjzta.exe 2->11         started        process3 file4 42 C:\ProgramData\...\lrgkmixyjzta.exe, PE32+ 7->42 dropped 56 Modifies the context of a thread in another process (thread injection) 7->56 58 Adds a directory exclusion to Windows Defender 7->58 13 dialer.exe 1 7->13         started        16 powershell.exe 23 7->16         started        18 cmd.exe 1 7->18         started        20 9 other processes 7->20 60 Multi AV Scanner detection for dropped file 11->60 signatures5 process6 signatures7 62 Injects code into the Windows Explorer (explorer.exe) 13->62 64 Contains functionality to inject code into remote processes 13->64 66 Writes to foreign memory regions 13->66 70 4 other signatures 13->70 22 lsass.exe 13->22 injected 25 svchost.exe 13->25 injected 28 winlogon.exe 13->28 injected 36 22 other processes 13->36 68 Loading BitLocker PowerShell Module 16->68 30 WmiPrvSE.exe 16->30         started        32 conhost.exe 16->32         started        38 2 other processes 18->38 34 conhost.exe 20->34         started        40 8 other processes 20->40 process8 dnsIp9 54 Installs new ROOT certificates 22->54 44 192.168.2.5 unknown unknown 25->44 signatures10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
xmr.exe76%ReversingLabsWin64.Infostealer.Tinba
SourceDetectionScannerLabelLink
C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe76%ReversingLabsWin64.Infostealer.Tinba
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
fp2e7a.wpc.phicdn.net
192.229.221.95
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000000.1483799757.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2718147779.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
      high
      http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
        high
        http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
          high
          http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 0000001C.00000000.1483799757.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2718147779.00000213BCE4E000.00000004.00000001.00020000.00000000.sdmpfalse
            high
            http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
              high
              http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                high
                http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/wsdl/lsass.exe, 0000001C.00000000.1483737658.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 0000001C.00000002.2716787516.00000213BCE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      IP
                      192.168.2.5
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1585418
                      Start date and time:2025-01-07 16:19:27 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 10m 13s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:28
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:25
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:xmr.exe
                      Detection:MAL
                      Classification:mal100.evad.winEXE@40/66@0/1
                      EGA Information:
                      • Successful, ratio: 91.7%
                      HCA Information:
                      • Successful, ratio: 97%
                      • Number of executed functions: 61
                      • Number of non-executed functions: 364
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe
                      • Excluded IPs from analysis (whitelisted): 40.126.32.140, 20.190.160.20, 40.126.32.68, 40.126.32.134, 20.190.160.17, 20.190.160.14, 20.190.160.22, 40.126.32.133, 4.175.87.197
                      • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, ocsp.edge.digicert.com, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                      • Execution Graph export aborted for target lrgkmixyjzta.exe, PID 2340 because it is empty
                      • Execution Graph export aborted for target xmr.exe, PID 7660 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtCreateKey calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • VT rate limit hit for: xmr.exe
                      TimeTypeDescription
                      10:20:25API Interceptor1x Sleep call for process: xmr.exe modified
                      10:20:27API Interceptor16x Sleep call for process: powershell.exe modified
                      10:21:03API Interceptor367318x Sleep call for process: winlogon.exe modified
                      10:21:04API Interceptor289942x Sleep call for process: lsass.exe modified
                      10:21:04API Interceptor6333x Sleep call for process: svchost.exe modified
                      10:21:04API Interceptor1665x Sleep call for process: dialer.exe modified
                      10:21:06API Interceptor355148x Sleep call for process: dwm.exe modified
                      10:21:12API Interceptor230x Sleep call for process: WmiPrvSE.exe modified
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      fp2e7a.wpc.phicdn.netsasdriver_2.0.20.119.exe_MDE_File_Sample_dc3db78edf1ce84f101e976a9966edb4cf6dcd75.zipGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      PO_62401394_MITech_20250601.exeGet hashmaliciousFormBookBrowse
                      • 192.229.221.95
                      startuppp.batGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      amiri.EXEGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      CheerSkullness.exeGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      Insomia.exeGet hashmaliciousLummaCBrowse
                      • 192.229.221.95
                      Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                      • 192.229.221.95
                      3lhrJ4X.exeGet hashmaliciousLiteHTTP BotBrowse
                      • 192.229.221.95
                      Your File Is Ready To Download.exeGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      http://www.klim.comGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exeSolara.exeGet hashmaliciousUnknownBrowse
                        Process:C:\Users\user\Desktop\xmr.exe
                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):5468672
                        Entropy (8bit):6.519628355610314
                        Encrypted:false
                        SSDEEP:98304:LOl8w9dke5gARmiTqHc2+i72sq2GMbo9GYaUbTvcB7abEUGyxByPuZ0:LOlj9dkC8c2F2D2G1GVLB7WBBNG
                        MD5:154202154E41175E801A698CA940EB0C
                        SHA1:6CE074D67C91CB00016CB1095319B00AFAB396A8
                        SHA-256:0612BFB5A51B0B413BA960F7D52BC647BD4CF7530FD760C0D6006AA829E806E2
                        SHA-512:7D0A7474C28B87972FB02A48EE56A2549765A584A53ABBD123631E142A655B17F3508B7D3C2B90F3174D118940143AF12728355900472F27FE8280AA11A8F540
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 76%
                        Joe Sandbox View:
                        • Filename: Solara.exe, Detection: malicious, Browse
                        Preview:MZx.....................@...................................x...hr......!..L.!This program cannot be run in DOS mode.$..PE..d....;.f.........."...........R.....@..........@..............................S...........`.....................................................<.............S...............S.x...............................(.......8...........x...`............................text............................... ..`.rdata..l$.......&..................@..@.data.....R.......R.................@....pdata........S......jS.............@..@.00cfg........S......lS.............@..@.tls..........S......nS.............@....reloc..x.....S......pS.............@..B................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\lsass.exe
                        File Type:very short file (no magic)
                        Category:modified
                        Size (bytes):1
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3::
                        MD5:93B885ADFE0DA089CDF634904FD59F71
                        SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                        SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                        SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                        Malicious:false
                        Preview:.
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):64
                        Entropy (8bit):1.1940658735648508
                        Encrypted:false
                        SSDEEP:3:NlllulxmH/lZ:NllUg
                        MD5:D904BDD752B6F23D81E93ECA3BD8E0F3
                        SHA1:026D8B0D0F79861746760B0431AD46BAD2A01676
                        SHA-256:B393D3CEC8368794972E4ADD978B455A2F5BD37E3A116264DBED14DC8C67D6F2
                        SHA-512:5B862B7F0BCCEF48E6A5A270C3F6271D7A5002465EAF347C6A266365F1B2CD3D88144C043D826D3456AA43484124D619BF16F9AEAB1F706463F553EE24CB5740
                        Malicious:false
                        Preview:@...e................................. ..............@..........
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\svchost.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:modified
                        Size (bytes):4680
                        Entropy (8bit):3.7111246928185304
                        Encrypted:false
                        SSDEEP:96:pYMguQII4i5et6h4aGdinipV9ll7UY5HAmzQ+:9A4q/xne7HO+
                        MD5:0D60969BED3B7E408F6EEFB00666B71E
                        SHA1:D1C1EEDDB110FFDAC3C71C6232A0FDAEE1F0C0EE
                        SHA-256:12F1D710F133AC6D1488B4C0D81349F4A3CDCED18D7C616DBF100A86C0D146AF
                        SHA-512:DCAC2259335EC47A9C80209B49E29A78697B7FDE17EEEAB87BAFB76A2A7FF7C5E877EE894B65A998562066BC721EFB3C1113A3DF1CE9A25E0C6410958ECAE500
                        Malicious:false
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...6.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.S.o.u.r.c.e.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.S.o.u.r.c.e.>..... . . . .<.A.u.t.h.o.r.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.A.u.t.h.o.r.>..... . . . .<.V.e.r.s.i.o.n.>.1...0.<./.V.e.r.s.i.o.n.>..... . . . .<.D.e.s.c.r.i.p.t.i.o.n.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.1.).<./.D.e.s.c.r.i.p.t.i.o.n.>..... . . . .<.U.R.I.>.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.S.o.f.t.w.a.r.e.P.r.o.t.e.c.t.i.o.n.P.l.a.t.f.o.r.m.\.S.v.c.R.e.s.t.a.r.t.T.a.s.k.<./.U.R.I.>..... . . . .<.S.e.c.u.r.i.t.y.D.e.s.c.r.i.p.t.o.r.>.D.:.P.(.A.;.;.F.A.;.;.;.S.Y.).(.A.;.;.F.A.;.;.;.B.A.).
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):3408
                        Entropy (8bit):3.957879980473957
                        Encrypted:false
                        SSDEEP:48:MoZUQ4frP+yXCrPwfFRVEfWb3/Ooc0wHytxsiekd9SqdrSDFDS0yel:UpCrup/vOoclgeie6joF1
                        MD5:4E70AECBDB74B8BA6C1BD8A191B78927
                        SHA1:DF279189413492D16C18316C05E64615BA67E2C8
                        SHA-256:213479E82374E7CF07F8EDE98D27EDC91CD3D081FC8EDCAA8732AD9ECB6F3958
                        SHA-512:BC056CC554B5D4133859B869CE601F28A9E5454800CAFD8A92D604B7059FB529F40DE2A0892383E73A426920FF8E51919765A6D56545392615C9BFC4A2D10716
                        Malicious:false
                        Preview:ElfChnk.................[.......\...........X...P.....1.....................................................................N.=............................................=...........................................................................................................................g...............@...........................n...................M...]...........................j...........................~...........................................&...............................................**..X...[..........a.........3d.&........3d....P..k..........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Z............{..P.r.o.v.i.d.e.r...7...F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.S.P.P.F........)...G.u.i.d.....&.{.E.2.3.B.3.3.B.0.-.C.8.C.9.-.4.7.2.C.-.A.5.F.9.-.F.2.B.D.F.E.
                        Process:C:\Windows\System32\svchost.exe
                        File Type:MS Windows Vista Event Log, 3 chunks (no. 2 in use), next record no. 310, DIRTY
                        Category:dropped
                        Size (bytes):112664
                        Entropy (8bit):3.740554326511005
                        Encrypted:false
                        SSDEEP:768:uVUHiapX7xadptrDT9W84H62VUHiapX7xadptrDT9W84H6:hHi6xadptrX9WPapHi6xadptrX9WPa
                        MD5:3E1327B42ED47E009DF5E36412C4EF9F
                        SHA1:02BC9FF524807C5F1A852F5CCD05995533E4A9F2
                        SHA-256:0A44AD86CF2A357DD892C0F7CED38C07F91ADA64723402E29721C109AD76F3E1
                        SHA-512:9752849A0BEB68022D84D315E6E442FA1799CDE64983B8F3DB7C0D34BAB0D0E16AA7653059CBA4BF3F994C158F324043AF71A085201F2292F1F45BF038241CBE
                        Malicious:false
                        Preview:ElfFile.................6....................................................................................................I].ElfChnk.........7...............7...............................................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........r...................m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.377721629524822
                        Encrypted:false
                        SSDEEP:384:fhZN/GN6N/NDsNadNDtNkN6NQNQxNhdNQaNwNwNONPNavNqN6NfNjNALNCNyN7Ns:fZeIPRThtUmqYXL3QXr0Q7
                        MD5:B59AFB7FCA4C7067FBB3EF413064809B
                        SHA1:785A500AA8ADA1D59F3F7FD48E876F2305E7072D
                        SHA-256:ED35583D239B8BBF565E20C872268401F9D05A4DCCE4ABA7F83BA99A5978FD95
                        SHA-512:C86B8AE075AA4E669D9DE8EDC1C3E430D68F1A155153EE7B4C7B1898E03E42334C37FFAE7CD35B759EB019822762C7048083BEA711439FAA1D869360CE59CD88
                        Malicious:false
                        Preview:ElfChnk.{...............{..........................[.x......................................................................D.\........................................V...=...........................................................................................................................f...............?...........................m...................M...F...................=c......................=j...........................?......]...............................................-g..................**......{.......n=.df..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):92752
                        Entropy (8bit):4.271441929571394
                        Encrypted:false
                        SSDEEP:384:5V7VZVBV4V0VahMVnRVSV3V9VbVSV5VjVMV/V1VQVPTV0V6V6VoVbVaVVVlVlVmZ:Q+HIi20Hl6MunK+Hc
                        MD5:1B0A3E0AF5BDFE8099B6F3E39052DDE1
                        SHA1:75516DD43AE2F679B32068A9F43738E9190217E0
                        SHA-256:FDF6ACB0F41D94B69049C296FEECF2C818A5192C1E7B017FD382B80F8DCBEDF7
                        SHA-512:C0F3C709D22C0A6C62D7DF213585B69DC34841CF7761BDB7F30FCBB6A0720BD24ED785F63D8D6212F19AFDD6521B11EC1332D07746EB70B09ED2089421EEBFA5
                        Malicious:false
                        Preview:ElfChnk......................................X...Y...:.T......................................................................#.................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................9@...............................=......**...............>..g..........Z..&...............................................................@.......X..._.!.....E..........@.>..g...0.U.f....*U.f................................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t...'..Y.J.R>:..=_M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t./.O.p.e.r.a.t.i.o.n.a.l...f.d.........L...M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s.A.l.a.r.m.s._.8.w.e.k.y.b.3.d.8.b.b.w.e.....n.d.o....**..............0...g..........Z
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):67008
                        Entropy (8bit):4.180357047407191
                        Encrypted:false
                        SSDEEP:384:rmOmUhsmsmi7mRXZmVkWmhTimmdmBmKmPhmRTmimZ8mevmcsm7mrmQmzmjmvmTmn:t2klTiGFKX93WGUGseOg26
                        MD5:C77C01DD036163AA5EF8E896B46CB6AA
                        SHA1:7B0662962F17C474445E9A36696ADC9AAA07F1D7
                        SHA-256:2395770878BE943F3FE3CC5F5724574004F2BC447B31A2492ACD105B006BA6A1
                        SHA-512:85BE7E1E9A0335E25CE8AA2B29D2ED811262547E277F1E4F5A67C0CF0818B7F65A387EF4DF05F2C04A4074AB1A89568853EDC6864FE097A2530B9DEDA706BA50
                        Malicious:false
                        Preview:ElfChnk.@-......o-......@-......o-..........(.........=(.....................................................................i..................\...........................=...........................................................................................................................f...............?...........................m...................M...F................................i...&...,...........................7..................................5...c#..{1..k:...................v..........**......n-.......T_.g..........Z..&...............................................................N.......d..._.!.....[..........@.T_.g...0.U.f....,U.f...$.......n-...................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t.-.S.e.r.v.e.r.9.G?...J...]..-CM.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t.S.e.r.v.e.r./.O.p.e.r.a.t.i.o.n.a.l...e$W..R......................(.....................s.v.c.h.o.s.t...e.x.e.,.S.t.o.r.S.v.c........-.....**......
                        Process:C:\Windows\System32\svchost.exe
                        File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 4, DIRTY
                        Category:dropped
                        Size (bytes):70680
                        Entropy (8bit):0.7871093480042242
                        Encrypted:false
                        SSDEEP:192:PdV7pp8nMLkmp8nPp8nYMvCp8npV7pp8nMLkmp8nPp8nYMvCp8n:PdhpiMLxiPiYMKiphpiMLxiPiYMKi
                        MD5:1C474FA57EA35BC8D87C0822584A90EC
                        SHA1:DE02AF34C9712DBAE46EB08832060E0B0AD2A210
                        SHA-256:DBB1C86667F3E7CEDA43A880545C6E8619F9E0CCAC5B85FFE76464D70353D9AB
                        SHA-512:22265BCDE2A77318355204C34111516310EC05B512A42BDAD9692AC42A7657FC7C2291B54452C316F034AF296DB00376D3E5B9D12173B3BFAF118CCBABDDD175
                        Malicious:false
                        Preview:ElfFile.........................................................................................................................ElfChnk.....................................@..................................................................................o............................................=...........................................................................................................................f...............?...................................p...........M...F...............................................f...................................................................................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.467947111655398
                        Encrypted:false
                        SSDEEP:1536:xZPZn2bBN2A4VD7VAx8whAGU2woJQghwMvOUFwe8OQhNwRA:
                        MD5:6B473E7917B1EDEE80CAFE7D24A6A4E8
                        SHA1:1940F41550F2986C928648ED00F9C6E4868D1A23
                        SHA-256:1D52F13D2EA4ACC472815240DBFF0F34C6CD5E86F980D04D9AD28E42C3E7A355
                        SHA-512:9AABAD5B7425A9692545864C11B99DDED0051CE8B442FFAB7BAB21DD8CD68B51BC980B01F324A81C685DC56793581AE2E6751DD08497CCBA64FB3339A9B5483D
                        Malicious:false
                        Preview:ElfChnk.e.......h.......e.......h...............x....;.......................................................................Z}............................................=...............y...........................................................................................................L...............?...............................................M...F...............................................&...................................................................................n...............**......e..........f..........'.z&........'.z..^................A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.565838744973026
                        Encrypted:false
                        SSDEEP:1536:PXY5nVYIyyqED5BVZUe39vHxt1BSocM1:PXY5nVYIyyqED5BVZUe39vHxt1BSot
                        MD5:B30C931B9EF047307E1443502CE7EE14
                        SHA1:BAC3632B709B853DFFCD9C4D65D1F9236F6FE551
                        SHA-256:033CF49641F4E76EFABF8F25753074E7EE72DD567FBA4145D446032D3D9CFADB
                        SHA-512:F5A9CA2D464EBA1F2F4EA426AC3864FB399A8951958BA44BA550E2129C4F4D4DA9E60F0D1B18A07CC76D4BC2CFD20D283F446A47DF990B52916113D5383A1952
                        Malicious:false
                        Preview:ElfChnk.........~...............~...................F..........................................................................T................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................N...............y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):87168
                        Entropy (8bit):1.973270255901999
                        Encrypted:false
                        SSDEEP:384:+osKaRo4hdo69CcoTorNorWorbvorTorZorQorNor7orqorlGhorXorWorxFo8oQ:kDCFUDCFsu
                        MD5:52AB0437C16776AA4A68E5F8807A6EA4
                        SHA1:CA5442311C99F3B04A411A1C22066B2668D63609
                        SHA-256:561B70B63F57EDAF6C39F9832B82D675938560C90C9A667A2E739188415BFB26
                        SHA-512:2ECAEB5B8BE8BFD89625371EAC7C2C82B071338CE441B1F73DE4B1F7A8D164D68975BB3A77CDD517466D67908ED51CE2E68B54FC3B43F4D26D5AF16E37604BA9
                        Malicious:false
                        Preview:ElfChnk......................................+...-..Y.QR......................................................................^.................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................ ......U)..............................**...............I..a.........Z... ..............................................................>.......V...X.!..e...............I..a..0.U.f....0U.f................................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y..k.N.<.D..97d>7.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y./.O.p.e.r.a.t.i.o.n.a.l...!>.U)......!>....[.U.....i...........|...:....A..3...b...%....=.......F.i.l.e.N.a.m.e.L.e.n.g.t.h.......A..3...b...%....=.......F.i.l.e.N
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.8511209646626153
                        Encrypted:false
                        SSDEEP:384:ChAiPA5PNPxPEPHPhPEPmPSPRP3PoPbPfP0bPnPdP:C2NZ
                        MD5:A98C811B8E1B821CD1FE05A68ADD446A
                        SHA1:4E8B739F5E308F943962E72FF24212FFBE47FAD7
                        SHA-256:58F6584C100174B80ACB8940226841B77884326A293CEE9072F4DD4CF8C10133
                        SHA-512:24A7B9C86A6CE93B9B7F4107A433A247789EE568EB69E301B51DC9D01AA40D2F408AD76B78F7F83E5F4EB47C1677276BC86F86A99BAB95186C2331ABE4CA523C
                        Malicious:false
                        Preview:ElfChnk......................................%...&..?........................................................................<.m................N...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................ ..............'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.8431535491551847
                        Encrypted:false
                        SSDEEP:384:OhZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+lk:OWXSYieD+tvgzmMvRQAsNi
                        MD5:106F006ACA6287586EF71A10A5C06C4D
                        SHA1:B4B6D91FF53E9BDFC8D0D99A0D6F643E49074932
                        SHA-256:79E64A943AED80ADAE43934E4573F95AE7308DDD6FC896EEDDB386C8A41FBA65
                        SHA-512:F4D49C8CBC2B46719521935DFABDC3E05883C2360D4E472920C420B1ACC74D0F835D10A2C5BA6E29038425809D585025172FDC9E534619C017D70FA4D9F23D53
                        Malicious:false
                        Preview:ElfChnk......................................$...&..{n.8.....................................................................{..................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................................................................................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):66536
                        Entropy (8bit):3.102055044626284
                        Encrypted:false
                        SSDEEP:384:ljh1hqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hRqX:ljbCyhLfIIy
                        MD5:4A8EE4A005B2E39CC30884D680251433
                        SHA1:2077242488C9F3EDE3558763B1982F350E0DB598
                        SHA-256:B77A1CC55581F8318B8987FCE28DA3B1CF81554020B782AB7D2F0D6681463111
                        SHA-512:0EC0AFF335E3C75C6ED3323BC91573E493A7343EEFD574860E165A98BB31B9B41120E59B294EC312A0481C9B61CA0574063A35FD7300226D1160FB96261B9254
                        Malicious:false
                        Preview:ElfChnk.........K...............K...........H...0.....(j........................................................................................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................n................................................{......................................**......K........A..a.........Z...{..............................................................<.......T.....!..................A..a..0.U.f.....U.f...........K....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.r.y.p.t.o.-.D.P.A.P.I.@.....NF.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.r.y.p.t.o.-.D.P.A.P.I./.O.p.e.r.a.t.i.o.n.a.l....0.............`....l~..;.D.Z-.>..C.:.\.W.i.n.d.o.w.s.\.s.y.s.t.e.m.3.2.\.M.i.c.r.o.s.o.f.t.\.P.r.o.t.e.c.t.\.S.-.1.-.5.-.1.8.\..............
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):3.318227577210551
                        Encrypted:false
                        SSDEEP:768:5cMhFBuyKskZljdoKXjtT/r18rQXn8BiJCF9Hhr:CMhFBuV
                        MD5:5C633A280FB6049ED65FB3D9FB6ED41D
                        SHA1:EA8D9B84B69F08E866CEE93019E7D9D2F2055666
                        SHA-256:C173BD37497EC6CC0B01BDBD0F2813644D398457279644AEDA0F9925E546091F
                        SHA-512:3E040021C7ABF4B9242BA0851F377EB0B077A1CFCAC0E012A4AB7E2551157BF7AC70E979A6F7225A3E260D5C393DBACAA78831C0BC46356C966A524271CC57CF
                        Malicious:false
                        Preview:ElfChnk.........M...............M..............8...^..Q....................................................................q...................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............m...........................5A.........................................**..x...........,.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.894621869531994
                        Encrypted:false
                        SSDEEP:768:svG6Q+uYvAzBCBao/F6Cf2SEqEhwaK41HZavAFDtCwvhr9OA2:VHuN
                        MD5:324E44DC9694B00295C89D4D5F97D685
                        SHA1:631C3A756A30EA3AB1E8373BD81661BD601FF9C1
                        SHA-256:97C9383956E32FB74B27567D7FF4D8E521E45CB5EF18C562751ED5834B5B037B
                        SHA-512:D18CDFB2CC9784AAD911593BCB3AEDD58670E19B2A1D0FFC36129C70F29F314CAC74CCB255393812158BF0B568CF372C879EA0FF707220FE2807BD35762F8422
                        Malicious:false
                        Preview:ElfChnk.v.......x.......v.......x...........P...`...+.$Y......................................................................E.........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..@...v.........=.f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 25, DIRTY
                        Category:dropped
                        Size (bytes):92008
                        Entropy (8bit):2.681712404440702
                        Encrypted:false
                        SSDEEP:384:gHh1kbAP1gzkw3kN5Ayqk+HkzGk+hkV3SuckzlckA66k+4DkzRxk+dkzwUk+rkzJ:eMAP1Qa5AgfQQzy3MAP1Qa5AgfQQzy
                        MD5:E50FE39620606CD6AC01CB7CD857361A
                        SHA1:C18530537740D8BE0EE68F4BD7691CF120823445
                        SHA-256:C6B32015EE7A045ACBB0CB97F20BA015C6DEF7595DD5555AD7C9F38CED29BC35
                        SHA-512:0FA353003CB90A4FFAFA98D6183B298C78D85D97A256D250586C63E39F1AD2109ED15347B3CB4C567CEA352867F86FB86FF8C2845986E38BFDA917B9CCA67D3A
                        Malicious:false
                        Preview:ElfFile........................................................................................................................WElfChnk......................................c...f...C.v....................................................................).6.................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........................................&.......\......;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.441017411582523
                        Encrypted:false
                        SSDEEP:384:BhdERE5EUELEvE/EpEbEmEfEjoPjE4FEqEZEVEiEUhqEd/2EME0EHE+EIy4qEQi0:BQoPjvh7jhHl7lzuzbCN7y+D
                        MD5:8D30244BF7119CFA2F8A7A5AF8FCDAB7
                        SHA1:F0827675265E0DF98A4967D8A539D476551DCAA6
                        SHA-256:489E810931FD45E6D7620FE65EBF1F1A66235B06E572C2C293BD080EE1C8E1ED
                        SHA-512:C71504A8F8D370825FC0C8C605B9F7217EFF2025838ED8FDF3F04CCC41E86751659BB60C7E79C48BBDDC1089C771DD16A193C107DDE4A1487F037BB2FC1455B8
                        Malicious:false
                        Preview:ElfChnk.q...............q....................i..Pk..buI......................................................................o._................&.......................N...=...........................................................................................................................f...............?...........................m...................M...F........................................7...(..................};...........?..M=.......9..............U*..&....$..........."..............=1......**......q........|.xf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):3.2803522685445374
                        Encrypted:false
                        SSDEEP:384:RhYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3Kl0:R1T4hZovIZC7
                        MD5:4A70DB2946C129829BEDDB2E147FBE04
                        SHA1:4D3255FABE0E857840591072D9370047FDDFB83A
                        SHA-256:C10981A84E3884E62907E34159FB7AA2D1F908C3E328D8D8B942B9934DFDE09C
                        SHA-512:7FDBE43D4773CBC17A3879CBC012F8C9FC823529DDF6FE5E10C623B2D7AA89159132F10FE01C0632B6F8F92A0C474C67EF1D5DA4DC2EDC3CA5499D6220922AA4
                        Malicious:false
                        Preview:ElfChnk.........k...............k...........................................................................................<../................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):2.445920452673848
                        Encrypted:false
                        SSDEEP:384:ihFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjDff:izSKEqsMuy6SbKrTPpOIKm
                        MD5:21B26F726BBEBA7FD5C4C45386FC544F
                        SHA1:F6CC3E80D2AD9D2F420C42D7DA3AA3C48C9D956A
                        SHA-256:63E1A62EA280BF1B031E1C98FBF21FF88795119983E5BC96C036B8EEF30D325D
                        SHA-512:A28CB789E4967DB231359AFE7D221C55A57FB56EF899997EBAA0F79EBD92D34547530A64B4B5492400ABFC81631E5ED792D47B836525E5E1583BA6F656062DD5
                        Malicious:false
                        Preview:ElfChnk.........L...............L......................f....................................................................s.J.................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................=........................................f......................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):2.1562721664799103
                        Encrypted:false
                        SSDEEP:384:BhMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3z2:Bmw9g3LQ
                        MD5:B2C3D7448B237C268D23FE1A78777AA5
                        SHA1:6C3A39325392F2B088C00CDC1763268F15832447
                        SHA-256:05BC150DCBE6B62CE7D2A9CB8F706130DF70BABC54752199B02B4C91ACEE1C4E
                        SHA-512:F9286BC0FC6DB6C52295C0292E2BF732C010F2D542999085F999501AC555C317FB1AFED9A2FF2DF6D91913373D0A32D2307C707381419883F5605F1D67DEE70E
                        Malicious:false
                        Preview:ElfChnk.........6...............6...........(o...p....Zo....................................................................ZU.#................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......E.......................n.......#.......................................^^......................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):1.9195298486885948
                        Encrypted:false
                        SSDEEP:384:3hPIRbiY8SIUIi0IsIGIAICI5I2IBIaIKI+I3lKaZrIVlKaZOITTIwI:3LQ9KC8KCV
                        MD5:D4A00CC59E964B7DFD6EFDB643322E9E
                        SHA1:7307AF862B22D743BF6B531829DABE041E9F1F92
                        SHA-256:49414D51861772E0899416FE42628F8641622E9F793F435DE7F0118F45EDE065
                        SHA-512:51663BF2E9D8F1FA3BA6B87918CD36A02AFC2F53FF89F3ED104A4B4129682F0947DC825912A81844E2D25083E7249CE7C1EE8F899D847F511AB20B0404B22F27
                        Malicious:false
                        Preview:ElfChnk.K.......L.......K.......L...........x...86..........................................................................E.U.................&.......................N...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..x...K.......1..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):1.119748237037944
                        Encrypted:false
                        SSDEEP:384:Sh1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhMpRaMRlM7kMGU:SeJB
                        MD5:D1CFC256BC075DC75D7FD92207C9C0F2
                        SHA1:587C19CF65305AD470E82AB5A1ED5B2E36472625
                        SHA-256:6C0365C674BCE55E0C49A62D23782660D34ECB388A8A7418AD9A75DFD36E612E
                        SHA-512:85F88C26274975D8EB8DDC65297064427A103B557712BD46F459B8E26A1B7E38DA3B4674920FA61476D108BA3B9846430F59AA82926AFEBDCE92B25A527331A3
                        Malicious:false
                        Preview:ElfChnk......................................1..p3..\q........................................................................_U........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................,......................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.182756017330751
                        Encrypted:false
                        SSDEEP:384:9hk1EL1I1Vh1C1D161f1f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS1B:9BjdjP0csdHkp
                        MD5:9BA8F6B60705B6A27084436D1D4370AD
                        SHA1:DCAFEC9C3F76CCE3FF65F8FED6E373B863780B6E
                        SHA-256:580E71D95D6201104E37944E8A0A6596869D6C8A0CA2CD3B704FEFC9D319C957
                        SHA-512:BFBAEA71174AEE5233857BFDB4427C59D945A3797EA6F5D02708807321E0ADD12ED632BAA3C5E59141CFEF108FADE90315AB670BB960A281D0E95DB18C4976A4
                        Malicious:false
                        Preview:ElfChnk.....................................8.......I#.e......................................................................hB................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................A.......................................................**..............*5.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):77528
                        Entropy (8bit):3.3178620947691186
                        Encrypted:false
                        SSDEEP:384:duIjolIWIMIgIRINIuI0iIY2I+EGIJrIxIUILIoINIjIkHIXIXIk3hDIEQAGxIHr:dsG53ZxGe6dWG
                        MD5:E7CDA0B0E4127ECCCB280DFDA125BF90
                        SHA1:D54B475FAC98839FA98386ED26BE40AEB25BFC1B
                        SHA-256:7B8A7AB4045720B330DD42B040EA9B6FA7426C21EA23C7990E7AD64AC00454E4
                        SHA-512:F9C744BCF6B95C24F9CD9626A92EDBEEB410FF941F4965A7550404235AAA0BD607E33861FA6E23D99EF2BE79E6324C9709E943F4568372BD5705F05DC8A76385
                        Malicious:false
                        Preview:ElfChnk.T...............T...........................b..|.......................................................................o........................................>...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................1............................V...........6..........................**......x............a.........Z...V..............................................................,.......D.....!........... ....@.....a..0.U.f.....U.f.......4...x....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s..z.?..nM.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s./.O.p.e.r.a.t.i.o.n.a.l...........&.......6p.\.#i....>..........2........A..=...>.../....=.......V.o.l.u.m.e.C.o.r.r.e.l.a.t.i.o.n.I.d.......A..7...>...)....=.......V.o.l.u.m.e.N.a.m.e.L.e.n.g.t.h....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.800476718060657
                        Encrypted:false
                        SSDEEP:384:7h6iIvcImIvITIQIoIoI3IEIMIoIBIzI9IwWInIE1IFtI:7oxqV
                        MD5:F25E3A5940E51F9A49AC271DE377E2C1
                        SHA1:38EB4D0BCB8EA4C72C03AD88CF9B7136C39BCDC5
                        SHA-256:D2B29761907A72BE3EC03C586D87729FF91EE3D9A6CF39319FD90A1977602663
                        SHA-512:CADA8EFD9868D26AA1B4DBC5A5BDD31E624547E5755ED7B413EA74D69AB731B000BB2B8FCBDD3027FDA278A7D69058DF4BE3BAEE5AB253055C70EDE7D3AA9993
                        Malicious:false
                        Preview:ElfChnk.....................................X"...#.../......................................................................V)..............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................................................................................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):2.999140584854273
                        Encrypted:false
                        SSDEEP:768:q4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH135:o
                        MD5:5234109523F4243D8DFEEAFD9202BC60
                        SHA1:49A4B237FB8BEE3A2BDAA0C20A579E06D2645F65
                        SHA-256:D4CE68FD0E970CC24971E8258B962534A3BF7CB1F1E6209AA0BB1D09F4FB80E6
                        SHA-512:C2CC9A4E7282BF37C4113FADBA4F7FDD1D2094B8F40FE145C58A5ABEE4A90BCD55FBD8876415BD9140EBEE36314D02FEE5525076B539BB5AA01FB1D32058B426
                        Malicious:false
                        Preview:ElfChnk.....................................(...8...|.........................................................................6................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................ ......................................................................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:dBase III DBT, next free block index 1130785861, 1st item "**"
                        Category:dropped
                        Size (bytes):68624
                        Entropy (8bit):3.916487984459231
                        Encrypted:false
                        SSDEEP:768:p7X0GMAow407SZRcZv76NcRkpHrWbGyYKQc90XnztputDTjV8k+u7eUtHpoVWN78:wztputDTjV8k+u7PtHpoVW
                        MD5:DA866C71B16055A96A254AB6B13FA9F5
                        SHA1:EC9B9D5434416301E4061E93A8DD6CB7343CFCEE
                        SHA-256:A686E94CAFE91479C75CE2C7B05CDA71B0871CFD86BAE00BC9FAE41AABA6B717
                        SHA-512:0F9D7DB91F34544DF227B414623A62224DF05F6AE1659E75275FC4E85F31C41A3AC77FCEA9B12485F761424A7143F76CA81F71CDC19F57C70693AB9677609A03
                        Malicious:false
                        Preview:ElfChnk.................K.......M...........................................................................................+#..................2...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..`...K.......19...a.........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.419800841260525
                        Encrypted:false
                        SSDEEP:384:hhWKyzK5SK+jKLSKDlKMAwpTKZDGKPK9KyKJSK2KVKzKAGP1K6GSKzKhMK7KS3Kj:hIgpCnz/Gh4wRub4ad4TA7Kx+
                        MD5:4095EAB3A14C4A6B96BC777FF6F5791C
                        SHA1:07A81726C4041010720F3FF3E237A7B847DDEE58
                        SHA-256:BBDD4F53CAADF3AC0857238C32435C2B8D283F9A0D464E8113218D43DC015DEF
                        SHA-512:E883CC73C4FE338A59D65865830CF58E2F2AD7B8A9D6B3D8933CEF9DA842ADE35113F68D2976E11F611FE21117E180B8BEDA5C036681BF8E865C19FCF545FD89
                        Malicious:false
                        Preview:ElfChnk.........[...............[...........`........".......................................................................q.H................p...........................=...........................................................................................................................f...............?...........................m...................M...F.......................................................'f.......D...T.......................s..........O....p...h............../$...............}..**................qdf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.760021633915647
                        Encrypted:false
                        SSDEEP:384:4hP8o8Z85848V8M8g8D8R8E8C888FB8J8a8:4R
                        MD5:91415CB1A68CB19DCDB017402AAEB51E
                        SHA1:EEEB808B9D0DFB3DB247AA10B64290A5029EAB89
                        SHA-256:EDEE7AB462BF2D986393D24304BDEF02415A6E0483DE793BD452E169B7D08170
                        SHA-512:C2F5AF43559DCE7BB66ABE305DF2DCFF0C95E2CF431D8DD0B6A02E216C8F4329C3B888BF2BF378918851A3066976FCEE745593B60970E5B9843535E6301E5BA0
                        Malicious:false
                        Preview:ElfChnk.........................................8!..$.0v....................................................................>...........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......................................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):3.764259692525428
                        Encrypted:false
                        SSDEEP:1536:KXh9UyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMjn1:KXznS
                        MD5:C161448D6658C570F447D8717DA5E0B5
                        SHA1:34365837512ABCEC09E1AF4F49D5211ADF181CF5
                        SHA-256:E901F6226250771411EBD2A0D3F315A7D75183562A63DE26145C8C771DEBFEF4
                        SHA-512:33E5234D7810CEF9034571CD818CB8E840CDAC975390C7A6744E4CAE951CD64BB6A8849AE828A63C8BE211180717062F40A6D8EA865851372570B720DBBF5B57
                        Malicious:false
                        Preview:ElfChnk.........'...............'............I...J..}.%........................................................................................v...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&................................................>..............O.......................**..............g5...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):2.4373812410985773
                        Encrypted:false
                        SSDEEP:768:50VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9OaafcmafEMXW0OWkjWr:jcEt
                        MD5:5166C2E32BD35C5E8D122799E53B4EA3
                        SHA1:628619C0E31F8C29ED260FCC063CD27935ACC25C
                        SHA-256:433A96E20784F1E6FB099FA4AB020EEA75BB22EEBC7D969497A31ABCB9B415AB
                        SHA-512:E5EA93AA871264E180BBC67008D7AA1012CDCAC74D22D10B47F1849380E092DF2FD798C7143DD3CAB5D9192EB4A89BB0EE60DA662E626923551906AB8F31DFD9
                        Malicious:false
                        Preview:ElfChnk.........?...............?............y...{...v.......................................................................bV................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&.......>h..................................................%_..........................]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1912
                        Entropy (8bit):3.6169799741714623
                        Encrypted:false
                        SSDEEP:48:MCWJLrCKOrCK3QuB69D4JmN3mCKOrCK3QQkcqrP:srCKOrCKgO69D4Je2CKOrCKgQkcGP
                        MD5:8FE2094E0AFA2E21E595ACC901C61620
                        SHA1:E791EB629A8AD3012F528BCA391C7BC7F050E7D1
                        SHA-256:B7B97F42815CCD4E5DC9D2AD84503A1A446C9D41E283B4206606C74CD3E9BCD4
                        SHA-512:443FF66C535BD0C3C3DC4DDB9723544DBC0E1D0F4DC63F40E8160A1393D07BA6CEAA589578A292259E2E195D0CBB583836135B112AEE6E7A10BFB94CF4770C37
                        Malicious:false
                        Preview:ElfChnk.'.......-.......'.......-............-...0....l.....................................................................~@.H................X...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................1...............................................................&.......................................**......,........\...a.........Z..&...............................................................L.......b.....!..................\...a..p........f.K...........,....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.M.i.t.i.g.a.t.i.o.n.s........J...M..<.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.M.i.t.i.g.a.t.i.o.n.s./.K.e.r.n.e.l.M.o.d.e...!..^1...........h.......>...................................4.\.D.e.v.i.c.e.\.H.a.r.d.d.i.s.k.V.o.l.u.m.e.3.\.W.i
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.322146858454247
                        Encrypted:false
                        SSDEEP:384:NH6/hDGCyCkCzCRCFC5CdCbCHCQCrlC+C2CV2CfCrUCECZ/C/C/2a22j2EW2z2/5:NH6/d7kNrTgt
                        MD5:D8DABE7AC7FE8F2D1CD853002971BB8A
                        SHA1:AC6B0F9940C1B3DB1FBC58DE8A95DD252FA73A6A
                        SHA-256:DDC0E74C04DFDB71841128067C33E0B5388CC5E93EEA1FDA4ADDFC6CA39FCC77
                        SHA-512:A9AF55922FC793B10A17731BC7F83A70E741E695B47249993530612A11D0A41481068A4DFD4B07182F5604A4AE289211D00766B79DB67CC25171D4ECA5A9292A
                        Malicious:false
                        Preview:ElfChnk.U...............U...................`...h....fyC......................................................................K................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F............................F..............................&...............................................nw..............iq......................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.475265357832672
                        Encrypted:false
                        SSDEEP:1536:P1W7C3yZy0PwbjNIFTLyQV2qRR4jBGDL+2ubu1ho7t8ckcXWIkFElThsk687vzGe:P1W7C3yZy0PwbjNIFTLyQV2qRR4jBGD+
                        MD5:605D94FA0C65C59EECEECC2BEB2F61B5
                        SHA1:28CA14F5E02A0A0348C4AC4A22BC228390B64F94
                        SHA-256:4667182188A73611A09A2F2B7A5E623367634933BE49899E07ED2FFB99142381
                        SHA-512:10CC31A6B3F5CC0AF090861E7EC615289DE4AB43E7B612F4F6518D6FEF8CD943E6A0F8A165AB4F6CAD5509575CC0C0D46960940799C95F1C6D6F103B4594EEA6
                        Malicious:false
                        Preview:ElfChnk.....................................0k...l..C.......................................................................2\x5................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................6Y......................................**..............X.j[d.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):70808
                        Entropy (8bit):4.478258057924485
                        Encrypted:false
                        SSDEEP:1536:KpAENzy/a9q4dtOyzFyQWsk4cLSKph9YC/cmqbL9tKGjDLSGUpBpJyGBapAENzyA:K+ENzwa9q4dtOyzFyNsk4cLSKph9YC/Y
                        MD5:B11B988799543BBDE931B3E36AEC865A
                        SHA1:9BD32C90EFEA364F8B45284AE9138E8E8BCA91DA
                        SHA-256:6A535C910BBBB4FB0384CC324450F4CE35B6CAE1DA4116A6EF7D9EC8461CE013
                        SHA-512:6EFB4C2AC791A7EA8659ACC0F51D29E04D29A90EA64FC870D774D38BE9108489431C16C8E44C3390087192957B34229A62A93596A2ECF6A081CA6652F2213EFE
                        Malicious:false
                        Preview:ElfChnk.+.......[.......+.......[...........X]...^..C..|.......................................................................................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F................................................................................................O.......8..&.......AR...6..12...............:......**..x...R........?...a.........Z..&...............................................................8.......P.....!....nqm......... .?...a....,.X\.A....k.........R........................$.N......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e..n30'.|D..Q.R.a.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e./.O.p.e.r.a.t.i.o.n.a.l......L12........r.i.tx...**..(...S.......;....a.........Z..&...............................................................8.......P.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.517082344367377
                        Encrypted:false
                        SSDEEP:384:YjdAhA71d7587RS7a07DL7T7G7z7L7k7OXD7u7y7I717/7u7m727L07E7K72t7Rt:YBAiHEV6koTxbkeQEWi7Di
                        MD5:2628D3458E9FBE638FC3A49E317866FA
                        SHA1:8DB033ED373F8A837073679CE0F3B5DC1BD7085B
                        SHA-256:D2B987B5AC61D1C66CACD6D0492AC4C4C316C9EE94638A0D312803BB9C24FD00
                        SHA-512:6C3683E0A8CF261353830E1F2344A59428E55BBCAFE032AF52624FF961F28608C7E64134BBA4764DEB8885D384DFA593325DB889E9D752226FC29885E3520A67
                        Malicious:false
                        Preview:ElfChnk.....................................po..@q....`....................................................................\.$.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................e4.............../..s...........&................................................L..............e2......................**..H............<R.d.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):2.314954486903959
                        Encrypted:false
                        SSDEEP:384:5mhc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauia:s6Ovc0S5UyEeDgLpIC4DoA4
                        MD5:864CAA67E4BF2A335E088526FF347CD9
                        SHA1:64E224001D864A18D4999F5D33A42C532877A361
                        SHA-256:C904C319101B31E991343FC8FF2929F6841599C9DCC23AC6218272F630AD5894
                        SHA-512:B899FA6CDC7D0F97BACCC9025516045878BBA58E86ADEA79AA164B3B27F00F6E52F8B8838210A3ECD0C0E6A20D9DD48A4A4754F7408C1DA5F1FDC2EE7A504231
                        Malicious:false
                        Preview:ElfChnk.........A...............A............u...v..........................................................................c.w.................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................................................6f......w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):2.773262505715791
                        Encrypted:false
                        SSDEEP:384:bhGuZumutu4uEu5uOuDuyb2uPu1uVupUupu+R7udu4uEu1u0u8uhuluxuMuxuMuH:b/vI
                        MD5:C06B3BF303EBDD17D76D87B596EE5407
                        SHA1:BFC46338E3A89112D6D7E1CFF7A9FB5909DE6458
                        SHA-256:26AB9FE5730119306B700304DF2B2C11C6E8322F29CAA9AD49CBBA968DD54CD9
                        SHA-512:7CBD5FFB770669AC0295C6221E02D24C116F4B72E3D990F60D122B2AED3280075DA5C3DBCA8A5749F5E566920799087D1094ECB31B5937D8B78EFB40BEC0D0A2
                        Malicious:false
                        Preview:ElfChnk.........T...............T...........@........J......................................................................?..................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................vN......................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.2371167268838485
                        Encrypted:false
                        SSDEEP:384:RhiAeCv4A+yMrAmA1AHA6AbAMAEAFmANA49ALAEAyKiAfAFgAw+AqAFAApjANAil:RCCvudb6KinaWRQJ4+8nEPDh0
                        MD5:3F2115642206C3D448781C58F4EE8AF3
                        SHA1:1408F4FF05D6887F74B445E296BC9B69163EDDAE
                        SHA-256:84EF0FE4C7A64FA8200DEE7E064A658C2BB94A262A6DBD1353CB7EE458DF1684
                        SHA-512:C3B530EA9AC3FD03615D91457CB88474254CCC6B53B3737C932690059274ED18552F40836F7CF78B698A650D636A93B72EC8C8E8057921A28CAF3718D18C85CC
                        Malicious:false
                        Preview:ElfChnk.........................................@....a..........................................................................................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................................5.................................................... ..........&................................$......**..`..............;f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):3.1631981097466806
                        Encrypted:false
                        SSDEEP:384:4hKpsdp90mp9b2p9iGp95ep94+p9/Kp9Wqp9tap98Cp9Pp96p9lp9za1p9Dp9Wpb:4cafg0Y
                        MD5:CBAE5379AAAD2B6A84714F5CEA39ACFA
                        SHA1:A1AC7C71917C9F27EDA9E17CF0CAD78FC07A82E5
                        SHA-256:726B1343CDE4D4B7D2558B9B3E86DAD3782983304D0349974FFA7725D40A9D2B
                        SHA-512:7A6DF8A6BDF99348719F7005EFD293089BDD9EB93E2801CB7F3F38C77717E1E47D496E7A1D8FA9FED8EC27D28946214B71C7B156A537B40112D4A76E38F968B8
                        Malicious:false
                        Preview:ElfChnk.........'...............'....................k......................................................................+N.>........................................<...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..............E.yrf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.036288214996343
                        Encrypted:false
                        SSDEEP:384:vhtbpwV1pIvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWB0:vwDoh1V00eB9iVsTBwMjO2
                        MD5:80B64057A5C06D0016A06F2D493CF301
                        SHA1:452FDD974A9D63E05AC2F9AE4199CFD0C7CDCD62
                        SHA-256:5ABDEF24E5D651A400B36F57A109443BC4F1C975FDAEBB512ADE44935C8BEB1A
                        SHA-512:4F9E119EDA7FEED0948DABBDE51C9CBD835DB19EE717F3ED6EB99A16240EB351C968F4A8C39E8BCA2124A0E8A1C53AE5CD8A7D7F61748AFDE0574FF675166F43
                        Malicious:false
                        Preview:ElfChnk.\...............\.......................X...j.......................................................................LU.t................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F............................................;..............&...................................i..................................mS..............**..8...\........=..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):1.166433348209963
                        Encrypted:false
                        SSDEEP:384:/hwCCRzCaCkClCzCYC/CyCVCGCMCvCACWCKECQCMCdC:/KF6
                        MD5:9AB3073B8BEBBC3C1E9DCB47217C8E27
                        SHA1:33477618A675262EFDC74FACE70AE448EE9CAA05
                        SHA-256:E19A280A63CB747D2029892A6F0E67D2C83461FF15112067AF24B8B5E136CC30
                        SHA-512:58DD3DECA39CBF605861F78EDD27F3F97858581322063E9F7F1169C9F190613A22649289959A525729F503643B5EFDF5C1C20EE43C21B69C9B4468BA0BDAD6F5
                        Malicious:false
                        Preview:ElfChnk.....................................04..h6............................................................................4................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................................................+................................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:modified
                        Size (bytes):103744
                        Entropy (8bit):4.524216194849794
                        Encrypted:false
                        SSDEEP:384:yMPYcMPYrMzY7MzYbMzBM2M/M8fMsMsMhhzMOYQNM6dM1MoYFMoYOKIKFKSKBKYk:05sFmKNLZ5sF8
                        MD5:8F410BF6390D292AE3117F69B213A041
                        SHA1:9D8AD0B3275AF7632E135F84292CE8ADB201E9C1
                        SHA-256:D937F0E0C293099BCFAD990AA2D4DC4710D1B5A5DD3FD1A7F943E9E95110D7B6
                        SHA-512:E133B5BAD6711E10771B10AE35FEC5FDD2FECF9CDFA62BB5F5BE89CA8700A0B1C61860E97172D8463E7D8DC95BE6284C927BBE950D5D8BBAD04C285C978B3C9F
                        Malicious:false
                        Preview:ElfChnk..%.......%.......%.......%...........o...r..5.l......................................................................x.........................................6...=...........................................................................................................................f...............?...........................m...................M...F........................H..................................u...............................................&........*..............................**.......%......b...g..........Z..&.......................................................................F...9.!...A.A...........b...g...0.U.f....*U.f.......P....%...................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.t.o.r.e..7*...\..C.....M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.t.o.r.e./.O.p.e.r.a.t.i.o.n.a.l......................I.......S.k.i.p.p.i.n.g. .l.i.c.e.n.s.e. .m.a.n.a.g.e.r.:. .P.F.N. .M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s.A.l.a.r.m.s._.1.0...1.9.0.6...2.1.8.2...0._.x.6.4
                        Process:C:\Windows\System32\svchost.exe
                        File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 15, DIRTY
                        Category:dropped
                        Size (bytes):79016
                        Entropy (8bit):1.821617794541319
                        Encrypted:false
                        SSDEEP:384:yWhL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUm6UmaUmVAUmSUmxhL6UsE0ZI:ZY7L8LY7L8
                        MD5:386CCDD7CA512EB5AC6165D7993D3A22
                        SHA1:855A099D23078C20019C4D34CB978FF6E4135F44
                        SHA-256:9E40F84C9FB8CD68C9BC9E706AC8C9C9E1C5C3A0F2256565090D7DFCBB5ECB3E
                        SHA-512:A0CCB30C6BFBA3EC1D338109C8AF879DDE73A69F1F028CE60B9C5469A9921859EF40D36C384651A5874E92B16585E0DD486FA15C8BE9F701BBB9BFCDADEFD295
                        Malicious:false
                        Preview:ElfFile.....................................................................................................................\>.eElfChnk......................................1..(4...........................................................................zN................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................................................>-......................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):67776
                        Entropy (8bit):0.3684227027893663
                        Encrypted:false
                        SSDEEP:48:MdVWd8HrP+8QNRBEZWTENO4brBE3olDD/6yHVWd8HrP+8QNRBEZWTENO4brBE3oX:8qNVaO8io1/6yNqNVaO8io1/6y
                        MD5:82426AAEC6347B4EB99B3AAD13F81F64
                        SHA1:66830127F38135ABD8750679474753B24FE09AF3
                        SHA-256:04EE213CDFCAD5D4F07309857C4F3EF997676C9FD38F0EDD5006CC168913B8C7
                        SHA-512:6EB778D87F2DD4D9694A2495F39EFFC53CA5972B2936A31A418C4F6CAA8385A44AEF99F1B6D28152001F18C369EF8FDAD64D7DF6F38BE378C1AD5E9A09BBB5CF
                        Malicious:false
                        Preview:ElfChnk.......................................................................................................................K.................".......................J...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**...............3..g..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):1.9658503180918458
                        Encrypted:false
                        SSDEEP:384:khHivRiLiakrkEi5iciMiHiQi8ixiBiFioikiFiixFiIMZifiwiLitixgZJiJi/P:kgtxHMa
                        MD5:9961A2C4F5AC430AB4FE55D69904E2C9
                        SHA1:BA49A1A12A889812148BECC8D5B285AD418D54FE
                        SHA-256:EAE8AAB4F398C27A8E7855C8524389EBE4F695B28D2B51E9EA916738D5E579E9
                        SHA-512:B7B0B29444E2B9BECCA18B96D5CA3D7098236C9919F7DE59A37405012C19C6B641CD3C1DA7E9E12F454004B93BB022F689125D31E26825929BB9A7D79FEF3199
                        Malicious:false
                        Preview:ElfChnk.y...............y................... d..0f.....6.....................................................................;.................>,..........................=.......................#.......................................>...........................................................f...............?.......................P.......................M...F...................................................9.......n(...............................................:...............,......................**......y..........a...........g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):3.406780926092983
                        Encrypted:false
                        SSDEEP:768:QZaQLBaLa3azavaKWabafaHa7aqOaLaDaXaHafafa3aLaraDanaTavaHafajaTaK:ELQ
                        MD5:CBD25CED1C3F6F0D6215874D4E24B845
                        SHA1:27B08A2238A8A0F4E067ECA9BE36063C3EBCC451
                        SHA-256:37C7688A334523D0CB0D41A7CF52185BFC47639C524F045A2AF863B7720C69E6
                        SHA-512:D4955A2A8431DAC65F8A08104B1641FBC6FDF783F6F0B4A6825E590C69602A571E27A0945B87D03EA765BBE62FA3C2126582CAEDA76986A530D5AF6DB2512229
                        Malicious:false
                        Preview:ElfChnk.........@...............@...............`....).......................................................................'.1................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&...;...................................**..H...............f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):1.3650161876414235
                        Encrypted:false
                        SSDEEP:384:2haXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJiXJtXJiXJWTXJpXJUXJ4XJ:2Q0yUkNYwD8imLEWTWW1fsg
                        MD5:346E087AE87A771402B2E38619AB7B71
                        SHA1:4B7EFEA99E401A5E6C0D115E2B27C48778704C13
                        SHA-256:82B60B9565D3FDA733EF5B4A6996AD51C08BC604BE6DC184255A8928B1220EE5
                        SHA-512:63C3EB568562AD3560924F7830F0ED120CC362A9FC24EA6CCE4B0EC5F90A0BBEF58539C26B5379A5E6D1939BED7D06A92B4A2521775AF2516793F42A289C0E4B
                        Malicious:false
                        Preview:ElfChnk......................................A...D.....<....................................................................7...................j...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&................................................6..........C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.335318634068108
                        Encrypted:false
                        SSDEEP:384:ehRmsmRm1m4mXm9mSmBmStmtmimMmAmAmRmcmxHmEmqmwmHmLmlm9mGmdmpm3mfr:euDcxMmo
                        MD5:3B31610BEABB5895A19C346C64C234C6
                        SHA1:84316C06991A51AD91C247130B615F0E56CD4D01
                        SHA-256:EA4D4D4A4D56D42B0205793B2C9E45A732EA2F8909095BF924C2F4A138DE0404
                        SHA-512:2B9784678702654E8FA65456A501F9F6B48ABD575EE58264709A97FFF9C38C26C7A6ED9057278E1A090BBB4BD2F88FBC95E636D9DEE509142B67B4D81FBAB5A1
                        Malicious:false
                        Preview:ElfChnk......................................'...(..'.D........................................................................R................L.......................t...=...........................................................................................................................f...............?...........................m...................M...F...............................................K...........................................%...............&.......................................**.................Hf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.7112352075765392
                        Encrypted:false
                        SSDEEP:192:BV7VDiDL/bDiDwTDiDHDiDDDiDSDiD8DiDkDiD0DiDEDiDMDiDMDiDMDiD:BhV2nT2UT272/2+2w2g2w2I2o2A2I2
                        MD5:5D63AFB3EA60A7655FF95B4DB1B451E0
                        SHA1:B5D236316CC6617071D83D7E1B4367DDA1A889B1
                        SHA-256:815D1AE9187ED88319DDCD4F95D544E3B4FC3D12E2BF9A0DFD30441819089010
                        SHA-512:C00665A8527B92BB677696119894947DA47603CD1168B3536E7317E8D82C1A3563D50612C4AEF5BDEE75D491AEC97F8AB543F5FA1EB5E4080E7B1D8A55FE57E6
                        Malicious:false
                        Preview:ElfChnk.............................................u.=k....................................................................Z}#.................N.......................v...=...........................................................................................................................f...............?...........................m...................M...F...............................'...........................................................................&.......................................**.................sf..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):68712
                        Entropy (8bit):4.361668814791369
                        Encrypted:false
                        SSDEEP:384:QRR4z0jBDRPR39ZhlR0CsRNHgR/R0ZRpERORRRR4z0jBDRPRHmXR9XPRFrRXVRcy:UZiHRm3X3NI538LMi
                        MD5:7839B088DE61B1CF65F70A24FA115B45
                        SHA1:25C56E3363C4BB415405B47FB1BCB7C721FF369E
                        SHA-256:3B342B1F051DDF5140B2828047DBCD036E86DEC12CE2421DFFCF00936E39D9E4
                        SHA-512:5DC3EDD102FC94F491AF775AAEDD7EA3AE4F5CEF644348C84E0B9F8A73104E745789BAD17390073AC3976029A6F69E4679DB9ED44242633C3CA9AE38D45F326A
                        Malicious:false
                        Preview:ElfChnk.J.......S.......J.......S............,.../....U........................................................................3....................C.......Q............(..=.......................................0"..d....................'..7#..........................................V(......(...f...+...........?....................... .......................M...F.......)(.......'..............................&............................................................&..................................*...**......Q........8...a.........'.z&...............................................................<.......T.....!................@.8...a......R.6O.O..=..Q........Q....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y.......#F.~.J.{..M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y./.O.p.e.r.a.t.i.o.n.a.l...(~K..&..."..(~K..95S....V.X.........A.......&..?...g<..O.p.e.r.a.t.i.o.n._.C.l.i.e.n.t.F.a.i.l.u.r.e...o....j.....3.h.t.t.p.:././.m.a.n.i.f.e.s
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.282820835556058
                        Encrypted:false
                        SSDEEP:384:chOhpuhdh+h9hthXhzh8cghshqh9hihXhMhxhzhwhohGh5h3hShChWhzhLhahYhr:cQsFpkBc1S
                        MD5:7DB7567819F7CFC6955126B8306826E6
                        SHA1:45CCB1C41CA1C6E1384207444A8B84437408DF1A
                        SHA-256:0DDCE2B5ADFAAB4EF8A1686D0064B8CCFF43B1D3C93893A62EF07B7FB896E8E5
                        SHA-512:FF5F662885580210B522215F56FD29417B6555F0878610D44D8F798E044876F99F86C5FF688BB77C92B894368E5DF32130B52BFE37401BACD3305B63463A2394
                        Malicious:false
                        Preview:ElfChnk.........................................P.....Q................................................................................................................:...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&...............!.......................**...............k..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):1.232783163157918
                        Encrypted:false
                        SSDEEP:384:ZhOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVMV3VJmVhpVEVA:Zyjbj
                        MD5:71A005B17A2D32C10709277023D447E6
                        SHA1:14754F04007D539159F75D62AACC6A282CAA8D54
                        SHA-256:6E220C6CCBB76AEE639EDFCC6204C80EEC9FA1CCE0AC40EE4B821AF3AC27887B
                        SHA-512:BC3533B3DEF1BC8B7D990700CA573EFF57D05C4E72DF2BB536247466D5FE9EB5DFE6F2EC18F02C808449F998AC00E26E920E3984B4E8367F8E9AF188BD1D9518
                        Malicious:false
                        Preview:ElfChnk.........!...............!............7..`8...).....................................................................Ce.~................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................v................................................+......................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.214092789754939
                        Encrypted:false
                        SSDEEP:384:mhZBwBjsrBwBhBwBj4BwB6p+/4WBwBQ/cBwBjQNqObx13ABwBqhdBwBQ/LQBwBQZ:mOsc6QNqObxZyS3qes
                        MD5:08A246EE9A5813CA40C7F9B6D3B9C36F
                        SHA1:96FD95304A9D1F958128D8447A9C9805AB7AFACB
                        SHA-256:4662FE870ACC7D800BCAA664F14EE7E1AF8772462933274E933CAA78CC1397B8
                        SHA-512:9BB7E230CB4CD4653F7102177492517329F07429589B5C45DD054E315D84C581734420C90A050CD673B9C7B4A232EECDEF6084833FD54AA0DA922052CA0C175B
                        Malicious:false
                        Preview:ElfChnk.^.......m.......^.......m...........@;..p>....*T.......................................................................o............................................=...........................................................................................................................f...............?...........................m...................M...F...........................g...............................................................................&.......................................**.. ...^...........f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):4.414298413407747
                        Encrypted:false
                        SSDEEP:384:3thQUE2UEFUE5UEKUEODUEzUEFUEsUE/UEGUE6UEWUE9UEtUEBUE8UEGUEuUE5UD:9w/RPoP6e
                        MD5:77D9AFD001F6BBD592C19652D671FEA3
                        SHA1:B87EA73299713B00D44A123C4B48636957EA90CE
                        SHA-256:E25E174DE18D3B90B5EBC3C394A7C6BFC34F3E27FB260758BC8CB135E4D45770
                        SHA-512:C81A545351015315060E812535A43C97A0FCBC2F49AA2034B50F963839F7F7DC1BC16EF070D5FF951E5FE82A9B315E8EFC20470707FD8C995A932E44369845E8
                        Malicious:false
                        Preview:ElfChnk.........................................8...,..t......................................................................>................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..............._..f..........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):68128
                        Entropy (8bit):4.242923777939073
                        Encrypted:false
                        SSDEEP:384:2FRRFRHTjoNSg0PtocChoLu60zCwySonMt0SoHMtoLoHMtaoDoH5OD0obO9ZoJf1:wNLFj0Dyid9sPryVpxy
                        MD5:006C6C2036A0D06A3653C7548763C7B7
                        SHA1:683F6DD7F52333497D1449C2A6F04B0CEA1DAD87
                        SHA-256:CE03030248BB7A6E2C5A04EF37C8095664713E6A0EC3287E1E68C7FDBBEDB7DA
                        SHA-512:15EAE3E540C4EF034E3201E605D244C3627A85A634DA74FB9EC6B83DB85A9F30DFC75B1F55672FBDC6470DF9EB7B1FD536834297CC6E25093A94EC5DD8951AB7
                        Malicious:false
                        Preview:ElfChnk......................................... .....Q...........................................................................................s...h...............N...=...................................................N...............................................w.......6......................./...................................]...........).......M...T...:...............................................................................................................&...............................**.. ...........!\...a..........*.&.........*.9.LS5..f....A.......A..5...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....^...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):67992
                        Entropy (8bit):0.40418713094207487
                        Encrypted:false
                        SSDEEP:96:u7NVaO8ioTE8SRO217NVaO8ioTE8SRO2:uJV7uE1RLJV7uE1R
                        MD5:9A44CAAB8F3A4A9AD3D6CFFCE3EE0AA8
                        SHA1:936960E6E76267FD20A931DEB8A1D32DF5326810
                        SHA-256:2AB1651667A8876745942FA25F87B1192C49B46433C8F6EBE378A0769788FE3A
                        SHA-512:54868AF2E01A222DBA108A090E4DBA4F92B98E1972283D7D74D844BE66446D2629C1E10D696C3E36AD9EA1D7D5C5AA36AEBA961624004C49F9E07762227BD911
                        Malicious:false
                        Preview:ElfChnk...............................................6&....................................................................................................................=...........................................................................................................................f...............?...........................m...................M...F...........................................................................................................&.......................................**..............(k..a.........Z..&........Z.. ..Z...`............A..~...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):79360
                        Entropy (8bit):4.407312477284869
                        Encrypted:false
                        SSDEEP:768:8W2fW27Mo46/iP6f/4wNeRKe+PH+YektW22KQd:UMFfP6PeMPZdpQd
                        MD5:C48E4B37238FC810CDA8387E76BC2129
                        SHA1:90D11DFA71D872C73C07D4B50A453DA767068ADA
                        SHA-256:1012A2D506505F259A264F172529CDD5076A5B44A36805E2CF513A13E40B6084
                        SHA-512:42267A9D6DD47C822261DED6EC003CDE170535CF8105A3E583718F53171CE8A670AD77B39D5C4CE62AA9B1665E4E9E664E474B6A58370B4E3928D79FB6FD9E20
                        Malicious:false
                        Preview:ElfChnk..............................................'......................................................................0%......................s...h...................=...................................................N...............................i...0...........w.......2.......................G...................................Y...........).......M...5...:........................................................................................................... ...........................&.......**..............!\...a.........#m.&........#m...].N.I.P.=.......A..1...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....Z...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):77088
                        Entropy (8bit):3.822549954950183
                        Encrypted:false
                        SSDEEP:1536:TU8398/1Z2ngybZU8398/1Z2ngybSaCssVtIdhxJVf+9f9f+AHF5bx7CQR:phxJVf
                        MD5:97A2CFDD2893B6ECF7749024E29784DB
                        SHA1:0E9F8C809E9E1D61BE9F927E7C7FEE3EDE7C6605
                        SHA-256:17500910834A64B3BDF514B5391DB6A851D4FDD3360358BB71FADECE380F5C10
                        SHA-512:1606598B68D62EBCDC2160BD2FDF769E15F4292456211A41F2524CD398BDBA7E4C26800F613D5AA9DF19580ACA22FC158A91D1C5BE72C0CB226D84E785DB8F81
                        Malicious:false
                        Preview:ElfChnk.................i.......p............(.. -.........................................................................................................................=..........................................................................................................................._...............8...........................f...................M...c...........................p...............&.......................................................................................................**......i........Nt..a........!j..&.......!j....:Tc`.)..h........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..R............{..P.r.o.v.i.d.e.r.../....=.......K...N.a.m.e.......P.o.w.e.r.S.h.e.l.l..A..M...s........a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n............
                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                        Entropy (8bit):6.519628355610314
                        TrID:
                        • Win64 Executable GUI (202006/5) 92.65%
                        • Win64 Executable (generic) (12005/4) 5.51%
                        • Generic Win/DOS Executable (2004/3) 0.92%
                        • DOS Executable Generic (2002/1) 0.92%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:xmr.exe
                        File size:5'468'672 bytes
                        MD5:154202154e41175e801a698ca940eb0c
                        SHA1:6ce074d67c91cb00016cb1095319b00afab396a8
                        SHA256:0612bfb5a51b0b413ba960f7d52bc647bd4cf7530fd760c0d6006aa829e806e2
                        SHA512:7d0a7474c28b87972fb02a48ee56a2549765a584a53abbd123631e142a655b17f3508b7d3c2b90f3174d118940143af12728355900472f27fe8280aa11a8f540
                        SSDEEP:98304:LOl8w9dke5gARmiTqHc2+i72sq2GMbo9GYaUbTvcB7abEUGyxByPuZ0:LOlj9dkC8c2F2D2G1GVLB7WBBNG
                        TLSH:0F4623485EEF1CE8E0F458340C5254A7F67B7069F972D3CB66AA93E081F2F1EA150987
                        File Content Preview:MZx.....................@...................................x...hr......!..L.!This program cannot be run in DOS mode.$..PE..d....;.f.........."...........R.....@..........@..............................S...........`........................................
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x140001140
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x66C13B8A [Sun Aug 18 00:08:42 2024 UTC]
                        TLS Callbacks:0x40001760, 0x1, 0x400017e0, 0x1
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:203d63d5d9a088e2d84cef737227986b
                        Instruction
                        dec eax
                        sub esp, 28h
                        dec eax
                        mov eax, dword ptr [00009ED5h]
                        mov dword ptr [eax], 00000001h
                        call 00007F0B9CD74E0Fh
                        nop
                        nop
                        nop
                        dec eax
                        add esp, 28h
                        ret
                        nop
                        inc ecx
                        push edi
                        inc ecx
                        push esi
                        push esi
                        push edi
                        push ebx
                        dec eax
                        sub esp, 20h
                        dec eax
                        mov eax, dword ptr [00000030h]
                        dec eax
                        mov edi, dword ptr [eax+08h]
                        dec eax
                        mov esi, dword ptr [00009EC9h]
                        xor eax, eax
                        dec eax
                        cmpxchg dword ptr [esi], edi
                        sete bl
                        je 00007F0B9CD74E30h
                        dec eax
                        cmp edi, eax
                        je 00007F0B9CD74E2Bh
                        dec esp
                        mov esi, dword ptr [0000BE19h]
                        nop word ptr [eax+eax+00000000h]
                        mov ecx, 000003E8h
                        inc ecx
                        call esi
                        xor eax, eax
                        dec eax
                        cmpxchg dword ptr [esi], edi
                        sete bl
                        je 00007F0B9CD74E07h
                        dec eax
                        cmp edi, eax
                        jne 00007F0B9CD74DE9h
                        dec eax
                        mov edi, dword ptr [00009E90h]
                        mov eax, dword ptr [edi]
                        cmp eax, 01h
                        jne 00007F0B9CD74E0Eh
                        mov ecx, 0000001Fh
                        call 00007F0B9CD7E0B4h
                        jmp 00007F0B9CD74E29h
                        cmp dword ptr [edi], 00000000h
                        je 00007F0B9CD74E0Bh
                        mov byte ptr [00537531h], 00000001h
                        jmp 00007F0B9CD74E1Bh
                        mov dword ptr [edi], 00000001h
                        dec eax
                        mov ecx, dword ptr [00009E7Ah]
                        dec eax
                        mov edx, dword ptr [00009E7Bh]
                        call 00007F0B9CD7E0ABh
                        mov eax, dword ptr [edi]
                        cmp eax, 01h
                        jne 00007F0B9CD74E1Bh
                        dec eax
                        mov ecx, dword ptr [00009E50h]
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xccd80x3c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x53a0000x18c.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x53d0000x78.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0xb0a00x28.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb4100x138.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0xce780x160.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x96160x980044eda265e6365a2ed99c22dead73472dFalse0.48553145559210525data6.141032412393602IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0xb0000x246c0x2600eca998696ecb54736320991caa9725f7False0.45672286184210525data4.6492072318033415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xe0000x52bd980x52a80055e127bbc47e7a45f700ba8b973f4d47unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x53a0000x18c0x200bce08e81f3f6fdaabc1f878981edacd9False0.5078125data3.183906458783946IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .00cfg0x53b0000x100x200b18c7380298e104adf73576fa46bccc1False0.04296875data0.15127132530476972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .tls0x53c0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .reloc0x53d0000x780x2007b813d4cf20ea86d13c0c697436c2c04False0.236328125data1.435244403940088IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        DLLImport
                        msvcrt.dll__C_specific_handler, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _fmode, _initterm, _onexit, _wcsicmp, _wcsnicmp, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, memset, signal, strlen, strncmp, vfprintf, wcscat, wcscpy, wcslen, wcsncmp, wcsstr
                        KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetLastError, InitializeCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 7, 2025 16:20:43.713453054 CET1.1.1.1192.168.2.80xf548No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                        Jan 7, 2025 16:20:43.713453054 CET1.1.1.1192.168.2.80xf548No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                        Jan 7, 2025 16:21:20.687737942 CET1.1.1.1192.168.2.80x16d1No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                        Jan 7, 2025 16:21:20.687737942 CET1.1.1.1192.168.2.80x16d1No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

                        Code Manipulations

                        Function NameHook TypeActive in Processes
                        ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                        NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                        ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                        NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                        ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                        NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                        NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                        ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                        ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                        NtResumeThreadINLINEexplorer.exe, winlogon.exe
                        RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                        NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                        NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                        ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                        ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                        Function NameHook TypeNew Data
                        ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                        NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                        ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                        NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                        ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                        NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                        NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                        ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                        ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                        NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                        RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                        NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                        NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                        ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                        ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                        Function NameHook TypeNew Data
                        ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                        NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                        ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                        NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                        ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                        NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                        NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                        ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                        ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                        NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                        RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                        NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                        NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                        ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                        ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:10:20:25
                        Start date:07/01/2025
                        Path:C:\Users\user\Desktop\xmr.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\xmr.exe"
                        Imagebase:0x7ff7b0200000
                        File size:5'468'672 bytes
                        MD5 hash:154202154E41175E801A698CA940EB0C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:2
                        Start time:10:20:25
                        Start date:07/01/2025
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                        Imagebase:0x7ff6cb6b0000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:10:20:25
                        Start date:07/01/2025
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:10:20:29
                        Start date:07/01/2025
                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                        Imagebase:0x7ff605670000
                        File size:496'640 bytes
                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:5
                        Start time:10:20:29
                        Start date:07/01/2025
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                        Imagebase:0x7ff60d9a0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:6
                        Start time:10:20:29
                        Start date:07/01/2025
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\sc.exe stop UsoSvc
                        Imagebase:0x7ff738950000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:7
                        Start time:10:20:29
                        Start date:07/01/2025
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:10:20:29
                        Start date:07/01/2025
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:9
                        Start time:10:20:29
                        Start date:07/01/2025
                        Path:C:\Windows\System32\wusa.exe
                        Wow64 process (32bit):false
                        Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                        Imagebase:0x7ff75a840000
                        File size:345'088 bytes
                        MD5 hash:FBDA2B8987895780375FE0E6254F6198
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:10
                        Start time:10:20:29
                        Start date:07/01/2025
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\sc.exe stop WaaSMedicSvc
                        Imagebase:0x7ff738950000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:11
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:12
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\sc.exe stop wuauserv
                        Imagebase:0x7ff738950000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:13
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:14
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\sc.exe stop bits
                        Imagebase:0x7ff738950000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:15
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:16
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\sc.exe stop dosvc
                        Imagebase:0x7ff738950000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:17
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:18
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\dialer.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\dialer.exe
                        Imagebase:0x7ff66fbf0000
                        File size:39'936 bytes
                        MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:19
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\sc.exe delete "ARIBLEUL"
                        Imagebase:0x7ff738950000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:20
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:21
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\sc.exe create "ARIBLEUL" binpath= "C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe" start= "auto"
                        Imagebase:0x7ff738950000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:22
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:23
                        Start time:10:20:30
                        Start date:07/01/2025
                        Path:C:\Windows\System32\winlogon.exe
                        Wow64 process (32bit):false
                        Commandline:winlogon.exe
                        Imagebase:0x7ff6cc5a0000
                        File size:906'240 bytes
                        MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:24
                        Start time:10:20:31
                        Start date:07/01/2025
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\sc.exe stop eventlog
                        Imagebase:0x7ff738950000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:25
                        Start time:10:20:31
                        Start date:07/01/2025
                        Path:C:\Windows\System32\sc.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\sc.exe start "ARIBLEUL"
                        Imagebase:0x7ff738950000
                        File size:72'192 bytes
                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:26
                        Start time:10:20:31
                        Start date:07/01/2025
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:27
                        Start time:10:20:31
                        Start date:07/01/2025
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6ee680000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:28
                        Start time:10:20:31
                        Start date:07/01/2025
                        Path:C:\Windows\System32\lsass.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\lsass.exe
                        Imagebase:0x7ff6b5fa0000
                        File size:59'456 bytes
                        MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:29
                        Start time:10:20:31
                        Start date:07/01/2025
                        Path:C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe
                        Wow64 process (32bit):false
                        Commandline:C:\ProgramData\ctnanvlfqbax\lrgkmixyjzta.exe
                        Imagebase:0x7ff61c0a0000
                        File size:5'468'672 bytes
                        MD5 hash:154202154E41175E801A698CA940EB0C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 76%, ReversingLabs
                        Has exited:true

                        Target ID:30
                        Start time:10:20:31
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:31
                        Start time:10:20:31
                        Start date:07/01/2025
                        Path:C:\Windows\System32\dwm.exe
                        Wow64 process (32bit):false
                        Commandline:"dwm.exe"
                        Imagebase:0x7ff7751a0000
                        File size:94'720 bytes
                        MD5 hash:5C27608411832C5B39BA04E33D53536C
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:32
                        Start time:10:20:33
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:33
                        Start time:10:20:33
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:34
                        Start time:10:20:33
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:35
                        Start time:10:20:34
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:36
                        Start time:10:20:34
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:37
                        Start time:10:20:34
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:38
                        Start time:10:20:35
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:39
                        Start time:10:20:35
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:40
                        Start time:10:20:36
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:41
                        Start time:10:20:36
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:42
                        Start time:10:20:36
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:43
                        Start time:10:20:36
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:44
                        Start time:10:20:37
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:45
                        Start time:10:20:37
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:46
                        Start time:10:20:37
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:47
                        Start time:10:20:37
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:48
                        Start time:10:20:38
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:49
                        Start time:10:20:38
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k LocalService -p
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:50
                        Start time:10:20:38
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:51
                        Start time:10:20:38
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:52
                        Start time:10:20:39
                        Start date:07/01/2025
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                        Imagebase:0x7ff67e6d0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Reset < >
                          Memory Dump Source
                          • Source File: 00000000.00000002.1483083922.00007FF7B0201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B0200000, based on PE: true
                          • Associated: 00000000.00000002.1483040048.00007FF7B0200000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1483126256.00007FF7B020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1483162443.00007FF7B020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1483198670.00007FF7B020F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1484042744.00007FF7B0703000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1484100023.00007FF7B073A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7b0200000_xmr.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 09aa500106249f898c70f176d5dd8b6a7b84f69ff7d021052aa52de95c06f874
                          • Instruction ID: f5bcce84e009c7f5ad1f2bdb9465ef98119259d398ba8de59d8ca220d68dfee5
                          • Opcode Fuzzy Hash: 09aa500106249f898c70f176d5dd8b6a7b84f69ff7d021052aa52de95c06f874
                          • Instruction Fuzzy Hash: 82B09234D0430984E2053B0998412A9AA617B2A740F800020D60C02366EA6D60484B20

                          Execution Graph

                          Execution Coverage:0.7%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:3.7%
                          Total number of Nodes:81
                          Total number of Limit Nodes:2
                          execution_graph 14943 1f25abe273c 14945 1f25abe276a 14943->14945 14944 1f25abe2858 LoadLibraryA 14944->14945 14945->14944 14946 1f25abe28d4 14945->14946 14947 1f25ac11abc 14953 1f25ac11628 GetProcessHeap 14947->14953 14949 1f25ac11ad2 Sleep SleepEx 14951 1f25ac11acb 14949->14951 14951->14949 14952 1f25ac11598 StrCmpIW StrCmpW 14951->14952 14998 1f25ac118b4 14951->14998 14952->14951 14954 1f25ac11648 _invalid_parameter_noinfo 14953->14954 15015 1f25ac11268 GetProcessHeap 14954->15015 14956 1f25ac11650 14957 1f25ac11268 2 API calls 14956->14957 14958 1f25ac11661 14957->14958 14959 1f25ac11268 2 API calls 14958->14959 14960 1f25ac1166a 14959->14960 14961 1f25ac11268 2 API calls 14960->14961 14962 1f25ac11673 14961->14962 14963 1f25ac1168e RegOpenKeyExW 14962->14963 14964 1f25ac118a6 14963->14964 14965 1f25ac116c0 RegOpenKeyExW 14963->14965 14964->14951 14966 1f25ac116e9 14965->14966 14967 1f25ac116ff RegOpenKeyExW 14965->14967 15019 1f25ac112bc RegQueryInfoKeyW 14966->15019 14968 1f25ac11723 14967->14968 14969 1f25ac1173a RegOpenKeyExW 14967->14969 15030 1f25ac1104c RegQueryInfoKeyW 14968->15030 14973 1f25ac11775 RegOpenKeyExW 14969->14973 14974 1f25ac1175e 14969->14974 14971 1f25ac116f5 RegCloseKey 14971->14967 14977 1f25ac11799 14973->14977 14978 1f25ac117b0 RegOpenKeyExW 14973->14978 14976 1f25ac112bc 11 API calls 14974->14976 14979 1f25ac1176b RegCloseKey 14976->14979 14980 1f25ac112bc 11 API calls 14977->14980 14981 1f25ac117d4 14978->14981 14982 1f25ac117eb RegOpenKeyExW 14978->14982 14979->14973 14985 1f25ac117a6 RegCloseKey 14980->14985 14986 1f25ac112bc 11 API calls 14981->14986 14983 1f25ac11826 RegOpenKeyExW 14982->14983 14984 1f25ac1180f 14982->14984 14989 1f25ac1184a 14983->14989 14990 1f25ac11861 RegOpenKeyExW 14983->14990 14988 1f25ac1104c 4 API calls 14984->14988 14985->14978 14987 1f25ac117e1 RegCloseKey 14986->14987 14987->14982 14991 1f25ac1181c RegCloseKey 14988->14991 14992 1f25ac1104c 4 API calls 14989->14992 14993 1f25ac11885 14990->14993 14994 1f25ac1189c RegCloseKey 14990->14994 14991->14983 14995 1f25ac11857 RegCloseKey 14992->14995 14996 1f25ac1104c 4 API calls 14993->14996 14994->14964 14995->14990 14997 1f25ac11892 RegCloseKey 14996->14997 14997->14994 15043 1f25ac114a4 14998->15043 15036 1f25ac26168 15015->15036 15018 1f25ac112ae _invalid_parameter_noinfo 15018->14956 15020 1f25ac11327 GetProcessHeap 15019->15020 15023 1f25ac1148a __free_lconv_num 15019->15023 15025 1f25ac1133e _invalid_parameter_noinfo __free_lconv_num 15020->15025 15021 1f25ac11352 RegEnumValueW 15021->15025 15022 1f25ac11476 GetProcessHeap 15022->15023 15023->14971 15025->15021 15025->15022 15026 1f25ac113d3 GetProcessHeap 15025->15026 15027 1f25ac1141e lstrlenW GetProcessHeap 15025->15027 15028 1f25ac113f3 GetProcessHeap 15025->15028 15029 1f25ac11443 StrCpyW 15025->15029 15038 1f25ac1152c 15025->15038 15026->15025 15027->15025 15028->15025 15029->15025 15031 1f25ac111b5 RegCloseKey 15030->15031 15032 1f25ac110bf _invalid_parameter_noinfo __free_lconv_num 15030->15032 15031->14969 15032->15031 15033 1f25ac110cf RegEnumValueW 15032->15033 15034 1f25ac1114e GetProcessHeap 15032->15034 15035 1f25ac1116e GetProcessHeap 15032->15035 15033->15032 15034->15032 15035->15032 15037 1f25ac11283 GetProcessHeap 15036->15037 15037->15018 15039 1f25ac11546 15038->15039 15042 1f25ac1157c 15038->15042 15040 1f25ac11565 StrCmpW 15039->15040 15041 1f25ac1155d StrCmpIW 15039->15041 15039->15042 15040->15039 15041->15039 15042->15025 15044 1f25ac114e1 GetProcessHeap 15043->15044 15045 1f25ac114c1 GetProcessHeap 15043->15045 15049 1f25ac26180 15044->15049 15047 1f25ac114da __free_lconv_num 15045->15047 15047->15044 15047->15045 15050 1f25ac114f6 GetProcessHeap HeapFree 15049->15050

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                          • String ID:
                          • API String ID: 1683269324-0
                          • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction ID: 0ba97a8d74514715650d30c05628389cf15b5cf2b2ea17ad3bcdc96d6a851b40
                          • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction Fuzzy Hash: 8111ADF0F2274382FBA0AB25F8073F92294AB7470BF805139D946856B0EF78C0498E18

                          Control-flow Graph

                          APIs
                            • Part of subcall function 000001F25AC11628: GetProcessHeap.KERNEL32 ref: 000001F25AC11633
                            • Part of subcall function 000001F25AC11628: HeapAlloc.KERNEL32 ref: 000001F25AC11642
                            • Part of subcall function 000001F25AC11628: RegOpenKeyExW.ADVAPI32 ref: 000001F25AC116B2
                            • Part of subcall function 000001F25AC11628: RegOpenKeyExW.ADVAPI32 ref: 000001F25AC116DF
                            • Part of subcall function 000001F25AC11628: RegCloseKey.ADVAPI32 ref: 000001F25AC116F9
                            • Part of subcall function 000001F25AC11628: RegOpenKeyExW.ADVAPI32 ref: 000001F25AC11719
                            • Part of subcall function 000001F25AC11628: RegCloseKey.ADVAPI32 ref: 000001F25AC11734
                            • Part of subcall function 000001F25AC11628: RegOpenKeyExW.ADVAPI32 ref: 000001F25AC11754
                            • Part of subcall function 000001F25AC11628: RegCloseKey.ADVAPI32 ref: 000001F25AC1176F
                            • Part of subcall function 000001F25AC11628: RegOpenKeyExW.ADVAPI32 ref: 000001F25AC1178F
                            • Part of subcall function 000001F25AC11628: RegCloseKey.ADVAPI32 ref: 000001F25AC117AA
                            • Part of subcall function 000001F25AC11628: RegOpenKeyExW.ADVAPI32 ref: 000001F25AC117CA
                          • Sleep.KERNEL32 ref: 000001F25AC11AD7
                          • SleepEx.KERNELBASE ref: 000001F25AC11ADD
                            • Part of subcall function 000001F25AC11628: RegCloseKey.ADVAPI32 ref: 000001F25AC117E5
                            • Part of subcall function 000001F25AC11628: RegOpenKeyExW.ADVAPI32 ref: 000001F25AC11805
                            • Part of subcall function 000001F25AC11628: RegCloseKey.ADVAPI32 ref: 000001F25AC11820
                            • Part of subcall function 000001F25AC11628: RegOpenKeyExW.ADVAPI32 ref: 000001F25AC11840
                            • Part of subcall function 000001F25AC11628: RegCloseKey.ADVAPI32 ref: 000001F25AC1185B
                            • Part of subcall function 000001F25AC11628: RegOpenKeyExW.ADVAPI32 ref: 000001F25AC1187B
                            • Part of subcall function 000001F25AC11628: RegCloseKey.ADVAPI32 ref: 000001F25AC11896
                            • Part of subcall function 000001F25AC11628: RegCloseKey.ADVAPI32 ref: 000001F25AC118A0
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CloseOpen$HeapSleep$AllocProcess
                          • String ID:
                          • API String ID: 1534210851-0
                          • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction ID: 8c509b35c596b76e4e940d8f447e88ef2275b40013f635437f5716b361f0f9b4
                          • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction Fuzzy Hash: BE31BCF131274681FF509B26E6822F963E5AB64BD6F045439DE0D876B5EE3CC451CA10

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 57 1f25ac13844-1f25ac1384f 58 1f25ac13869-1f25ac13870 57->58 59 1f25ac13851-1f25ac13864 StrCmpNIW 57->59 59->58 60 1f25ac13866 59->60 60->58
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID:
                          • String ID: dialer
                          • API String ID: 0-3528709123
                          • Opcode ID: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                          • Instruction ID: 7501180c65486ae6da6c165926f0c9e3a94fc71c4350587be73713b4c7d5ca5c
                          • Opcode Fuzzy Hash: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                          • Instruction Fuzzy Hash: 14D05EF471234786FB649FAA88C66F02390EB24B5AF884031C90001260DB38C98E9E20

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction ID: 6309380138738fe91e75c5bf563d6ec4c223cfd73ac06ac9c8f1a056d8b6f98e
                          • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction Fuzzy Hash: 3A61003AB0179287EF548F1590227FDB3A2FB64BA4F589131DE5907798DA38DC52CB80

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 369 1f25ac12b2c-1f25ac12ba5 call 1f25ac32ce0 372 1f25ac12bab-1f25ac12bb1 369->372 373 1f25ac12ee0-1f25ac12f03 369->373 372->373 374 1f25ac12bb7-1f25ac12bba 372->374 374->373 375 1f25ac12bc0-1f25ac12bc3 374->375 375->373 376 1f25ac12bc9-1f25ac12bd9 GetModuleHandleA 375->376 377 1f25ac12bdb-1f25ac12beb GetProcAddress 376->377 378 1f25ac12bed 376->378 379 1f25ac12bf0-1f25ac12c0e 377->379 378->379 379->373 381 1f25ac12c14-1f25ac12c33 StrCmpNIW 379->381 381->373 382 1f25ac12c39-1f25ac12c3d 381->382 382->373 383 1f25ac12c43-1f25ac12c4d 382->383 383->373 384 1f25ac12c53-1f25ac12c5a 383->384 384->373 385 1f25ac12c60-1f25ac12c73 384->385 386 1f25ac12c83 385->386 387 1f25ac12c75-1f25ac12c81 385->387 388 1f25ac12c86-1f25ac12c8a 386->388 387->388 389 1f25ac12c9a 388->389 390 1f25ac12c8c-1f25ac12c98 388->390 391 1f25ac12c9d-1f25ac12ca7 389->391 390->391 392 1f25ac12d9d-1f25ac12da1 391->392 393 1f25ac12cad-1f25ac12cb0 391->393 396 1f25ac12ed2-1f25ac12eda 392->396 397 1f25ac12da7-1f25ac12daa 392->397 394 1f25ac12cc2-1f25ac12ccc 393->394 395 1f25ac12cb2-1f25ac12cbf call 1f25ac1199c 393->395 399 1f25ac12cce-1f25ac12cdb 394->399 400 1f25ac12d00-1f25ac12d0a 394->400 395->394 396->373 396->385 401 1f25ac12dbb-1f25ac12dc5 397->401 402 1f25ac12dac-1f25ac12db8 call 1f25ac1199c 397->402 399->400 406 1f25ac12cdd-1f25ac12cea 399->406 407 1f25ac12d3a-1f25ac12d3d 400->407 408 1f25ac12d0c-1f25ac12d19 400->408 403 1f25ac12df5-1f25ac12df8 401->403 404 1f25ac12dc7-1f25ac12dd4 401->404 402->401 411 1f25ac12e05-1f25ac12e12 lstrlenW 403->411 412 1f25ac12dfa-1f25ac12e03 call 1f25ac11bbc 403->412 404->403 410 1f25ac12dd6-1f25ac12de3 404->410 413 1f25ac12ced-1f25ac12cf3 406->413 415 1f25ac12d4b-1f25ac12d58 lstrlenW 407->415 416 1f25ac12d3f-1f25ac12d49 call 1f25ac11bbc 407->416 408->407 414 1f25ac12d1b-1f25ac12d28 408->414 418 1f25ac12de6-1f25ac12dec 410->418 424 1f25ac12e35-1f25ac12e3f call 1f25ac13844 411->424 425 1f25ac12e14-1f25ac12e1e 411->425 412->411 429 1f25ac12e4a-1f25ac12e55 412->429 422 1f25ac12d93-1f25ac12d98 413->422 423 1f25ac12cf9-1f25ac12cfe 413->423 426 1f25ac12d2b-1f25ac12d31 414->426 419 1f25ac12d7b-1f25ac12d8d call 1f25ac13844 415->419 420 1f25ac12d5a-1f25ac12d64 415->420 416->415 416->422 418->429 430 1f25ac12dee-1f25ac12df3 418->430 419->422 434 1f25ac12e42-1f25ac12e44 419->434 420->419 431 1f25ac12d66-1f25ac12d79 call 1f25ac1152c 420->431 422->434 423->400 423->413 424->434 425->424 435 1f25ac12e20-1f25ac12e33 call 1f25ac1152c 425->435 426->422 436 1f25ac12d33-1f25ac12d38 426->436 438 1f25ac12e57-1f25ac12e5b 429->438 439 1f25ac12ecc-1f25ac12ed0 429->439 430->403 430->418 431->419 431->422 434->396 434->429 435->424 435->429 436->407 436->426 444 1f25ac12e63-1f25ac12e7d call 1f25ac185c0 438->444 445 1f25ac12e5d-1f25ac12e61 438->445 439->396 448 1f25ac12e80-1f25ac12e83 444->448 445->444 445->448 451 1f25ac12e85-1f25ac12ea3 call 1f25ac185c0 448->451 452 1f25ac12ea6-1f25ac12ea9 448->452 451->452 452->439 454 1f25ac12eab-1f25ac12ec9 call 1f25ac185c0 452->454 454->439
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction ID: 0c3d88725adf3c0f433bb3e4ee51c0532380295866b861db82f7b7c286521447
                          • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction Fuzzy Hash: FDB1AFBA312B9282EB649F25D4527F963A8FB64B86F045036EE4A577B4DF34CC40CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction ID: 98e832783d1c9fb0a6b8fd5b1458bb9140b0f520a8726e174c91bdd1911924a5
                          • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction Fuzzy Hash: 59316FB2306B818AEB609F64E8517ED7360FB94745F44443ADA8D57BA8EF38C648CB10
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction ID: 0cad5f263617cc2d805d522448f7be092e1cf7a56641b2ce013f580c7c3a1516
                          • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction Fuzzy Hash: 91318D76215F8186EB60CF29E8413EE73A0F798B55F500126EA9D43BA8DF38C156CF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction ID: 156379ed1e986be3a0cc8f8fc0c9c0e0dd145386c769b34554085f4f09779d23
                          • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction Fuzzy Hash: 0C111876711B028AEF00CB60E8563E833A4F719B69F440E31DAAD867A4DB78D1988780
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction ID: da34ea0c25d3edc25a7d6ed81c5568d3c8d3267fbcca8a4a5566cc2624463e26
                          • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction Fuzzy Hash: FBE039B560270586EB048B62D8093AA36E1EB89F06F048034C98907361DF7DD499CB60
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: ExceptionRaise_clrfp
                          • String ID:
                          • API String ID: 15204871-0
                          • Opcode ID: 91c45a23742243141810e6f77c67a66073dfa56da4d49e6a277af36b1acf7cf1
                          • Instruction ID: 689a0a1896cc36ef4a3362a35023d3a0199c76ea9c79fd94efde157a87ba8672
                          • Opcode Fuzzy Hash: 91c45a23742243141810e6f77c67a66073dfa56da4d49e6a277af36b1acf7cf1
                          • Instruction Fuzzy Hash: A7B13AB7601B89CBEB15CF29C9463A87BA0F784F49F158961DBA9877B4CB39C451CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: _clrfp
                          • String ID:
                          • API String ID: 3618594692-0
                          • Opcode ID: 91c45a23742243141810e6f77c67a66073dfa56da4d49e6a277af36b1acf7cf1
                          • Instruction ID: 8325964808e2932e461bd396ea9543888a41ca2e7bb6f03a8aaeb6b0feb46545
                          • Opcode Fuzzy Hash: 91c45a23742243141810e6f77c67a66073dfa56da4d49e6a277af36b1acf7cf1
                          • Instruction Fuzzy Hash: AAB14073200B898BEB55CF29C4563AC7BA0F344B58F198A26DB6D877B4CB3AC451CB40
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 29975c57d01bdb1e687cc302dc7d7dc5a8663a128fa1f3b93342ad94a271d3ec
                          • Instruction ID: 7295b7932013457e2f14b3ac711580a5a2e2056819afbeb38639e257c8f4df75
                          • Opcode Fuzzy Hash: 29975c57d01bdb1e687cc302dc7d7dc5a8663a128fa1f3b93342ad94a271d3ec
                          • Instruction Fuzzy Hash: A35104B2701B9189FB20DB72A8417FE7BA1F754BE9F144125EE5867BA9DB38C501CB00
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ede98a6d8d02e88a1d8b84a5c6c80a15dedc9657b0a7b1a34b363c45f1d0dee8
                          • Instruction ID: c815595f94e8c91bda60602bdd143a81502d12fabb2fbe8701638750b002383d
                          • Opcode Fuzzy Hash: ede98a6d8d02e88a1d8b84a5c6c80a15dedc9657b0a7b1a34b363c45f1d0dee8
                          • Instruction Fuzzy Hash: 3DB1907221075286EF698F25D8627F9A3A5F764B84F445036EE09577B4DF35CD80CB80
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 29975c57d01bdb1e687cc302dc7d7dc5a8663a128fa1f3b93342ad94a271d3ec
                          • Instruction ID: cab2004a2689af636979c9812c42feadb76c20edb9c50480d52c427c17b93cf5
                          • Opcode Fuzzy Hash: 29975c57d01bdb1e687cc302dc7d7dc5a8663a128fa1f3b93342ad94a271d3ec
                          • Instruction Fuzzy Hash: 7D51E43270079289FB20DB72E8517EEBBA1F7647D8F144224EE5927BA9DB78C401CB40
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 06df2142d5dd0183fd0e01b7d5608ecb5bc0210788fa76ce78b9fbce82fbb0aa
                          • Instruction ID: 767de0c70f50164e58cc1f00a6955423746f0c22730054a5221f60f815c919c5
                          • Opcode Fuzzy Hash: 06df2142d5dd0183fd0e01b7d5608ecb5bc0210788fa76ce78b9fbce82fbb0aa
                          • Instruction Fuzzy Hash: FFF062B17153958EDBA88F28A8037BE77E1F308385FD0812AD68A83B14D23C9060CF04
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7c307f67adb8aff98d3f095286b2b700dfcb55a183617c16c72d4ace8312b7d4
                          • Instruction ID: 038cc99b61fe1a58f79dc842e8ffe6d2d7c0790616e2838ebdfb41b054369831
                          • Opcode Fuzzy Hash: 7c307f67adb8aff98d3f095286b2b700dfcb55a183617c16c72d4ace8312b7d4
                          • Instruction Fuzzy Hash:

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 106492572-2879589442
                          • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction ID: 8747f2a0371690a77fc4e7d7f74ad5a99c08b48c5666836459dce7354d599cd2
                          • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction Fuzzy Hash: 2C714DB6712B5286EB109F25E852AE933A4FB94F8AF001135DE8E53B39DF38C444CB54

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction ID: 44487bf2d17a37d44878ef97f2e1b2cfd746a67cf1612522659d3b5bfdb207d4
                          • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction Fuzzy Hash: E3514BB6201B8586EB54CF62E5493EAB7A1F789F9AF444134DE8A07768DF3CD049CB10

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CurrentThread$AddressHandleModuleProc
                          • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                          • API String ID: 4175298099-1975688563
                          • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction ID: 2baf3473c1a282d5b7a1d90e640af3ec4ba63154d3530100ed64b32adac985f4
                          • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction Fuzzy Hash: C83182F8222B4BA0FF05EB69E8636F46360BB64747F905033D44A12575DE78C249CBA0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 211 1f25abe6910-1f25abe6916 212 1f25abe6951-1f25abe695b 211->212 213 1f25abe6918-1f25abe691b 211->213 216 1f25abe6a78-1f25abe6a8d 212->216 214 1f25abe691d-1f25abe6920 213->214 215 1f25abe6945-1f25abe6984 call 1f25abe6fc0 213->215 217 1f25abe6938 __scrt_dllmain_crt_thread_attach 214->217 218 1f25abe6922-1f25abe6925 214->218 231 1f25abe698a-1f25abe699f call 1f25abe6e54 215->231 232 1f25abe6a52 215->232 219 1f25abe6a8f 216->219 220 1f25abe6a9c-1f25abe6ab6 call 1f25abe6e54 216->220 227 1f25abe693d-1f25abe6944 217->227 223 1f25abe6931-1f25abe6936 call 1f25abe6f04 218->223 224 1f25abe6927-1f25abe6930 218->224 225 1f25abe6a91-1f25abe6a9b 219->225 234 1f25abe6aef-1f25abe6b20 call 1f25abe7190 220->234 235 1f25abe6ab8-1f25abe6aed call 1f25abe6f7c call 1f25abe6e1c call 1f25abe7318 call 1f25abe7130 call 1f25abe7154 call 1f25abe6fac 220->235 223->227 243 1f25abe6a6a-1f25abe6a77 call 1f25abe7190 231->243 244 1f25abe69a5-1f25abe69b6 call 1f25abe6ec4 231->244 236 1f25abe6a54-1f25abe6a69 232->236 245 1f25abe6b31-1f25abe6b37 234->245 246 1f25abe6b22-1f25abe6b28 234->246 235->225 243->216 264 1f25abe69b8-1f25abe69dc call 1f25abe72dc call 1f25abe6e0c call 1f25abe6e38 call 1f25abeac0c 244->264 265 1f25abe6a07-1f25abe6a11 call 1f25abe7130 244->265 252 1f25abe6b7e-1f25abe6b94 call 1f25abe268c 245->252 253 1f25abe6b39-1f25abe6b43 245->253 246->245 251 1f25abe6b2a-1f25abe6b2c 246->251 260 1f25abe6c1f-1f25abe6c2c 251->260 272 1f25abe6bcc-1f25abe6bce 252->272 273 1f25abe6b96-1f25abe6b98 252->273 254 1f25abe6b4f-1f25abe6b5d call 1f25abf5780 253->254 255 1f25abe6b45-1f25abe6b4d 253->255 261 1f25abe6b63-1f25abe6b78 call 1f25abe6910 254->261 276 1f25abe6c15-1f25abe6c1d 254->276 255->261 261->252 261->276 264->265 313 1f25abe69de-1f25abe69e5 __scrt_dllmain_after_initialize_c 264->313 265->232 284 1f25abe6a13-1f25abe6a1f call 1f25abe7180 265->284 274 1f25abe6bd0-1f25abe6bd3 272->274 275 1f25abe6bd5-1f25abe6bea call 1f25abe6910 272->275 273->272 281 1f25abe6b9a-1f25abe6bbc call 1f25abe268c call 1f25abe6a78 273->281 274->275 274->276 275->276 293 1f25abe6bec-1f25abe6bf6 275->293 276->260 281->272 305 1f25abe6bbe-1f25abe6bc6 call 1f25abf5780 281->305 301 1f25abe6a21-1f25abe6a2b call 1f25abe7098 284->301 302 1f25abe6a45-1f25abe6a50 284->302 298 1f25abe6c01-1f25abe6c11 call 1f25abf5780 293->298 299 1f25abe6bf8-1f25abe6bff 293->299 298->276 299->276 301->302 314 1f25abe6a2d-1f25abe6a3b 301->314 302->236 305->272 313->265 315 1f25abe69e7-1f25abe6a04 call 1f25abeabc8 313->315 314->302 315->265
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                          • API String ID: 190073905-1786718095
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: 99a44772c745fba8234e98babaf613cc9e19d8c1bd81c4d56ac4e50a6b926959
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: 9181C271A0034386FA549B25A8733FDE2A0EBB5780F588135EA45437B7EB39C9459F80

                          Control-flow Graph

                          APIs
                          • GetLastError.KERNEL32 ref: 000001F25AC1CE37
                          • FlsGetValue.KERNEL32(?,?,?,000001F25AC20A6B,?,?,?,000001F25AC2045C,?,?,?,000001F25AC1C84F), ref: 000001F25AC1CE4C
                          • FlsSetValue.KERNEL32(?,?,?,000001F25AC20A6B,?,?,?,000001F25AC2045C,?,?,?,000001F25AC1C84F), ref: 000001F25AC1CE6D
                          • FlsSetValue.KERNEL32(?,?,?,000001F25AC20A6B,?,?,?,000001F25AC2045C,?,?,?,000001F25AC1C84F), ref: 000001F25AC1CE9A
                          • FlsSetValue.KERNEL32(?,?,?,000001F25AC20A6B,?,?,?,000001F25AC2045C,?,?,?,000001F25AC1C84F), ref: 000001F25AC1CEAB
                          • FlsSetValue.KERNEL32(?,?,?,000001F25AC20A6B,?,?,?,000001F25AC2045C,?,?,?,000001F25AC1C84F), ref: 000001F25AC1CEBC
                          • SetLastError.KERNEL32 ref: 000001F25AC1CED7
                          • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000001F25AC20A6B,?,?,?,000001F25AC2045C,?,?,?,000001F25AC1C84F), ref: 000001F25AC1CF0D
                          • FlsSetValue.KERNEL32(?,?,00000001,000001F25AC1ECCC,?,?,?,?,000001F25AC1BF9F,?,?,?,?,?,000001F25AC17AB0), ref: 000001F25AC1CF2C
                            • Part of subcall function 000001F25AC1D6CC: HeapAlloc.KERNEL32 ref: 000001F25AC1D721
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001F25AC20A6B,?,?,?,000001F25AC2045C,?,?,?,000001F25AC1C84F), ref: 000001F25AC1CF54
                            • Part of subcall function 000001F25AC1D744: HeapFree.KERNEL32 ref: 000001F25AC1D75A
                            • Part of subcall function 000001F25AC1D744: GetLastError.KERNEL32 ref: 000001F25AC1D764
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001F25AC20A6B,?,?,?,000001F25AC2045C,?,?,?,000001F25AC1C84F), ref: 000001F25AC1CF65
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001F25AC20A6B,?,?,?,000001F25AC2045C,?,?,?,000001F25AC1C84F), ref: 000001F25AC1CF76
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Value$ErrorLast$Heap$AllocFree
                          • String ID:
                          • API String ID: 570795689-0
                          • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction ID: 457ab694039689bc5f41a149c40a94b1d3e21910beec71ba5cdd43e388265465
                          • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction Fuzzy Hash: 4E4178F434B74686FF69A72156533F922829FA47B6F140B39F836066F6DE38C4018E80

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                          • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                          • API String ID: 2171963597-1373409510
                          • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction ID: aaad45d32278e1fcd4293fc071e181c1316f29c19e6c1de69210ed697df96d13
                          • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction Fuzzy Hash: E2214FB661574182FB10CB25F4453E973A0F799BA6F504225EA9A03BB8DF7CC149CF14

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 588 1f25ac1a544-1f25ac1a5ac call 1f25ac1b414 591 1f25ac1aa13-1f25ac1aa1b call 1f25ac1c748 588->591 592 1f25ac1a5b2-1f25ac1a5b5 588->592 592->591 594 1f25ac1a5bb-1f25ac1a5c1 592->594 595 1f25ac1a5c7-1f25ac1a5cb 594->595 596 1f25ac1a690-1f25ac1a6a2 594->596 595->596 600 1f25ac1a5d1-1f25ac1a5dc 595->600 598 1f25ac1a963-1f25ac1a967 596->598 599 1f25ac1a6a8-1f25ac1a6ac 596->599 603 1f25ac1a969-1f25ac1a970 598->603 604 1f25ac1a9a0-1f25ac1a9aa call 1f25ac19634 598->604 599->598 601 1f25ac1a6b2-1f25ac1a6bd 599->601 600->596 602 1f25ac1a5e2-1f25ac1a5e7 600->602 601->598 605 1f25ac1a6c3-1f25ac1a6ca 601->605 602->596 606 1f25ac1a5ed-1f25ac1a5f7 call 1f25ac19634 602->606 603->591 607 1f25ac1a976-1f25ac1a99b call 1f25ac1aa1c 603->607 604->591 617 1f25ac1a9ac-1f25ac1a9cb call 1f25ac17940 604->617 609 1f25ac1a894-1f25ac1a8a0 605->609 610 1f25ac1a6d0-1f25ac1a707 call 1f25ac19a10 605->610 606->617 621 1f25ac1a5fd-1f25ac1a628 call 1f25ac19634 * 2 call 1f25ac19d24 606->621 607->604 609->604 614 1f25ac1a8a6-1f25ac1a8aa 609->614 610->609 625 1f25ac1a70d-1f25ac1a715 610->625 618 1f25ac1a8ba-1f25ac1a8c2 614->618 619 1f25ac1a8ac-1f25ac1a8b8 call 1f25ac19ce4 614->619 618->604 624 1f25ac1a8c8-1f25ac1a8d5 call 1f25ac198b4 618->624 619->618 632 1f25ac1a8db-1f25ac1a8e3 619->632 656 1f25ac1a648-1f25ac1a652 call 1f25ac19634 621->656 657 1f25ac1a62a-1f25ac1a62e 621->657 624->604 624->632 630 1f25ac1a719-1f25ac1a74b 625->630 634 1f25ac1a887-1f25ac1a88e 630->634 635 1f25ac1a751-1f25ac1a75c 630->635 637 1f25ac1a9f6-1f25ac1aa12 call 1f25ac19634 * 2 call 1f25ac1c6a8 632->637 638 1f25ac1a8e9-1f25ac1a8ed 632->638 634->609 634->630 635->634 639 1f25ac1a762-1f25ac1a77b 635->639 637->591 641 1f25ac1a8ef-1f25ac1a8fe call 1f25ac19ce4 638->641 642 1f25ac1a900 638->642 643 1f25ac1a874-1f25ac1a879 639->643 644 1f25ac1a781-1f25ac1a7c6 call 1f25ac19cf8 * 2 639->644 652 1f25ac1a903-1f25ac1a90d call 1f25ac1b4ac 641->652 642->652 648 1f25ac1a884 643->648 672 1f25ac1a804-1f25ac1a80a 644->672 673 1f25ac1a7c8-1f25ac1a7ee call 1f25ac19cf8 call 1f25ac1ac38 644->673 648->634 652->604 664 1f25ac1a913-1f25ac1a961 call 1f25ac19944 call 1f25ac19b50 652->664 656->596 671 1f25ac1a654-1f25ac1a674 call 1f25ac19634 * 2 call 1f25ac1b4ac 656->671 657->656 663 1f25ac1a630-1f25ac1a63b 657->663 663->656 668 1f25ac1a63d-1f25ac1a642 663->668 664->604 668->591 668->656 694 1f25ac1a676-1f25ac1a680 call 1f25ac1b59c 671->694 695 1f25ac1a68b 671->695 677 1f25ac1a87b 672->677 678 1f25ac1a80c-1f25ac1a810 672->678 688 1f25ac1a815-1f25ac1a872 call 1f25ac1a470 673->688 689 1f25ac1a7f0-1f25ac1a802 673->689 682 1f25ac1a880 677->682 678->644 682->648 688->682 689->672 689->673 698 1f25ac1a686-1f25ac1a9ef call 1f25ac192ac call 1f25ac1aff4 call 1f25ac194a0 694->698 699 1f25ac1a9f0-1f25ac1a9f5 call 1f25ac1c6a8 694->699 695->596 698->699 699->637
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction ID: 30d69c952fc10e7c3ad2f3721269882f0a84359867364551a5cf64d635c965f2
                          • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction Fuzzy Hash: 28E1D2B6702B418AEB60DF25E4823ED77A0F765B99F400125EE8957BAACB34C191CF00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 467 1f25abe9944-1f25abe99ac call 1f25abea814 470 1f25abe99b2-1f25abe99b5 467->470 471 1f25abe9e13-1f25abe9e1b call 1f25abebb48 467->471 470->471 472 1f25abe99bb-1f25abe99c1 470->472 474 1f25abe9a90-1f25abe9aa2 472->474 475 1f25abe99c7-1f25abe99cb 472->475 477 1f25abe9aa8-1f25abe9aac 474->477 478 1f25abe9d63-1f25abe9d67 474->478 475->474 479 1f25abe99d1-1f25abe99dc 475->479 477->478 480 1f25abe9ab2-1f25abe9abd 477->480 482 1f25abe9da0-1f25abe9daa call 1f25abe8a34 478->482 483 1f25abe9d69-1f25abe9d70 478->483 479->474 481 1f25abe99e2-1f25abe99e7 479->481 480->478 484 1f25abe9ac3-1f25abe9aca 480->484 481->474 485 1f25abe99ed-1f25abe99f7 call 1f25abe8a34 481->485 482->471 496 1f25abe9dac-1f25abe9dcb call 1f25abe6d40 482->496 483->471 486 1f25abe9d76-1f25abe9d9b call 1f25abe9e1c 483->486 488 1f25abe9ad0-1f25abe9b07 call 1f25abe8e10 484->488 489 1f25abe9c94-1f25abe9ca0 484->489 485->496 501 1f25abe99fd-1f25abe9a28 call 1f25abe8a34 * 2 call 1f25abe9124 485->501 486->482 488->489 505 1f25abe9b0d-1f25abe9b15 488->505 489->482 493 1f25abe9ca6-1f25abe9caa 489->493 498 1f25abe9cac-1f25abe9cb8 call 1f25abe90e4 493->498 499 1f25abe9cba-1f25abe9cc2 493->499 498->499 511 1f25abe9cdb-1f25abe9ce3 498->511 499->482 504 1f25abe9cc8-1f25abe9cd5 call 1f25abe8cb4 499->504 536 1f25abe9a2a-1f25abe9a2e 501->536 537 1f25abe9a48-1f25abe9a52 call 1f25abe8a34 501->537 504->482 504->511 509 1f25abe9b19-1f25abe9b4b 505->509 513 1f25abe9b51-1f25abe9b5c 509->513 514 1f25abe9c87-1f25abe9c8e 509->514 516 1f25abe9ce9-1f25abe9ced 511->516 517 1f25abe9df6-1f25abe9e12 call 1f25abe8a34 * 2 call 1f25abebaa8 511->517 513->514 518 1f25abe9b62-1f25abe9b7b 513->518 514->489 514->509 520 1f25abe9d00 516->520 521 1f25abe9cef-1f25abe9cfe call 1f25abe90e4 516->521 517->471 522 1f25abe9b81-1f25abe9bc6 call 1f25abe90f8 * 2 518->522 523 1f25abe9c74-1f25abe9c79 518->523 526 1f25abe9d03-1f25abe9d0d call 1f25abea8ac 520->526 521->526 548 1f25abe9bc8-1f25abe9bee call 1f25abe90f8 call 1f25abea038 522->548 549 1f25abe9c04-1f25abe9c0a 522->549 529 1f25abe9c84 523->529 526->482 546 1f25abe9d13-1f25abe9d61 call 1f25abe8d44 call 1f25abe8f50 526->546 529->514 536->537 539 1f25abe9a30-1f25abe9a3b 536->539 537->474 552 1f25abe9a54-1f25abe9a74 call 1f25abe8a34 * 2 call 1f25abea8ac 537->552 539->537 545 1f25abe9a3d-1f25abe9a42 539->545 545->471 545->537 546->482 567 1f25abe9bf0-1f25abe9c02 548->567 568 1f25abe9c15-1f25abe9c72 call 1f25abe9870 548->568 556 1f25abe9c0c-1f25abe9c10 549->556 557 1f25abe9c7b 549->557 573 1f25abe9a8b 552->573 574 1f25abe9a76-1f25abe9a80 call 1f25abea99c 552->574 556->522 561 1f25abe9c80 557->561 561->529 567->548 567->549 568->561 573->474 577 1f25abe9df0-1f25abe9df5 call 1f25abebaa8 574->577 578 1f25abe9a86-1f25abe9def call 1f25abe86ac call 1f25abea3f4 call 1f25abe88a0 574->578 577->517 578->577
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction ID: e8272fbee83594070a147f04450ddc92ea050cd817ec06975d5758abc9df6a6e
                          • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction Fuzzy Hash: DFE1D472604B828AEF60DF65D4923FDFBA0F765798F005125EE8957BA5CB34C0A5CB80

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: AddressFreeLibraryProc
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3013587201-537541572
                          • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction ID: 5bd9df6a575aafdd3790891c3df441d96f47c28fb7533f5038b02c3f04e74957
                          • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction Fuzzy Hash: 6441D6B2317B0291FB16CB26A8067F52391FB69BE1F058136DD0E877A4EE3CC4458B94

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction ID: 51e5d029c77fb4b27982b57958b8b2e420f9997c3e25a14572519bd52a8f04e5
                          • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction Fuzzy Hash: 3C417C73215B85C6E760CF21E4457EEB7A1F388B99F148129DA8A07B68DF3CD589CB00
                          APIs
                          • FlsGetValue.KERNEL32(?,?,?,000001F25AC1C7DE,?,?,?,?,?,?,?,?,000001F25AC1CF9D,?,?,00000001), ref: 000001F25AC1D087
                          • FlsSetValue.KERNEL32(?,?,?,000001F25AC1C7DE,?,?,?,?,?,?,?,?,000001F25AC1CF9D,?,?,00000001), ref: 000001F25AC1D0A6
                          • FlsSetValue.KERNEL32(?,?,?,000001F25AC1C7DE,?,?,?,?,?,?,?,?,000001F25AC1CF9D,?,?,00000001), ref: 000001F25AC1D0CE
                          • FlsSetValue.KERNEL32(?,?,?,000001F25AC1C7DE,?,?,?,?,?,?,?,?,000001F25AC1CF9D,?,?,00000001), ref: 000001F25AC1D0DF
                          • FlsSetValue.KERNEL32(?,?,?,000001F25AC1C7DE,?,?,?,?,?,?,?,?,000001F25AC1CF9D,?,?,00000001), ref: 000001F25AC1D0F0
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Value
                          • String ID: 1%$Y%
                          • API String ID: 3702945584-1395475152
                          • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction ID: 980368528156e16a590b22096f4fc986cc702a76797486e0bacc7a7aeadd7dcb
                          • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction Fuzzy Hash: 1A1160F0707B4645FB6AA7356A533F962819B647F2F644336E839467FADE38C4028E10
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: 428be417b2f5c1c88944349812e08768f3d457f15b7609cee00137f885508621
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: 8981F6F4B133438AFB50AB2998433F922D0EBA5B87F548435E949577B6EB38C8458F10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction ID: 4867e9233a06017649c6c93c9fcad84a3e5deea1ef130c0c87a885ec9945dca6
                          • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction Fuzzy Hash: 0C31A271313B42A1EF22DB42E402BF56294FF58BA2F590535DD6E0B7A4EF39C4558B10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction ID: d40c03af0ab42ccbc6f4d52230912420c712a44424eaf95c9873cddf83576fbc
                          • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction Fuzzy Hash: 4F119871321B8186F7508B52E8453E977A0FB88FE6F044235EA9E877B4CF78C4148B44
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID: wr
                          • API String ID: 1092925422-2678910430
                          • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction ID: 019858d06fe0c9e4ba7c713d179d9d20c09148fa911e0fac336a2868811072d4
                          • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction Fuzzy Hash: 04115E7A706782C2FF549B11E4092F962A0FB88F86F444039DE8907764EF3DC505CB14
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                          • Instruction ID: 5e877b8cada541d119fa68745e7f315084cc4b0e61b990304c59b648bb0fce19
                          • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                          • Instruction Fuzzy Hash: 24D198B6216B8985DB70DB0AE4913EA77A0F798B85F100126EA8D47BB5DF3CC551CF40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: dialer
                          • API String ID: 756756679-3528709123
                          • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction ID: 105a8e926858c6104e0e52754ec573f93a2939de935bd8cfa7cd827c9f04161c
                          • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction Fuzzy Hash: 5431B0B6702B6682EB54CF16E5427F967A0FB64B86F084034DE8947B75EF38D4A18F40
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Value$ErrorLast
                          • String ID:
                          • API String ID: 2506987500-0
                          • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction ID: 3966b10216d6702cdd40c491cd4c4c388c5c00da74342e64e6bc2ab1681c0977
                          • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction Fuzzy Hash: A5116DF4347B8281FB65A72556473F92282ABA47B6F144735E836477FADE38C4018E50
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction ID: df366813fd4bf199540d1d0b45f2f72c4d0e8e02a91ca0afb0c1090cb3b72350
                          • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction Fuzzy Hash: 22018071301B8282EB20DB52A4493E963A1FB88FC2F484035DE8953764DF3CC949CB10
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction ID: 46e086a92a1fa4ce55abfdac8701b6d05638ccb989304861ffdef2c2a0965687
                          • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction Fuzzy Hash: 1B0109B5712742C2EF649B22E80A7E562A0FB59B87F040435CD8907774EF3DC518CB58
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 2395640692-629598281
                          • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction ID: 5b3739ea8b44c391d5617d850d362c8c6b21aa4928227f7ef04dbcd45d0817de
                          • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction Fuzzy Hash: 8051B2B270270286EB14DB25E449BF937A6F365B8AF248134DA474B7A8DB75D981CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 2395640692-629598281
                          • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction ID: 86528b9ddde4e3d28a5aa57217bc02927d9f5c519c08badfa1ddcc117702de6c
                          • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction Fuzzy Hash: F531D1B230274186EB14DF21E84A7E937A5F754B8AF158134EE870B7A9DB39C980CF04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction ID: d837ef00e8140d65635d00cadd9ce36594e5890f442382e2457a4e285c50c981
                          • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction Fuzzy Hash: E8F044B230578292E7708B25F8957E967A0FB58B89F944034DA8946668DF3CC64DCF10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction ID: ef96ee661185b43db184760fbb7d3a255d8253ef8dceca76e680631b59addd60
                          • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction Fuzzy Hash: 74F062B531374681EB148F24E4563F96320EF98F62F540229CAAA452F4CF3CC4458F50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction ID: 2c6b9e16aa8a4862722512b983d26a3c64f0ea8c99c0ac3ea8cddd48cd5b7781
                          • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction Fuzzy Hash: 3DF05EB0705BC282EB508B16B9051E96260EB48FD2F044030EE8A07B28DE38C4558B10
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                          • Instruction ID: 4799d1e9d946063c781ec813a0242a1478f8623b31cade9c313a778f328b0ead
                          • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                          • Instruction Fuzzy Hash: BD02CB7661AB8586EB60CB55F4913AAB7A0F3D5795F104026EA8E87BA8DF7CC444CF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                          • Instruction ID: 185170800f5139d11ce8f46aa6f7d9bbd2c2861ab7d0332f96fc85eb1ca80752
                          • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                          • Instruction Fuzzy Hash: B961DEB662AB45C6EB60CB15E5563EA77E0F398786F100126EA8D47BB8DB7CC440CF44
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: 1d691a782f6052caadb7698eb294b230c3fb3f16997f331f6b85acb1648d6a2b
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: 3711A3B6A92F5313F7641568D7533F521416F78BBAF0806B4EBF6476F6CA34C8414A00
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: 0673c7913c41ab504ac798730d60cbfc7e0bc0441d8170ee908fb41f6327d9f6
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: 18117032A14B5311FBA41568E47B3FD21816BF8374F4C8738EA76066FACA38C8455A90
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: Tuesday$Wednesday$or copy constructor iterator'
                          • API String ID: 3215553584-4202648911
                          • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction ID: d71e18a9ed3bc932a8e88819b091ad8074af59ff7fd2fc5c206d3f868bb37412
                          • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction Fuzzy Hash: 4761DE7260134782FA698B78E5633FEEBA0F7A1780F558535DA0A077B5DB34C8419F81
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: 0407bc0149d740d5dca4c096481f2e4ecfea53a8e579a612c7294964cbab6749
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: 2E619DB3702B858AEB20DF65E4813ED77A0F364B89F044225EF4917BA8DB38C595CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: adf02e9b8f4f3a7e5be393d2a9798408e9495e7d767d963da57a6f2e39513acd
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: 7551C1B2302782CAEB748F15A4863F977A0F764B96F144135DA9987BE5CB38C461CF40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: ba3c91d1af46fc15e9bfbd494829ef0eb278aeb04668bb0f47fb30f89ad2e456
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: 9851B472100382CAEB748F15A5663FCF7A9F765B86F184229DA4947BE5CB38D450CF81
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction ID: af64572985c778f6f8edd6b253f4bfa39babfdad03c8f31f5e80dbe3edc26bde
                          • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction Fuzzy Hash: 5851D132B01B028AEB14CF65E465BF8BBE5F364B98F558134DA16437A8EB34CD408F84
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction ID: 3572f3f9855132851bcae0ae3c01b8d0391b81f2fe3d3f5299b7568102190ae9
                          • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction Fuzzy Hash: 0D31B332A01B42C6E714DF51E8567E9BBA4F360B88F058124EE5703764DF38C940CF84
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction ID: d481f86a8b4eff2b7f59ed4c4edde728d35d4383d28d650e38326dd8f61e2504
                          • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction Fuzzy Hash: C8D113B2716B8189E711CF79D4413EC3BB5FB54B99F004226DE9AA7BA9DE34C406CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction ID: 2869bb432136b9d3327e3b1c3724cfb83253419823f41602c97ed7a3287a8124
                          • Opcode Fuzzy Hash: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction Fuzzy Hash: 36015A72602BD1C6E704DF66E9052EA77A0FB88F82F044435EA8A43729DE38D051CB50
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: ConsoleErrorLastMode
                          • String ID:
                          • API String ID: 953036326-0
                          • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction ID: a69795d3a190e9ca07845f365043ada29f6f491ef73eda122b202ffb43716d34
                          • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction Fuzzy Hash: 4991D4B271275285FB60DF6594823FD3BA0FB54F8AF544129DE8B67AA5DB34C482CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction ID: 4589a0427296e6b4acec542e07d10472f7ab9376eef62307a20146c8cc833505
                          • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction Fuzzy Hash: 5171F3FA30178286E764DF25E8463FA67E4F3A9B86F440036DD0A53BA9DE34C645CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: CallTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3163161869-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: 210b7faafa2b8d5f4cca5ab7e19a64415fc48ef23ec1327bf0c41eb49f480b75
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: 8A618173600B858AEB20DF65D4513EDBBA0F764B8CF044225EF5917BA9DB38D199CB80
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction ID: 49cf16f581be4b6ea9d5290ef161cc90c2b96fce7f2b17ee43c50c1a3d240e0b
                          • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction Fuzzy Hash: B35105BA30A38381EB74DF29A0993FA6B91F3A5785F440135DE4A03B69DE39C505CF40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction ID: 78fe206aba8bc95456a8ecce5536930e9fb3e6b8ac035441be031a580420a156
                          • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction Fuzzy Hash: 504180B2716B8186DB20DF25E8453E967A0F798B95F504131EE8E877A4EB7CC441CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction ID: 6d7d2184d27b0bf8c4f967ace01d9b3023c94cbbc778d1773337999c69738096
                          • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction Fuzzy Hash: 55113A72215B8182EB618F15F4403A9B7E5FB98B99F584220EECD0BB68DF3CC551CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: ierarchy Descriptor'$riptor at (
                          • API String ID: 592178966-758928094
                          • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction ID: 573184f44bff6f3094fcae08121c463bafcf0f2fecbdafd10e4f02422fb9a4b9
                          • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction Fuzzy Hash: 39E08671A40B4990DF058F61E8912E873A0DB68B64F49D232D95C06321FA38D2E9C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2715522869.000001F25ABE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001F25ABE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25abe0000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: Locator'$riptor at (
                          • API String ID: 592178966-4215709766
                          • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction ID: 8b16402c884d85f074bbb506b35bef820a6f43b5749e65aee9ed47699c8a01ad
                          • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction Fuzzy Hash: 67E08671A00B4980DF058F61D8911E87360E768B54B88D232C94C06361EA38D2E5C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2716327273.000001F25AC10000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F25AC10000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_1f25ac10000_WmiPrvSE.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction ID: 2e679a9bb57fba7a18322b14e340956810b76268a8967cf3235ce18482be909e
                          • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction Fuzzy Hash: 12116D75702B8681EB04DB66A4162F963E1FB89FC2F184038DE8D43775DF38D4828B00

                          Execution Graph

                          Execution Coverage:46.5%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:38.1%
                          Total number of Nodes:226
                          Total number of Limit Nodes:24
                          execution_graph 384 140002b38 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 385 140002b8e K32EnumProcesses 384->385 386 140002beb SleepEx 385->386 387 140002ba3 385->387 386->385 387->386 389 140002540 387->389 390 140002558 389->390 391 14000254d 389->391 390->387 393 1400010c0 391->393 431 1400018ac OpenProcess 393->431 396 1400014ba 396->390 397 140001122 OpenProcess 397->396 398 14000113e OpenProcess 397->398 399 140001161 K32GetModuleFileNameExW 398->399 400 1400011fd NtQueryInformationProcess 398->400 401 1400011aa CloseHandle 399->401 402 14000117a PathFindFileNameW lstrlenW 399->402 403 1400014b1 CloseHandle 400->403 404 140001224 400->404 401->400 406 1400011b8 401->406 402->401 405 140001197 StrCpyW 402->405 403->396 404->403 407 140001230 OpenProcessToken 404->407 405->401 406->400 408 1400011d8 StrCmpIW 406->408 407->403 409 14000124e GetTokenInformation 407->409 408->403 408->406 410 1400012f1 409->410 411 140001276 GetLastError 409->411 412 1400012f8 CloseHandle 410->412 411->410 413 140001281 LocalAlloc 411->413 412->403 418 14000130c 412->418 413->410 414 140001297 GetTokenInformation 413->414 415 1400012df 414->415 416 1400012bf GetSidSubAuthorityCount GetSidSubAuthority 414->416 417 1400012e6 LocalFree 415->417 416->417 417->412 418->403 419 14000139b StrStrA 418->419 420 1400013c3 418->420 419->418 421 1400013c8 419->421 420->403 421->403 422 1400013f3 VirtualAllocEx 421->422 422->403 423 140001420 WriteProcessMemory 422->423 423->403 424 14000143b 423->424 436 14000211c 424->436 426 14000145b 426->403 427 140001478 WaitForSingleObject 426->427 430 140001471 CloseHandle 426->430 429 140001487 GetExitCodeThread 427->429 427->430 429->430 430->403 432 14000110e 431->432 433 1400018d8 IsWow64Process 431->433 432->396 432->397 434 1400018f8 CloseHandle 433->434 435 1400018ea 433->435 434->432 435->434 439 140001914 GetModuleHandleA 436->439 440 140001934 GetProcAddress 439->440 441 14000193d 439->441 440->441 442 140002bf8 443 140002c05 442->443 445 140002c25 ConnectNamedPipe 443->445 446 140002c1a Sleep 443->446 453 140001b54 AllocateAndInitializeSid 443->453 447 140002c83 Sleep 445->447 448 140002c34 ReadFile 445->448 446->443 450 140002c8e DisconnectNamedPipe 447->450 449 140002c57 448->449 448->450 460 140002524 449->460 450->445 454 140001bb1 SetEntriesInAclW 453->454 455 140001c6f 453->455 454->455 456 140001bf5 LocalAlloc 454->456 455->443 456->455 457 140001c09 InitializeSecurityDescriptor 456->457 457->455 458 140001c19 SetSecurityDescriptorDacl 457->458 458->455 459 140001c30 CreateNamedPipeW 458->459 459->455 461 140002531 460->461 462 140002539 WriteFile 460->462 463 1400010c0 30 API calls 461->463 462->450 463->462 464 140002258 467 14000226c 464->467 491 140001f2c 467->491 470 140001f2c 14 API calls 471 14000228f GetCurrentProcessId OpenProcess 470->471 472 140002321 FindResourceExA 471->472 473 1400022af OpenProcessToken 471->473 476 140002341 SizeofResource 472->476 477 140002261 ExitProcess 472->477 474 1400022c3 LookupPrivilegeValueW 473->474 475 140002318 CloseHandle 473->475 474->475 478 1400022da AdjustTokenPrivileges 474->478 475->472 476->477 479 14000235a LoadResource 476->479 478->475 480 140002312 GetLastError 478->480 479->477 481 14000236e LockResource GetCurrentProcessId 479->481 480->475 505 1400017ec GetProcessHeap HeapAlloc 481->505 483 14000238b RegCreateKeyExW 484 140002489 CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 483->484 485 1400023cc ConvertStringSecurityDescriptorToSecurityDescriptorW 483->485 486 14000250f SleepEx 484->486 487 1400023f4 RegSetKeySecurity LocalFree 485->487 488 14000240e RegCreateKeyExW 485->488 486->486 487->488 489 140002448 GetCurrentProcessId RegSetValueExW RegCloseKey 488->489 490 14000247f RegCloseKey 488->490 489->490 490->484 492 140001f35 StrCpyW StrCatW GetModuleHandleW 491->492 493 1400020ff 491->493 492->493 494 140001f86 GetCurrentProcess K32GetModuleInformation 492->494 493->470 495 1400020f6 FreeLibrary 494->495 496 140001fb6 CreateFileW 494->496 495->493 496->495 497 140001feb CreateFileMappingW 496->497 498 140002014 MapViewOfFile 497->498 499 1400020ed CloseHandle 497->499 500 1400020e4 CloseHandle 498->500 501 140002037 498->501 499->495 500->499 501->500 502 140002050 lstrcmpiA 501->502 504 14000208e 501->504 502->501 503 140002090 VirtualProtect VirtualProtect 502->503 503->500 504->500 511 1400014d8 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 505->511 507 140001885 GetProcessHeap HeapFree 508 140001830 508->507 509 140001851 OpenProcess 508->509 509->508 510 140001867 TerminateProcess CloseHandle 509->510 510->508 512 140001565 511->512 513 14000162f GetProcessHeap HeapFree GetProcessHeap HeapFree 511->513 512->513 514 14000157a OpenProcess 512->514 516 14000161a CloseHandle 512->516 517 1400015c9 ReadProcessMemory 512->517 513->508 514->512 515 140001597 K32EnumProcessModules 514->515 515->512 515->516 516->512 517->512 518 1400021d0 519 1400021dd 518->519 520 140001b54 6 API calls 519->520 521 1400021f2 Sleep 519->521 522 1400021fd ConnectNamedPipe 519->522 520->519 521->519 523 140002241 Sleep 522->523 524 14000220c ReadFile 522->524 525 14000224c DisconnectNamedPipe 523->525 524->525 526 14000222f 524->526 525->522 526->525 527 140002560 528 140002592 527->528 529 14000273a 527->529 530 1400026c6 GetProcessHeap HeapAlloc K32EnumProcesses 528->530 531 140002598 528->531 532 140002748 529->532 533 14000297e ReadFile 529->533 534 140002633 530->534 536 140002704 530->536 537 1400025a5 531->537 538 1400026bd ExitProcess 531->538 539 140002751 532->539 540 140002974 532->540 533->534 535 1400029a8 533->535 535->534 548 1400018ac 3 API calls 535->548 536->534 550 1400010c0 30 API calls 536->550 544 1400025ae 537->544 545 140002660 RegOpenKeyExW 537->545 541 140002919 539->541 542 14000275c 539->542 543 14000175c 22 API calls 540->543 549 140001944 ReadFile 541->549 546 140002761 542->546 547 14000279d 542->547 543->534 544->534 560 1400025cb ReadFile 544->560 551 1400026a1 545->551 552 14000268d RegDeleteValueW 545->552 546->534 609 14000217c 546->609 612 140001944 547->612 553 1400029c7 548->553 555 140002928 549->555 550->536 596 1400019c4 SysAllocString SysAllocString CoInitializeEx 551->596 552->551 553->534 564 1400029db GetProcessHeap HeapAlloc 553->564 565 140002638 553->565 555->534 567 140001944 ReadFile 555->567 559 1400026a6 604 14000175c GetProcessHeap HeapAlloc 559->604 560->534 562 1400025f5 560->562 562->534 574 1400018ac 3 API calls 562->574 570 1400014d8 13 API calls 564->570 576 140002a90 4 API calls 565->576 566 1400027b4 ReadFile 566->534 571 1400027dc 566->571 572 14000293f 567->572 587 140002a14 570->587 571->534 577 1400027e9 GetProcessHeap HeapAlloc ReadFile 571->577 572->534 578 140002947 ShellExecuteW 572->578 580 140002614 574->580 576->534 582 14000290b GetProcessHeap 577->582 583 14000282d 577->583 578->534 580->534 580->565 586 140002624 580->586 581 140002a49 GetProcessHeap 584 140002a52 HeapFree 581->584 582->584 583->582 588 140002881 lstrlenW GetProcessHeap HeapAlloc 583->588 589 14000285e 583->589 584->534 590 1400010c0 30 API calls 586->590 587->581 636 1400016cc 587->636 630 140002a90 CreateFileW 588->630 589->582 616 140001c88 589->616 590->534 597 140001a11 CoInitializeSecurity 596->597 598 140001b2c SysFreeString SysFreeString 596->598 599 140001a59 CoCreateInstance 597->599 600 140001a4d 597->600 598->559 601 140001b26 CoUninitialize 599->601 602 140001a88 VariantInit 599->602 600->599 600->601 601->598 603 140001ade 602->603 603->601 605 1400014d8 13 API calls 604->605 607 14000179a 605->607 606 1400017c8 GetProcessHeap HeapFree 607->606 608 1400016cc 5 API calls 607->608 608->607 610 140001914 2 API calls 609->610 611 140002191 610->611 613 140001968 ReadFile 612->613 614 14000198b 613->614 615 1400019a5 613->615 614->613 614->615 615->534 615->566 617 140001cbb 616->617 618 140001cce CreateProcessW 617->618 620 140001e97 617->620 622 140001e62 OpenProcess 617->622 624 140001dd2 VirtualAlloc 617->624 626 140001d8c WriteProcessMemory 617->626 618->617 619 140001d2b VirtualAllocEx 618->619 619->617 621 140001d60 WriteProcessMemory 619->621 620->582 621->617 622->617 623 140001e78 TerminateProcess 622->623 623->617 624->617 625 140001df1 GetThreadContext 624->625 625->617 627 140001e09 WriteProcessMemory 625->627 626->617 627->617 628 140001e30 SetThreadContext 627->628 628->617 629 140001e4e ResumeThread 628->629 629->617 629->620 631 1400028f7 GetProcessHeap HeapFree 630->631 632 140002ada WriteFile 630->632 631->582 633 140002b1c CloseHandle 632->633 634 140002afe 632->634 633->631 634->633 635 140002b02 WriteFile 634->635 635->633 637 140001745 636->637 638 1400016eb OpenProcess 636->638 637->581 638->637 639 140001703 638->639 640 14000211c 2 API calls 639->640 641 140001723 640->641 642 14000173c CloseHandle 641->642 643 140001731 CloseHandle 641->643 642->637 643->642

                          Callgraph

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: CreateProcess$Close$CurrentHandleResource$FileSecurityThread$DescriptorFreeHeapModuleOpenProtectTokenValueVirtual$AdjustAllocConvertErrorFindInformationLastLibraryLoadLocalLockLookupMappingPrivilegePrivilegesSizeofSleepStringViewlstrcmpi
                          • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$DLL$SOFTWARE\dialerconfig$SeDebugPrivilege$kernel32.dll$ntdll.dll$pid$svc64
                          • API String ID: 4177739653-1130149537
                          • Opcode ID: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                          • Instruction ID: c2e61514e361dd61edc66d1a85693de1d2c237bf329a5b31df93bef4cff25afe
                          • Opcode Fuzzy Hash: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                          • Instruction Fuzzy Hash: B781E4B6200B4196EB26CF62F8547D977A9F78CBD8F44512AEB4A43A78DF38C148C740

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 24 1400010c0-140001110 call 1400018ac 27 140001116-14000111c 24->27 28 1400014ba-1400014d6 24->28 27->28 29 140001122-140001138 OpenProcess 27->29 29->28 30 14000113e-14000115b OpenProcess 29->30 31 140001161-140001178 K32GetModuleFileNameExW 30->31 32 1400011fd-14000121e NtQueryInformationProcess 30->32 33 1400011aa-1400011b6 CloseHandle 31->33 34 14000117a-140001195 PathFindFileNameW lstrlenW 31->34 35 1400014b1-1400014b4 CloseHandle 32->35 36 140001224-14000122a 32->36 33->32 38 1400011b8-1400011d3 33->38 34->33 37 140001197-1400011a7 StrCpyW 34->37 35->28 36->35 39 140001230-140001248 OpenProcessToken 36->39 37->33 40 1400011d8-1400011ea StrCmpIW 38->40 39->35 41 14000124e-140001274 GetTokenInformation 39->41 40->35 42 1400011f0-1400011fb 40->42 43 1400012f1 41->43 44 140001276-14000127f GetLastError 41->44 42->32 42->40 45 1400012f8-140001306 CloseHandle 43->45 44->43 46 140001281-140001295 LocalAlloc 44->46 45->35 47 14000130c-140001313 45->47 46->43 48 140001297-1400012bd GetTokenInformation 46->48 47->35 51 140001319-140001324 47->51 49 1400012df 48->49 50 1400012bf-1400012dd GetSidSubAuthorityCount GetSidSubAuthority 48->50 52 1400012e6-1400012ef LocalFree 49->52 50->52 51->35 53 14000132a-140001334 51->53 52->45 53->35 54 14000133a-140001344 53->54 54->35 55 14000134a-14000138a call 140001ec4 * 3 54->55 55->35 62 140001390-1400013b0 call 140001ec4 StrStrA 55->62 65 1400013b2-1400013c1 62->65 66 1400013c8-1400013ed call 140001ec4 * 2 62->66 65->62 67 1400013c3 65->67 66->35 72 1400013f3-14000141a VirtualAllocEx 66->72 67->35 72->35 73 140001420-140001439 WriteProcessMemory 72->73 73->35 74 14000143b-14000145d call 14000211c 73->74 74->35 77 14000145f-140001467 74->77 77->35 78 140001469-14000146f 77->78 79 140001471-140001476 78->79 80 140001478-140001485 WaitForSingleObject 78->80 81 1400014ab CloseHandle 79->81 82 1400014a6 80->82 83 140001487-14000149b GetExitCodeThread 80->83 81->35 82->81 83->82 84 14000149d-1400014a3 83->84 84->82
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileLocalName$CodeCountErrorExitFindFreeLastMemoryModuleObjectPathQuerySingleThreadVirtualWaitWow64Writelstrlen
                          • String ID: @$MSBuild.exe$ReflectiveDllMain$dialer.exe
                          • API String ID: 2561231171-3753927220
                          • Opcode ID: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                          • Instruction ID: 2175fd9260984ecd3e092ef955109d5d50fbfcc0bf213717558b1eb8b1c9701c
                          • Opcode Fuzzy Hash: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                          • Instruction Fuzzy Hash: 40B138B260468186EB26DF27F8947E927A9FB8CBC4F404125AF4A477B4EF38C645C740

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                          • String ID:
                          • API String ID: 4084875642-0
                          • Opcode ID: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                          • Instruction ID: 4858e5a3d965c592fcd1f5951e26bd94c88d4916acf90710a0b336d1aa1e032e
                          • Opcode Fuzzy Hash: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                          • Instruction Fuzzy Hash: E6519DB2711A819AEB66CF63E8587EA22A5F78DBC4F444025EF4947764DF38C545C700

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                          • String ID:
                          • API String ID: 3197395349-0
                          • Opcode ID: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                          • Instruction ID: 21eaad2a8fcaa81d39f01622d1c01d05a8059e075f91819b3ade9b41c51f013a
                          • Opcode Fuzzy Hash: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                          • Instruction Fuzzy Hash: FA318D72215691CAE761CF25F490BDE77A5F748B98F40521AFB4947FA8EB78C208CB40

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                          • String ID: .text$C:\Windows\System32\
                          • API String ID: 2721474350-832442975
                          • Opcode ID: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                          • Instruction ID: 0b364bd3c89a37fdd3fa7b369e4888cbeb1e5b170dc00cf86e963973e9165d3d
                          • Opcode Fuzzy Hash: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                          • Instruction Fuzzy Hash: CC518BB2204B8096EB62CF16F8587DAB3A5F78CBD4F444525AF4A03B68DF38C549C700

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                          • String ID: M$\\.\pipe\dialerchildproc64
                          • API String ID: 2203880229-3489460547
                          • Opcode ID: 180580de56f56ab00dd4d516fca46f959342e05f281243e0c5337f45e18aa23b
                          • Instruction ID: 6dc3dc8c0bd617ca7cbe615ebfcb02ed857a87361961821bc60a1768ee808972
                          • Opcode Fuzzy Hash: 180580de56f56ab00dd4d516fca46f959342e05f281243e0c5337f45e18aa23b
                          • Instruction Fuzzy Hash: C01139B1218A8492F716DB22F8047EE6764A78DBE0F444225BB66036F4DF7CC548C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 129 1400021d0-1400021da 130 1400021dd-1400021f0 call 140001b54 129->130 133 1400021f2-1400021fb Sleep 130->133 134 1400021fd-14000220a ConnectNamedPipe 130->134 133->130 135 140002241-140002246 Sleep 134->135 136 14000220c-14000222d ReadFile 134->136 137 14000224c-140002255 DisconnectNamedPipe 135->137 136->137 138 14000222f-140002234 136->138 137->134 138->137 139 140002236-14000223f 138->139 139->137
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                          • String ID: \\.\pipe\dialercontrol_redirect64
                          • API String ID: 2071455217-3440882674
                          • Opcode ID: 33f89feb9858a4e39e6e7226b1872fe8dc0a47489d7e71beaca7a62b826bfc15
                          • Instruction ID: d66e41e89491d3fe39127ed5f8ff24c46c9ecc4af95d447005e5476a51c55f6d
                          • Opcode Fuzzy Hash: 33f89feb9858a4e39e6e7226b1872fe8dc0a47489d7e71beaca7a62b826bfc15
                          • Instruction Fuzzy Hash: 42014BB1204A40A2EA17EB63F8443E9B365A79DBE0F144235FB66476F4DF78C488C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 149 140002b38-140002b8c GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 150 140002b8e-140002ba1 K32EnumProcesses 149->150 151 140002ba3-140002bb2 150->151 152 140002beb-140002bf4 SleepEx 150->152 153 140002bb4-140002bb8 151->153 154 140002bdc-140002be7 151->154 152->150 155 140002bba 153->155 156 140002bcb-140002bce call 140002540 153->156 154->152 157 140002bbe-140002bc3 155->157 160 140002bd2 156->160 158 140002bc5-140002bc9 157->158 159 140002bd6-140002bda 157->159 158->156 158->157 159->153 159->154 160->159
                          APIs
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess$EnumProcessesSleep
                          • String ID:
                          • API String ID: 3676546796-0
                          • Opcode ID: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                          • Instruction ID: 9c67988e037e7d22bad9650836966df18df348572cafe7f0e6f30b42da554bff
                          • Opcode Fuzzy Hash: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                          • Instruction Fuzzy Hash: 3A115CB26006518AE72ACF17F85579A77A6F78DBC1F154028EB4607B68CF39D881CB40

                          Control-flow Graph

                          APIs
                          • GetProcessHeap.KERNEL32(?,00000000,?,000000014000238B,?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 0000000140001801
                          • HeapAlloc.KERNEL32(?,00000000,?,000000014000238B,?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 0000000140001812
                            • Part of subcall function 00000001400014D8: GetProcessHeap.KERNEL32 ref: 000000014000150B
                            • Part of subcall function 00000001400014D8: HeapAlloc.KERNEL32 ref: 000000014000151E
                            • Part of subcall function 00000001400014D8: GetProcessHeap.KERNEL32 ref: 000000014000152C
                            • Part of subcall function 00000001400014D8: HeapAlloc.KERNEL32 ref: 000000014000153D
                            • Part of subcall function 00000001400014D8: K32EnumProcesses.KERNEL32 ref: 0000000140001557
                            • Part of subcall function 00000001400014D8: OpenProcess.KERNEL32 ref: 0000000140001585
                            • Part of subcall function 00000001400014D8: K32EnumProcessModules.KERNEL32 ref: 00000001400015AA
                            • Part of subcall function 00000001400014D8: ReadProcessMemory.KERNELBASE ref: 00000001400015E1
                            • Part of subcall function 00000001400014D8: CloseHandle.KERNELBASE ref: 000000014000161D
                            • Part of subcall function 00000001400014D8: GetProcessHeap.KERNEL32 ref: 000000014000162F
                            • Part of subcall function 00000001400014D8: HeapFree.KERNEL32 ref: 000000014000163D
                            • Part of subcall function 00000001400014D8: GetProcessHeap.KERNEL32 ref: 0000000140001643
                            • Part of subcall function 00000001400014D8: HeapFree.KERNEL32 ref: 0000000140001651
                          • OpenProcess.KERNEL32 ref: 0000000140001859
                          • TerminateProcess.KERNEL32 ref: 000000014000186C
                          • CloseHandle.KERNEL32 ref: 0000000140001875
                          • GetProcessHeap.KERNEL32 ref: 0000000140001885
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                          • String ID:
                          • API String ID: 1323846700-0
                          • Opcode ID: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                          • Instruction ID: e8e8f15008253283e0d5a10c8ea57e573901c1344bffe788f1ea91b5e390c365
                          • Opcode Fuzzy Hash: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                          • Instruction Fuzzy Hash: C8115BB1B05A4186FB1ADF27F8443D966A6ABCDBC4F188038EF09037B5DE38C5868700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 173 1400018ac-1400018d6 OpenProcess 174 140001901-140001912 173->174 175 1400018d8-1400018e8 IsWow64Process 173->175 176 1400018f8-1400018fb CloseHandle 175->176 177 1400018ea-1400018f3 175->177 176->174 177->176
                          APIs
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: Process$CloseHandleOpenWow64
                          • String ID:
                          • API String ID: 10462204-0
                          • Opcode ID: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                          • Instruction ID: a864651f2e5c17a125c4a55b2f5ca9b47fcd1256b8d640ad9fe9232b2a40a049
                          • Opcode Fuzzy Hash: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                          • Instruction Fuzzy Hash: 77F01D7170578192EB56CF17B584399A665E78CBC0F449039EB8943768DF39C4858700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 178 140002258-14000225c call 14000226c 180 140002261-140002263 ExitProcess 178->180
                          APIs
                            • Part of subcall function 000000014000226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000228F
                            • Part of subcall function 000000014000226C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000229F
                            • Part of subcall function 000000014000226C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 00000001400022B9
                            • Part of subcall function 000000014000226C: LookupPrivilegeValueW.ADVAPI32 ref: 00000001400022D0
                            • Part of subcall function 000000014000226C: AdjustTokenPrivileges.KERNELBASE ref: 0000000140002308
                            • Part of subcall function 000000014000226C: GetLastError.KERNEL32 ref: 0000000140002312
                            • Part of subcall function 000000014000226C: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000231B
                            • Part of subcall function 000000014000226C: FindResourceExA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000232F
                            • Part of subcall function 000000014000226C: SizeofResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 0000000140002346
                            • Part of subcall function 000000014000226C: LoadResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000235F
                            • Part of subcall function 000000014000226C: LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 0000000140002371
                            • Part of subcall function 000000014000226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140002261), ref: 000000014000237E
                            • Part of subcall function 000000014000226C: RegCreateKeyExW.KERNELBASE ref: 00000001400023BE
                            • Part of subcall function 000000014000226C: ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 00000001400023E5
                            • Part of subcall function 000000014000226C: RegSetKeySecurity.KERNELBASE ref: 00000001400023FE
                            • Part of subcall function 000000014000226C: LocalFree.KERNEL32 ref: 0000000140002408
                          • ExitProcess.KERNEL32 ref: 0000000140002263
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: Process$Resource$Security$CurrentDescriptorOpenToken$AdjustCloseConvertCreateErrorExitFindFreeHandleLastLoadLocalLockLookupPrivilegePrivilegesSizeofStringValue
                          • String ID:
                          • API String ID: 3836936051-0
                          • Opcode ID: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                          • Instruction ID: 542f07df19912b07f19d0c3647b83d0aa38d4f887fbb8c9b09a79fc57a6ac5cd
                          • Opcode Fuzzy Hash: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                          • Instruction Fuzzy Hash: 84A002B1F1794096FA0BB7F7785E3DC21656B9CB82F500415B242472B2DD3C44558716

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 189 140002560-14000258c 190 140002592 189->190 191 14000273a-140002742 189->191 192 1400026c6-1400026fe GetProcessHeap HeapAlloc K32EnumProcesses 190->192 193 140002598-14000259f 190->193 194 140002748-14000274b 191->194 195 14000297e-1400029a2 ReadFile 191->195 196 140002a74-140002a8e 192->196 198 140002704-140002715 192->198 199 1400025a5-1400025a8 193->199 200 1400026bd-1400026bf ExitProcess 193->200 201 140002751-140002756 194->201 202 140002974-140002979 call 14000175c 194->202 195->196 197 1400029a8-1400029af 195->197 197->196 206 1400029b5-1400029c9 call 1400018ac 197->206 198->196 207 14000271b-140002733 call 1400010c0 198->207 208 1400025ae-1400025b1 199->208 209 140002660-14000268b RegOpenKeyExW 199->209 203 140002919-14000292c call 140001944 201->203 204 14000275c-14000275f 201->204 202->196 203->196 231 140002932-140002941 call 140001944 203->231 210 140002761-140002766 204->210 211 14000279d-1400027ae call 140001944 204->211 206->196 229 1400029cf-1400029d5 206->229 232 140002735 207->232 218 140002651-14000265b 208->218 219 1400025b7-1400025ba 208->219 216 1400026a1-1400026b8 call 1400019c4 call 14000175c call 140001000 call 1400017ec 209->216 217 14000268d-14000269b RegDeleteValueW 209->217 210->196 220 14000276c-140002796 call 14000217c call 1400021a8 ExitProcess 210->220 211->196 240 1400027b4-1400027d6 ReadFile 211->240 216->196 217->216 218->196 226 140002644-14000264c 219->226 227 1400025c0-1400025c5 219->227 226->196 227->196 234 1400025cb-1400025ef ReadFile 227->234 238 1400029db-140002a16 GetProcessHeap HeapAlloc call 1400014d8 229->238 239 140002a5f 229->239 231->196 255 140002947-14000296f ShellExecuteW 231->255 232->196 234->196 236 1400025f5-1400025fc 234->236 236->196 243 140002602-140002616 call 1400018ac 236->243 258 140002a18-140002a1e 238->258 259 140002a49-140002a4f GetProcessHeap 238->259 245 140002a66-140002a6f call 140002a90 239->245 240->196 247 1400027dc-1400027e3 240->247 243->196 264 14000261c-140002622 243->264 245->196 247->196 254 1400027e9-140002827 GetProcessHeap HeapAlloc ReadFile 247->254 260 14000290b-140002914 GetProcessHeap 254->260 261 14000282d-140002839 254->261 255->196 258->259 265 140002a20-140002a32 258->265 262 140002a52-140002a5d HeapFree 259->262 260->262 261->260 266 14000283f-14000284b 261->266 262->196 268 140002624-140002633 call 1400010c0 264->268 269 140002638-14000263f 264->269 270 140002a34-140002a36 265->270 271 140002a38-140002a40 265->271 266->260 272 140002851-14000285c 266->272 268->196 269->245 270->271 276 140002a44 call 1400016cc 270->276 271->259 277 140002a42 271->277 273 140002881-140002905 lstrlenW GetProcessHeap HeapAlloc call 140002a90 GetProcessHeap HeapFree 272->273 274 14000285e-140002869 272->274 273->260 274->260 278 14000286f-14000287c call 140001c88 274->278 276->259 277->265 278->260
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: Process$Open$File$CloseExitHandleHeapName$AllocDeleteEnumFindInformationModulePathProcessesQueryReadTokenValueWow64lstrlen
                          • String ID: SOFTWARE$dialerstager$open
                          • API String ID: 3276259517-3931493855
                          • Opcode ID: ae79544a1ca264f77e0040c582fad8c70a14f3da5095032f2fa0f831f935a8fc
                          • Instruction ID: ae65b9042581f7dc9e2ee581e3d1b52dcddb088aa692a5b8ad70e1a65f9de3a1
                          • Opcode Fuzzy Hash: ae79544a1ca264f77e0040c582fad8c70a14f3da5095032f2fa0f831f935a8fc
                          • Instruction Fuzzy Hash: 91D14DB13046818BEB7BDF26B8143E92269F74DBC8F404125BB4A47AB9DE78C605C741

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 285 140001c88-140001cb8 286 140001cbb-140001cc8 285->286 287 140001e8c-140001e91 286->287 288 140001cce-140001d25 CreateProcessW 286->288 287->286 291 140001e97 287->291 289 140001e88 288->289 290 140001d2b-140001d5a VirtualAllocEx 288->290 289->287 292 140001e5d-140001e60 290->292 293 140001d60-140001d7b WriteProcessMemory 290->293 294 140001e99-140001eb9 291->294 295 140001e62-140001e76 OpenProcess 292->295 296 140001e85 292->296 293->292 297 140001d81-140001d87 293->297 295->289 298 140001e78-140001e83 TerminateProcess 295->298 296->289 299 140001dd2-140001def VirtualAlloc 297->299 300 140001d89 297->300 298->289 299->292 301 140001df1-140001e07 GetThreadContext 299->301 302 140001d8c-140001dba WriteProcessMemory 300->302 301->292 304 140001e09-140001e2e WriteProcessMemory 301->304 302->292 303 140001dc0-140001dcc 302->303 303->302 305 140001dce 303->305 304->292 306 140001e30-140001e4c SetThreadContext 304->306 305->299 306->292 307 140001e4e-140001e5b ResumeThread 306->307 307->292 308 140001eba-140001ebf 307->308 308->294
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: Process$MemoryThreadWrite$AllocContextVirtual$CreateOpenResumeTerminate
                          • String ID: @
                          • API String ID: 3462610200-2766056989
                          • Opcode ID: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                          • Instruction ID: 5c16bc39e07cf5e776479c29415d8ab36f8b64b080a4e80c067f24e51f003d21
                          • Opcode Fuzzy Hash: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                          • Instruction Fuzzy Hash: B55122B2700A808AEB52CF66E8447DE77A5FB88BD8F054125EF4997B68DF38C855C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                          • String ID: dialersvc64
                          • API String ID: 4184240511-3881820561
                          • Opcode ID: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                          • Instruction ID: f04b9e4fe08d72b668f3c34f73b3c63bb96ebc933f76805d9c48aa5d26f439e8
                          • Opcode Fuzzy Hash: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                          • Instruction Fuzzy Hash: 69415A72704A819AE712CF6AE8543DD73B5FB89B89F044125EF4E47A64DF38D149C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: Delete$CloseEnumOpen
                          • String ID: SOFTWARE\dialerconfig
                          • API String ID: 3013565938-461861421
                          • Opcode ID: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                          • Instruction ID: 8f4ace04a6ff3505bb025a84b088d585f414f6eddbaae7ea6d4a7c6b6057ac94
                          • Opcode Fuzzy Hash: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                          • Instruction Fuzzy Hash: 2F1186B2714A8486E762CF26F8557E92378F78C7D8F404215A74D0BAA8DF7CC248CB54
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: File$Write$CloseCreateHandle
                          • String ID: \\.\pipe\dialercontrol_redirect64
                          • API String ID: 148219782-3440882674
                          • Opcode ID: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                          • Instruction ID: c657f3a7a6ba8077c0f3fca19c98ae9a251d12aa6ce49f65425284bb78429f7a
                          • Opcode Fuzzy Hash: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                          • Instruction Fuzzy Hash: AE1139B6720B5082EB16CF16F818399A764F78DFE4F544215AB6907BA4CF78C549CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000012.00000002.2699880993.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000012.00000002.2699339853.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700447688.0000000140003000.00000002.00000001.00020000.00000000.sdmpDownload File
                          • Associated: 00000012.00000002.2700966930.0000000140006000.00000002.00000001.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_18_2_140000000_dialer.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: ntdll.dll
                          • API String ID: 1646373207-2227199552
                          • Opcode ID: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                          • Instruction ID: 7108e587e86fbdef38877cdd133235ae9a077454219746bc209a409130a8dfa8
                          • Opcode Fuzzy Hash: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                          • Instruction Fuzzy Hash: 5BD0C9F471260582EE1BDBA378643E552996B5CBC5F884020AE164B360DA38C1998600

                          Execution Graph

                          Execution Coverage:1.4%
                          Dynamic/Decrypted Code Coverage:95.2%
                          Signature Coverage:0%
                          Total number of Nodes:124
                          Total number of Limit Nodes:16
                          execution_graph 16898 2e99172273c 16899 2e99172276a 16898->16899 16900 2e9917227c5 VirtualAlloc 16899->16900 16903 2e9917228d4 16899->16903 16902 2e9917227ec 16900->16902 16900->16903 16901 2e991722858 LoadLibraryA 16901->16902 16902->16901 16902->16903 16904 2e99175554d 16905 2e991755554 16904->16905 16906 2e9917555bb 16905->16906 16907 2e991755637 VirtualProtect 16905->16907 16908 2e991755671 16907->16908 16909 2e991755663 GetLastError 16907->16909 16909->16908 16910 2e991755cf0 16911 2e991755cfd 16910->16911 16912 2e991755d09 16911->16912 16914 2e991755e1a 16911->16914 16913 2e991755d3e 16912->16913 16915 2e991755d8d 16912->16915 16916 2e991755d66 SetThreadContext 16913->16916 16917 2e991755efe 16914->16917 16918 2e991755e41 VirtualProtect FlushInstructionCache 16914->16918 16916->16915 16919 2e991755f1e 16917->16919 16930 2e9917543e0 16917->16930 16918->16914 16926 2e991754df0 GetCurrentProcess 16919->16926 16922 2e991755f23 16923 2e991755f37 ResumeThread 16922->16923 16925 2e991755f77 _log10_special 16922->16925 16924 2e991755f6b 16923->16924 16924->16922 16927 2e991754e0c 16926->16927 16928 2e991754e22 VirtualProtect FlushInstructionCache 16927->16928 16929 2e991754e53 16927->16929 16928->16927 16929->16922 16933 2e9917543fc 16930->16933 16931 2e99175445f 16931->16919 16932 2e991754412 VirtualFree 16932->16933 16933->16931 16933->16932 16934 2e991753ab9 16937 2e991753a06 16934->16937 16935 2e991753a70 16936 2e991753a56 VirtualQuery 16936->16935 16936->16937 16937->16935 16937->16936 16938 2e991753a8a VirtualAlloc 16937->16938 16938->16935 16939 2e991753abb GetLastError 16938->16939 16939->16935 16939->16937 16940 2e991751abc 16946 2e991751628 GetProcessHeap 16940->16946 16942 2e991751ad2 Sleep SleepEx 16944 2e991751acb 16942->16944 16944->16942 16945 2e991751598 StrCmpIW StrCmpW 16944->16945 16991 2e9917518b4 16944->16991 16945->16944 16947 2e991751648 _invalid_parameter_noinfo 16946->16947 17008 2e991751268 GetProcessHeap 16947->17008 16949 2e991751650 16950 2e991751268 2 API calls 16949->16950 16951 2e991751661 16950->16951 16952 2e991751268 2 API calls 16951->16952 16953 2e99175166a 16952->16953 16954 2e991751268 2 API calls 16953->16954 16955 2e991751673 16954->16955 16956 2e99175168e RegOpenKeyExW 16955->16956 16957 2e9917516c0 RegOpenKeyExW 16956->16957 16958 2e9917518a6 16956->16958 16959 2e9917516ff RegOpenKeyExW 16957->16959 16960 2e9917516e9 16957->16960 16958->16944 16962 2e99175173a RegOpenKeyExW 16959->16962 16963 2e991751723 16959->16963 17019 2e9917512bc RegQueryInfoKeyW 16960->17019 16966 2e99175175e 16962->16966 16967 2e991751775 RegOpenKeyExW 16962->16967 17012 2e99175104c RegQueryInfoKeyW 16963->17012 16964 2e9917516f5 RegCloseKey 16964->16959 16968 2e9917512bc 11 API calls 16966->16968 16969 2e9917517b0 RegOpenKeyExW 16967->16969 16970 2e991751799 16967->16970 16972 2e99175176b RegCloseKey 16968->16972 16974 2e9917517eb RegOpenKeyExW 16969->16974 16975 2e9917517d4 16969->16975 16973 2e9917512bc 11 API calls 16970->16973 16972->16967 16976 2e9917517a6 RegCloseKey 16973->16976 16978 2e99175180f 16974->16978 16979 2e991751826 RegOpenKeyExW 16974->16979 16977 2e9917512bc 11 API calls 16975->16977 16976->16969 16980 2e9917517e1 RegCloseKey 16977->16980 16981 2e99175104c 4 API calls 16978->16981 16982 2e99175184a 16979->16982 16983 2e991751861 RegOpenKeyExW 16979->16983 16980->16974 16987 2e99175181c RegCloseKey 16981->16987 16984 2e99175104c 4 API calls 16982->16984 16985 2e99175189c RegCloseKey 16983->16985 16986 2e991751885 16983->16986 16988 2e991751857 RegCloseKey 16984->16988 16985->16958 16989 2e99175104c 4 API calls 16986->16989 16987->16979 16988->16983 16990 2e991751892 RegCloseKey 16989->16990 16990->16985 17037 2e9917514a4 16991->17037 17030 2e991766168 17008->17030 17011 2e9917512ae _invalid_parameter_noinfo 17011->16949 17013 2e9917510bf 17012->17013 17014 2e9917511b5 RegCloseKey 17012->17014 17013->17014 17015 2e9917510cf RegEnumValueW 17013->17015 17014->16962 17016 2e991751125 _invalid_parameter_noinfo __free_lconv_num 17015->17016 17016->17014 17016->17015 17017 2e99175114e GetProcessHeap 17016->17017 17018 2e99175116e GetProcessHeap 17016->17018 17017->17016 17018->17016 17020 2e99175148a __free_lconv_num 17019->17020 17021 2e991751327 GetProcessHeap 17019->17021 17020->16964 17024 2e99175133e _invalid_parameter_noinfo __free_lconv_num 17021->17024 17022 2e991751476 GetProcessHeap 17022->17020 17023 2e991751352 RegEnumValueW 17023->17024 17024->17022 17024->17023 17026 2e99175141e lstrlenW GetProcessHeap 17024->17026 17027 2e9917513d3 GetProcessHeap 17024->17027 17028 2e991751443 StrCpyW 17024->17028 17029 2e9917513f3 GetProcessHeap 17024->17029 17032 2e99175152c 17024->17032 17026->17024 17027->17024 17028->17024 17029->17024 17031 2e991751283 GetProcessHeap 17030->17031 17031->17011 17033 2e99175157c 17032->17033 17034 2e991751546 17032->17034 17033->17024 17034->17033 17035 2e99175155d StrCmpIW 17034->17035 17036 2e991751565 StrCmpW 17034->17036 17035->17034 17036->17034 17038 2e9917514e1 GetProcessHeap 17037->17038 17039 2e9917514c1 GetProcessHeap 17037->17039 17043 2e991766180 17038->17043 17041 2e9917514da __free_lconv_num 17039->17041 17041->17038 17041->17039 17044 2e9917514f6 GetProcessHeap HeapFree 17043->17044 17045 2e9917528c8 17047 2e99175290e 17045->17047 17046 2e991752970 17047->17046 17049 2e991753844 17047->17049 17050 2e991753851 StrCmpNIW 17049->17050 17051 2e991753866 17049->17051 17050->17051 17051->17047

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 106492572-2879589442
                          • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction ID: 54b8228711d56d83d96e028295ec185cd7547312acf9b7e7a1458d33eaddbd6f
                          • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction Fuzzy Hash: A0713036354B9285EB10AF67E858A5D3374F784BC9F82112AED4E87B6ADF34C484CB50

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID: wr
                          • API String ID: 1092925422-2678910430
                          • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction ID: 889b996a8caf1a720874174e44a79219beab5574743a7c3e537098b2f91f301b
                          • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction Fuzzy Hash: 85115E2674478682EF189B12E40866962B0F748BC5F86042EEE8947766EF3DC585CB24

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 59 2e991755b30-2e991755b57 60 2e991755b59-2e991755b68 59->60 61 2e991755b6b-2e991755b76 GetCurrentThreadId 59->61 60->61 62 2e991755b78-2e991755b7d 61->62 63 2e991755b82-2e991755b89 61->63 64 2e991755faf-2e991755fc6 call 2e991757940 62->64 65 2e991755b9b-2e991755baf 63->65 66 2e991755b8b-2e991755b96 call 2e991755960 63->66 69 2e991755bbe-2e991755bc4 65->69 66->64 70 2e991755bca-2e991755bd3 69->70 71 2e991755c95-2e991755cb6 69->71 74 2e991755c1a-2e991755c8d call 2e991754510 call 2e9917544b0 call 2e991754470 70->74 75 2e991755bd5-2e991755c18 call 2e9917585c0 70->75 79 2e991755e1f-2e991755e30 call 2e9917574bf 71->79 80 2e991755cbc-2e991755cdc GetThreadContext 71->80 88 2e991755c90 74->88 75->88 91 2e991755e35-2e991755e3b 79->91 81 2e991755e1a 80->81 82 2e991755ce2-2e991755d03 80->82 81->79 82->81 90 2e991755d09-2e991755d12 82->90 88->69 94 2e991755d92-2e991755da3 90->94 95 2e991755d14-2e991755d25 90->95 96 2e991755efe-2e991755f0e 91->96 97 2e991755e41-2e991755e98 VirtualProtect FlushInstructionCache 91->97 103 2e991755e15 94->103 104 2e991755da5-2e991755dc3 94->104 99 2e991755d8d 95->99 100 2e991755d27-2e991755d3c 95->100 106 2e991755f1e-2e991755f2a call 2e991754df0 96->106 107 2e991755f10-2e991755f17 96->107 101 2e991755e9a-2e991755ea4 97->101 102 2e991755ec9-2e991755ef9 call 2e9917578ac 97->102 99->103 100->99 110 2e991755d3e-2e991755d88 call 2e991753970 SetThreadContext 100->110 101->102 111 2e991755ea6-2e991755ec1 call 2e991754390 101->111 102->91 104->103 112 2e991755dc5-2e991755e10 call 2e991753900 call 2e9917574dd 104->112 120 2e991755f2f-2e991755f35 106->120 107->106 108 2e991755f19 call 2e9917543e0 107->108 108->106 110->99 111->102 112->103 124 2e991755f77-2e991755f95 120->124 125 2e991755f37-2e991755f75 ResumeThread call 2e9917578ac 120->125 128 2e991755fa9 124->128 129 2e991755f97-2e991755fa6 124->129 125->120 128->64 129->128
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                          • Instruction ID: 1cfaaca5a2e5f2dbf610dce76985e3aebf4ce61cea1ed6e8382bb37d242726a6
                          • Opcode Fuzzy Hash: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                          • Instruction Fuzzy Hash: 25D19C76244B8982DA70DB06E49835A77B0F388B84F52411BEACD47BA6DF3CC591CF50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 131 2e9917550d0-2e9917550fc 132 2e9917550fe-2e991755106 131->132 133 2e99175510d-2e991755116 131->133 132->133 134 2e991755118-2e991755120 133->134 135 2e991755127-2e991755130 133->135 134->135 136 2e991755132-2e99175513a 135->136 137 2e991755141-2e99175514a 135->137 136->137 138 2e99175514c-2e991755151 137->138 139 2e991755156-2e991755161 GetCurrentThreadId 137->139 140 2e9917556d3-2e9917556da 138->140 141 2e99175516d-2e991755174 139->141 142 2e991755163-2e991755168 139->142 143 2e991755176-2e99175517c 141->143 144 2e991755181-2e99175518a 141->144 142->140 143->140 145 2e99175518c-2e991755191 144->145 146 2e991755196-2e9917551a2 144->146 145->140 147 2e9917551ce-2e991755225 call 2e9917556e0 * 2 146->147 148 2e9917551a4-2e9917551c9 146->148 153 2e99175523a-2e991755243 147->153 154 2e991755227-2e99175522e 147->154 148->140 157 2e991755255-2e99175525e 153->157 158 2e991755245-2e991755252 153->158 155 2e991755230 154->155 156 2e991755236 154->156 159 2e9917552b0-2e9917552b6 155->159 160 2e9917552a6-2e9917552aa 156->160 161 2e991755260-2e991755270 157->161 162 2e991755273-2e991755298 call 2e991757870 157->162 158->157 163 2e9917552e5-2e9917552eb 159->163 164 2e9917552b8-2e9917552d4 call 2e991754390 159->164 160->159 161->162 172 2e99175529e 162->172 173 2e99175532d-2e991755342 call 2e991753cc0 162->173 167 2e9917552ed-2e99175530c call 2e9917578ac 163->167 168 2e991755315-2e991755328 163->168 164->163 174 2e9917552d6-2e9917552de 164->174 167->168 168->140 172->160 178 2e991755351-2e99175535a 173->178 179 2e991755344-2e99175534c 173->179 174->163 180 2e99175536c-2e9917553ba call 2e991758c60 178->180 181 2e99175535c-2e991755369 178->181 179->160 184 2e9917553c2-2e9917553ca 180->184 181->180 185 2e9917553d0-2e9917554bb call 2e991757440 184->185 186 2e9917554d7-2e9917554df 184->186 198 2e9917554bd 185->198 199 2e9917554bf-2e9917554ce call 2e991754060 185->199 188 2e9917554e1-2e9917554f4 call 2e991754590 186->188 189 2e991755523-2e99175552b 186->189 200 2e9917554f6 188->200 201 2e9917554f8-2e991755521 188->201 190 2e99175552d-2e991755535 189->190 191 2e991755537-2e991755546 189->191 190->191 195 2e991755554-2e991755561 190->195 196 2e99175554f 191->196 197 2e991755548 191->197 203 2e991755564-2e9917555b9 call 2e9917585c0 195->203 204 2e991755563 195->204 196->195 197->196 198->186 207 2e9917554d0 199->207 208 2e9917554d2 199->208 200->189 201->186 210 2e9917555bb-2e9917555c3 203->210 211 2e9917555c8-2e991755661 call 2e991754510 call 2e991754470 VirtualProtect 203->211 204->203 207->186 208->184 216 2e991755671-2e9917556d1 211->216 217 2e991755663-2e991755668 GetLastError 211->217 216->140 217->216
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                          • Instruction ID: eebe92032a7fdedf781faa804f7575b613c740f96bbb6c7e2e6b86a645c85fbc
                          • Opcode Fuzzy Hash: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                          • Instruction Fuzzy Hash: E802BA32259BC586E7A0CB56F49435ABBA1F3C4794F11401AEA8E87BA9DF7CC494CF10

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Virtual$AllocQuery
                          • String ID:
                          • API String ID: 31662377-0
                          • Opcode ID: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                          • Instruction ID: bd37eb1f9fe1cce81840bdfd23b72ab3f02b45a8b3f74b5eeca5040b27afc49a
                          • Opcode Fuzzy Hash: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                          • Instruction Fuzzy Hash: 07315022759AC581EA70DA17E05835E67A4F388784F11052BF5CE06BBADF7CC2C08F20

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                          • String ID:
                          • API String ID: 1683269324-0
                          • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction ID: 351c7813d095973389ab4a2bf15dbcd6c7863a8031ac115e2cdad26015686c69
                          • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction Fuzzy Hash: 56118031B946C382FB60AB33F84D76922A4B754345F92412FA916816B3EF79C0C48E70

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                          • String ID:
                          • API String ID: 3733156554-0
                          • Opcode ID: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                          • Instruction ID: d4000fd86275b36a03d69cb5381fd848dff25b8e8b72ec9c6e4ac05b9341f0d5
                          • Opcode Fuzzy Hash: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                          • Instruction Fuzzy Hash: DCF0302625CB85C0D631DB02E44934A6BA0F38C7D4F55011AFA8E03B6ADB3CC6C08F50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 265 2e99172273c-2e9917227a4 call 2e9917229d4 * 4 274 2e9917227aa-2e9917227ad 265->274 275 2e9917229b2 265->275 274->275 277 2e9917227b3-2e9917227b6 274->277 276 2e9917229b4-2e9917229d0 275->276 277->275 278 2e9917227bc-2e9917227bf 277->278 278->275 279 2e9917227c5-2e9917227e6 VirtualAlloc 278->279 279->275 280 2e9917227ec-2e99172280c 279->280 281 2e99172280e-2e991722836 280->281 282 2e991722838-2e99172283f 280->282 281->281 281->282 283 2e9917228df-2e9917228e6 282->283 284 2e991722845-2e991722852 282->284 286 2e9917228ec-2e991722901 283->286 287 2e991722992-2e9917229b0 283->287 284->283 285 2e991722858-2e99172286a LoadLibraryA 284->285 288 2e99172286c-2e991722878 285->288 289 2e9917228ca-2e9917228d2 285->289 286->287 290 2e991722907 286->290 287->276 292 2e9917228c5-2e9917228c8 288->292 289->285 293 2e9917228d4-2e9917228d9 289->293 291 2e99172290d-2e991722921 290->291 295 2e991722923-2e991722934 291->295 296 2e991722982-2e99172298c 291->296 292->289 297 2e99172287a-2e99172287d 292->297 293->283 298 2e99172293f-2e991722943 295->298 299 2e991722936-2e99172293d 295->299 296->287 296->291 300 2e99172287f-2e9917228a5 297->300 301 2e9917228a7-2e9917228b7 297->301 304 2e99172294d-2e991722951 298->304 305 2e991722945-2e99172294b 298->305 303 2e991722970-2e991722980 299->303 306 2e9917228ba-2e9917228c1 300->306 301->306 303->295 303->296 307 2e991722963-2e991722967 304->307 308 2e991722953-2e991722961 304->308 305->303 306->292 307->303 310 2e991722969-2e99172296c 307->310 308->303 310->303
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2715128142.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991720000_winlogon.jbxd
                          Similarity
                          • API ID: AllocLibraryLoadVirtual
                          • String ID:
                          • API String ID: 3550616410-0
                          • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction ID: 0174b3c931968c58cb23d2eb9d8b9e4d39f5b79fd9c5245184543cdb20c18685
                          • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction Fuzzy Hash: A4616872B422D187DB54CF16C00872D7392F754BE4F19852ADF991778ADA38D893CB20

                          Control-flow Graph

                          APIs
                            • Part of subcall function 000002E991751628: GetProcessHeap.KERNEL32 ref: 000002E991751633
                            • Part of subcall function 000002E991751628: HeapAlloc.KERNEL32 ref: 000002E991751642
                            • Part of subcall function 000002E991751628: RegOpenKeyExW.ADVAPI32 ref: 000002E9917516B2
                            • Part of subcall function 000002E991751628: RegOpenKeyExW.ADVAPI32 ref: 000002E9917516DF
                            • Part of subcall function 000002E991751628: RegCloseKey.ADVAPI32 ref: 000002E9917516F9
                            • Part of subcall function 000002E991751628: RegOpenKeyExW.ADVAPI32 ref: 000002E991751719
                            • Part of subcall function 000002E991751628: RegCloseKey.ADVAPI32 ref: 000002E991751734
                            • Part of subcall function 000002E991751628: RegOpenKeyExW.ADVAPI32 ref: 000002E991751754
                            • Part of subcall function 000002E991751628: RegCloseKey.ADVAPI32 ref: 000002E99175176F
                            • Part of subcall function 000002E991751628: RegOpenKeyExW.ADVAPI32 ref: 000002E99175178F
                            • Part of subcall function 000002E991751628: RegCloseKey.ADVAPI32 ref: 000002E9917517AA
                            • Part of subcall function 000002E991751628: RegOpenKeyExW.ADVAPI32 ref: 000002E9917517CA
                          • Sleep.KERNEL32 ref: 000002E991751AD7
                          • SleepEx.KERNELBASE ref: 000002E991751ADD
                            • Part of subcall function 000002E991751628: RegCloseKey.ADVAPI32 ref: 000002E9917517E5
                            • Part of subcall function 000002E991751628: RegOpenKeyExW.ADVAPI32 ref: 000002E991751805
                            • Part of subcall function 000002E991751628: RegCloseKey.ADVAPI32 ref: 000002E991751820
                            • Part of subcall function 000002E991751628: RegOpenKeyExW.ADVAPI32 ref: 000002E991751840
                            • Part of subcall function 000002E991751628: RegCloseKey.ADVAPI32 ref: 000002E99175185B
                            • Part of subcall function 000002E991751628: RegOpenKeyExW.ADVAPI32 ref: 000002E99175187B
                            • Part of subcall function 000002E991751628: RegCloseKey.ADVAPI32 ref: 000002E991751896
                            • Part of subcall function 000002E991751628: RegCloseKey.ADVAPI32 ref: 000002E9917518A0
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: CloseOpen$HeapSleep$AllocProcess
                          • String ID:
                          • API String ID: 1534210851-0
                          • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction ID: 98a2260962f66e790094138e64364fcbcff5423d27e2e98684da735ba5be122f
                          • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction Fuzzy Hash: 3731F1613816C342FF509B27D6493A913A4BB44BC6F0A542B9E1B87697FF34C8D1CA31

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 575 2e991752b2c-2e991752ba5 call 2e991772ce0 578 2e991752ee0-2e991752f03 575->578 579 2e991752bab-2e991752bb1 575->579 579->578 580 2e991752bb7-2e991752bba 579->580 580->578 581 2e991752bc0-2e991752bc3 580->581 581->578 582 2e991752bc9-2e991752bd9 GetModuleHandleA 581->582 583 2e991752bed 582->583 584 2e991752bdb-2e991752beb GetProcAddress 582->584 585 2e991752bf0-2e991752c0e 583->585 584->585 585->578 587 2e991752c14-2e991752c33 StrCmpNIW 585->587 587->578 588 2e991752c39-2e991752c3d 587->588 588->578 589 2e991752c43-2e991752c4d 588->589 589->578 590 2e991752c53-2e991752c5a 589->590 590->578 591 2e991752c60-2e991752c73 590->591 592 2e991752c75-2e991752c81 591->592 593 2e991752c83 591->593 594 2e991752c86-2e991752c8a 592->594 593->594 595 2e991752c9a 594->595 596 2e991752c8c-2e991752c98 594->596 597 2e991752c9d-2e991752ca7 595->597 596->597 598 2e991752d9d-2e991752da1 597->598 599 2e991752cad-2e991752cb0 597->599 600 2e991752da7-2e991752daa 598->600 601 2e991752ed2-2e991752eda 598->601 602 2e991752cc2-2e991752ccc 599->602 603 2e991752cb2-2e991752cbf call 2e99175199c 599->603 604 2e991752dac-2e991752db8 call 2e99175199c 600->604 605 2e991752dbb-2e991752dc5 600->605 601->578 601->591 607 2e991752cce-2e991752cdb 602->607 608 2e991752d00-2e991752d0a 602->608 603->602 604->605 612 2e991752df5-2e991752df8 605->612 613 2e991752dc7-2e991752dd4 605->613 607->608 615 2e991752cdd-2e991752cea 607->615 609 2e991752d3a-2e991752d3d 608->609 610 2e991752d0c-2e991752d19 608->610 617 2e991752d3f-2e991752d49 call 2e991751bbc 609->617 618 2e991752d4b-2e991752d58 lstrlenW 609->618 610->609 616 2e991752d1b-2e991752d28 610->616 621 2e991752dfa-2e991752e03 call 2e991751bbc 612->621 622 2e991752e05-2e991752e12 lstrlenW 612->622 613->612 620 2e991752dd6-2e991752de3 613->620 623 2e991752ced-2e991752cf3 615->623 626 2e991752d2b-2e991752d31 616->626 617->618 633 2e991752d93-2e991752d98 617->633 628 2e991752d5a-2e991752d64 618->628 629 2e991752d7b-2e991752d8d call 2e991753844 618->629 630 2e991752de6-2e991752dec 620->630 621->622 641 2e991752e4a-2e991752e55 621->641 624 2e991752e35-2e991752e3f call 2e991753844 622->624 625 2e991752e14-2e991752e1e 622->625 632 2e991752cf9-2e991752cfe 623->632 623->633 635 2e991752e42-2e991752e44 624->635 625->624 634 2e991752e20-2e991752e33 call 2e99175152c 625->634 626->633 636 2e991752d33-2e991752d38 626->636 628->629 639 2e991752d66-2e991752d79 call 2e99175152c 628->639 629->633 629->635 640 2e991752dee-2e991752df3 630->640 630->641 632->608 632->623 633->635 634->624 634->641 635->601 635->641 636->609 636->626 639->629 639->633 640->612 640->630 646 2e991752ecc-2e991752ed0 641->646 647 2e991752e57-2e991752e5b 641->647 646->601 651 2e991752e5d-2e991752e61 647->651 652 2e991752e63-2e991752e7d call 2e9917585c0 647->652 651->652 654 2e991752e80-2e991752e83 651->654 652->654 657 2e991752ea6-2e991752ea9 654->657 658 2e991752e85-2e991752ea3 call 2e9917585c0 654->658 657->646 660 2e991752eab-2e991752ec9 call 2e9917585c0 657->660 658->657 660->646
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction ID: 9267f257902aa87408aaac54b14cc2c1c9bedbda9888c08ae2a81d07cc4cf480
                          • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction Fuzzy Hash: 49B19F22250BD2C6EB698F27D4487A963A5F748B84F56501FEE0953796EF35CCC0CB60
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction ID: 0216bfbab142289af890d8c45534b75c134c54bc5fdd387169f2726022cc0a09
                          • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction Fuzzy Hash: F6318372245BC19AEB609F62E8443ED7364F784744F85402EEB4D97B95EF38C588CB20
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction ID: a23a05519f5be50e9521a24267438afb78831fdbfdb93237bbf99c1e24bec194
                          • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction Fuzzy Hash: C0319332254FC196EB60DF26E84439E73A4F789794F91012AEA9D43B96DF38C185CF10

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction ID: faf9fcae4cad09d4b21471a3c83bc15139729c09b9c22fc87df00bbc9025f63a
                          • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction Fuzzy Hash: B3516D72240BC5C6EB54CF62E44835AB7A1F389FC9F85412AEA4A8771ADF3CC085CB51

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentThread$AddressHandleModuleProc
                          • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                          • API String ID: 4175298099-1975688563
                          • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction ID: 4753043bf12ce9e32f38f3c1a54f8f46ce1ac6560c3b79c386cbf99cf72d279c
                          • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction Fuzzy Hash: FA31D664191ACBA1FB00EFA7E85D6D42320B710384FC3101B945A461B79F3886CACF71

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 417 2e991726910-2e991726916 418 2e991726951-2e99172695b 417->418 419 2e991726918-2e99172691b 417->419 420 2e991726a78-2e991726a8d 418->420 421 2e99172691d-2e991726920 419->421 422 2e991726945-2e991726984 call 2e991726fc0 419->422 425 2e991726a9c-2e991726ab6 call 2e991726e54 420->425 426 2e991726a8f 420->426 423 2e991726922-2e991726925 421->423 424 2e991726938 __scrt_dllmain_crt_thread_attach 421->424 437 2e99172698a-2e99172699f call 2e991726e54 422->437 438 2e991726a52 422->438 429 2e991726931-2e991726936 call 2e991726f04 423->429 430 2e991726927-2e991726930 423->430 433 2e99172693d-2e991726944 424->433 440 2e991726aef-2e991726b20 call 2e991727190 425->440 441 2e991726ab8-2e991726aed call 2e991726f7c call 2e991726e1c call 2e991727318 call 2e991727130 call 2e991727154 call 2e991726fac 425->441 431 2e991726a91-2e991726a9b 426->431 429->433 450 2e991726a6a-2e991726a77 call 2e991727190 437->450 451 2e9917269a5-2e9917269b6 call 2e991726ec4 437->451 442 2e991726a54-2e991726a69 438->442 452 2e991726b31-2e991726b37 440->452 453 2e991726b22-2e991726b28 440->453 441->431 450->420 470 2e991726a07-2e991726a11 call 2e991727130 451->470 471 2e9917269b8-2e9917269dc call 2e9917272dc call 2e991726e0c call 2e991726e38 call 2e99172ac0c 451->471 454 2e991726b39-2e991726b43 452->454 455 2e991726b7e-2e991726b94 call 2e99172268c 452->455 453->452 459 2e991726b2a-2e991726b2c 453->459 460 2e991726b4f-2e991726b5d call 2e991735780 454->460 461 2e991726b45-2e991726b4d 454->461 478 2e991726bcc-2e991726bce 455->478 479 2e991726b96-2e991726b98 455->479 466 2e991726c1f-2e991726c2c 459->466 467 2e991726b63-2e991726b78 call 2e991726910 460->467 482 2e991726c15-2e991726c1d 460->482 461->467 467->455 467->482 470->438 490 2e991726a13-2e991726a1f call 2e991727180 470->490 471->470 519 2e9917269de-2e9917269e5 __scrt_dllmain_after_initialize_c 471->519 480 2e991726bd0-2e991726bd3 478->480 481 2e991726bd5-2e991726bea call 2e991726910 478->481 479->478 487 2e991726b9a-2e991726bbc call 2e99172268c call 2e991726a78 479->487 480->481 480->482 481->482 499 2e991726bec-2e991726bf6 481->499 482->466 487->478 512 2e991726bbe-2e991726bc6 call 2e991735780 487->512 508 2e991726a21-2e991726a2b call 2e991727098 490->508 509 2e991726a45-2e991726a50 490->509 505 2e991726c01-2e991726c11 call 2e991735780 499->505 506 2e991726bf8-2e991726bff 499->506 505->482 506->482 508->509 520 2e991726a2d-2e991726a3b 508->520 509->442 512->478 519->470 521 2e9917269e7-2e991726a04 call 2e99172abc8 519->521 520->509 521->470
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2715128142.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991720000_winlogon.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                          • API String ID: 190073905-1786718095
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: e16fa48834a59c6cd4a499f0462a1a18f190ef002cbaf03bf6bfe41264d5c29d
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: 9F81A4617822C386FB50AB27D44939922A1FB99780F96482FBD4547797DB38C9C78F30

                          Control-flow Graph

                          APIs
                          • GetLastError.KERNEL32 ref: 000002E99175CE37
                          • FlsGetValue.KERNEL32(?,?,?,000002E991760A6B,?,?,?,000002E99176045C,?,?,?,000002E99175C84F), ref: 000002E99175CE4C
                          • FlsSetValue.KERNEL32(?,?,?,000002E991760A6B,?,?,?,000002E99176045C,?,?,?,000002E99175C84F), ref: 000002E99175CE6D
                          • FlsSetValue.KERNEL32(?,?,?,000002E991760A6B,?,?,?,000002E99176045C,?,?,?,000002E99175C84F), ref: 000002E99175CE9A
                          • FlsSetValue.KERNEL32(?,?,?,000002E991760A6B,?,?,?,000002E99176045C,?,?,?,000002E99175C84F), ref: 000002E99175CEAB
                          • FlsSetValue.KERNEL32(?,?,?,000002E991760A6B,?,?,?,000002E99176045C,?,?,?,000002E99175C84F), ref: 000002E99175CEBC
                          • SetLastError.KERNEL32 ref: 000002E99175CED7
                          • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000002E991760A6B,?,?,?,000002E99176045C,?,?,?,000002E99175C84F), ref: 000002E99175CF0D
                          • FlsSetValue.KERNEL32(?,?,00000001,000002E99175ECCC,?,?,?,?,000002E99175BF9F,?,?,?,?,?,000002E991757AB0), ref: 000002E99175CF2C
                            • Part of subcall function 000002E99175D6CC: HeapAlloc.KERNEL32 ref: 000002E99175D721
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002E991760A6B,?,?,?,000002E99176045C,?,?,?,000002E99175C84F), ref: 000002E99175CF54
                            • Part of subcall function 000002E99175D744: HeapFree.KERNEL32 ref: 000002E99175D75A
                            • Part of subcall function 000002E99175D744: GetLastError.KERNEL32 ref: 000002E99175D764
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002E991760A6B,?,?,?,000002E99176045C,?,?,?,000002E99175C84F), ref: 000002E99175CF65
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002E991760A6B,?,?,?,000002E99176045C,?,?,?,000002E99175C84F), ref: 000002E99175CF76
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Value$ErrorLast$Heap$AllocFree
                          • String ID:
                          • API String ID: 570795689-0
                          • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction ID: d19b245fd988bfb2817d68be97438e53c8424c1f9c669e008c2cccf14dbdb104
                          • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction Fuzzy Hash: 734174203C12C742FA69A737D55D3692289BB447B4F160B2FA936466E7DF3884C19F30
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                          • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                          • API String ID: 2171963597-1373409510
                          • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction ID: 2ec8cc7cd3fe4d2c1af7483aaecc8ed615e3356d440049c4b66141594478c441
                          • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction Fuzzy Hash: F4214F32654781C3FB108B26F44875973A1F789BE4F91021AEA5943BA9DF3CC589CF51
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2715128142.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991720000_winlogon.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction ID: 920fc7fd0e7b6407fb21e7a3f32b8b7f41c9ae5ea962bf932353d45c49382d83
                          • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction Fuzzy Hash: BAE1C1326427D286EB60CF26D4883AD77A0F749788F15091AEE8947B9BCF34C1D2CB10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction ID: 97f73203f8982477833e52015e33f754f7e99079407345b81d307e64eaf0c1f0
                          • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction Fuzzy Hash: C1E18F72644BC28AEB20DF66D4883AD77A0F745798F12112BEE8957B97CB34D5C1CB20
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: AddressFreeLibraryProc
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3013587201-537541572
                          • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction ID: a37450bc1c151caee95b075b815692e99cd55a6f4dc24f28fbba06317fb40626
                          • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction Fuzzy Hash: 2741D622391B8292FB56CB17E8087562795B745BE0F47492F9D0E87786EF3CC4C58B60
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction ID: c14a8d93c31946622ec18366339607f616fe7fb0c74b8ef5f7eef75a911a86bd
                          • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction Fuzzy Hash: A0419133214BC5C6E760CF22E44879EB7A1F388B89F44812AEA8A47759DF38C485CB50
                          APIs
                          • FlsGetValue.KERNEL32(?,?,?,000002E99175C7DE,?,?,?,?,?,?,?,?,000002E99175CF9D,?,?,00000001), ref: 000002E99175D087
                          • FlsSetValue.KERNEL32(?,?,?,000002E99175C7DE,?,?,?,?,?,?,?,?,000002E99175CF9D,?,?,00000001), ref: 000002E99175D0A6
                          • FlsSetValue.KERNEL32(?,?,?,000002E99175C7DE,?,?,?,?,?,?,?,?,000002E99175CF9D,?,?,00000001), ref: 000002E99175D0CE
                          • FlsSetValue.KERNEL32(?,?,?,000002E99175C7DE,?,?,?,?,?,?,?,?,000002E99175CF9D,?,?,00000001), ref: 000002E99175D0DF
                          • FlsSetValue.KERNEL32(?,?,?,000002E99175C7DE,?,?,?,?,?,?,?,?,000002E99175CF9D,?,?,00000001), ref: 000002E99175D0F0
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Value
                          • String ID: 1%$Y%
                          • API String ID: 3702945584-1395475152
                          • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction ID: a96b1890e74b2ecd0ea9938466009dfee319b739ed4c7e033c1762021a338c56
                          • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction Fuzzy Hash: 481181207902C242FA69A737D55D3696185BB443F4F16472F983A466EBDF38C4C28E30
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: cd15232f422848d1d810b8ca1d68bf3e5a859180c35751ee036576ae4bb720cf
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: 4981C3216806C3A6FB50AB6BE44D3A922D4F745780FD7441FAA0987797EB38C9C58F31
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction ID: 207c3dd52896e77b572485204b7de8f36d24d6c4bffc08408b80e03efac7f2a8
                          • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction Fuzzy Hash: 363196223526C2E1EE15DB43E4487656394B74CBA0F9B052F9D1D47792EF39C4C59B20
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction ID: 5be6fbadabfa398e5c5c06da23e062949b7ae7d32590008ef573cc00081c362b
                          • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction Fuzzy Hash: 6B11B231350BC182E7508B13E84831972A4F388FE4F45022AEA5EC7796CF38C4948BA1
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: dialer
                          • API String ID: 756756679-3528709123
                          • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction ID: 186717381455e3181557c70e4b3e181aab8ff8ec6f9d2597f1690986fa17b43e
                          • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction Fuzzy Hash: 6931C522741B92C3EB54DF17E54872967A1FB44BC0F4A402AAE4847B97EF34C4E18B60
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Value$ErrorLast
                          • String ID:
                          • API String ID: 2506987500-0
                          • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction ID: 88b896e7da52e95fd00ccff7768d99056a53124772a0c671c365fb61c8ceb8e1
                          • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction Fuzzy Hash: 92115E203912C242FA65A733D55D3292185BB447F4F16072EA836467D7DF7884C28F30
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction ID: 715ac3fdfa83c77bb0e460137307d450772adbe10476670a3786bf80235cc521
                          • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction Fuzzy Hash: 17012D21340A8282EB54DB53E45C75963A5F788BC5FCA403AEE5A83756DF3CC989CB50
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction ID: c6f769b54c004a354a452a2a46bf369459501ef8588b7fa1b2b20c3275c221d8
                          • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction Fuzzy Hash: 69016D6475178282FB249B23E80C71523B0FB49B82F96082EDD4947766EF3CC1888F20
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 2395640692-629598281
                          • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                          • Instruction ID: e9dc35c7a832d2cc683b6cd1fa1022522abd5526910dd1348563b3731bf2def8
                          • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                          • Instruction Fuzzy Hash: 1851C33274169286EB54CF26E84CB693796F344BC8F52852EDA064778ADB35DCC1CF20
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction ID: 412175bfc77c0f7889df0d48bc3560869d283f7d8297d7432b8b3449444d2e85
                          • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction Fuzzy Hash: 09F04F223446C292EB608B22F99875967A5F748BC9FC5402ADA498695ADF3CC6CDCF10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction ID: c358c5bd6c370e4e94212374ef1c3ac1b27339a5d47b43ba3a3d7addd493d33b
                          • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction Fuzzy Hash: 44F08260354BC682EA008B13F91C119A261BB48FC0F85403AEE4A87B2ADF3CC4C58B21
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction ID: 25295f8d8ab3043a6409b7c076f3c8c014371e5dc60beb8abb4c75a9d3b53d50
                          • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction Fuzzy Hash: 27F0966135178691EB108B26E45C3696331FB84BE1F95031FDA6A861F6DF3CC4C5CB61
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                          • Instruction ID: 899714654cfee5a0a87d9affd5898931fb4ed2655e43b4f37e6fe9002d5fc822
                          • Opcode Fuzzy Hash: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                          • Instruction Fuzzy Hash: 4761E736559BC6C7E760DB16E44831AB7E4F388784F52011AEA8E47BAADB7CC590CF10
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2715128142.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991720000_winlogon.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: 6fce0c9865f46e94ad79d61300e9938692d5aaaf41cf770363b3baa4ae580780
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: 7B11A323BD0AD315FAB4153BF44D36911807B58374F6B862FA9760A2D7CA28CBC34A30
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: 8833cec01b3b712e7df5753de1625ed22ad95ee90a5c308719c3cffe9809f191
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: 1B11E322BD0AC3A5F66F156AD45D36911407B783F8F1B062FA977876D7CA24C8C08A23
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2715128142.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991720000_winlogon.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: Tuesday$Wednesday$or copy constructor iterator'
                          • API String ID: 3215553584-4202648911
                          • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction ID: 27c43efc3ebcb98436fdd8ae9cc1473d170633621c7fc37e2b7ea1367af98575
                          • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction Fuzzy Hash: 1E61B3625866C642F7658B6BE54C32E26E1F746740FA34C1FCA0A177A7DA34C9C38B30
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: c265801518a2bdb581e286e63e256228ab63efdfaaa28672a2b32cc6fb03c2c2
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: CE619F33600B858AEB20DF66D4843AD77B0F344B8CF05462AEF4917B9ADB38C595CB50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2715128142.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991720000_winlogon.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: f3086e5e95a6481f7f96e1afe717cc730f762cabb17a0b2f305e154ee185ea95
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: 1A518D321453C2CAEB648B16D44835877A0F395B94F1A491BDA8987BD7CB78D4D2CF10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: 446d1a1c64522073db0cd5d5834e42522880cf304d97d4b8b40f77ecf9adbd4b
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: DE515E721803C28BEB648B27E58835977A0F354B95F1A512FDA9947BDACB38D4D1CF10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2715128142.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991720000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction ID: 310a40da76a7e8494b2a523292ada4b4d5fdfe551cf15d0e710db459a0c84222
                          • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction Fuzzy Hash: 5C51D63274228287EB14CF17E408B1837D5F354B98F62892EDA564374EE736C9C28F24
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2715128142.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991720000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction ID: 4d9fb923a024668931dd26515bb1f8222d8a35d90d0c19900a676a0e9de2e7fc
                          • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction Fuzzy Hash: 6D31A23124278197E714DF13E84871977E4F744B98F16891EEE9A0778ADB39CA82CF24
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction ID: d17a5b66f24651ba47f914fd9a9177c7c4c5eae1cb0dd37e5dc1cb50b43e6a1d
                          • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction Fuzzy Hash: 0DD10132B14AC18AE751CFBAD4483DC3BB1F3547D8F12821ACE5997B9ADA34C486CB51
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction ID: 958daf10776be36ad14651f8af9b4503ca9b67d81655b7db465c2faf28d38bcd
                          • Opcode Fuzzy Hash: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction Fuzzy Hash: F4015E32641BD1C6D708DF67E90814A77A0F788FC5F85442AEA4A9371ADF38C091CB91
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: ConsoleErrorLastMode
                          • String ID:
                          • API String ID: 953036326-0
                          • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction ID: dea98d673b1eb583a7a563bef56f37ee4aaf8a9f40eb06f1ad15a2b81e6a3132
                          • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction Fuzzy Hash: BD91C3727546D285F7A09F66D4483AD3BA0F744BC8F56410FDE0AA7A96DB34C4C2CB22
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction ID: 4a3cbd926c2ff67caed56cc86b37f60de1dd5d3bcd68790c06f0eef6869e381a
                          • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction Fuzzy Hash: 31117322750F418AEB00CF61E8593A833B4F318758F850E26EA6D82795DF78C194C790
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction ID: 1f9f842b75453c5857f6b2e56ffc77b939292a8ca7035f958eb5257443a8da6b
                          • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction Fuzzy Hash: EE71B4362407C2C6E765DF27D8483AA6794F389B84F46042FDE0A53B9ADF35C685CB20
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2715128142.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991720000_winlogon.jbxd
                          Similarity
                          • API ID: CallTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3163161869-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: 84d4d0f52c9fe8424e130a51802f206c56cb391b230e05c660d89bf47d82b7fc
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: E6618633601B858AE720DF66D4443AD77B0F348B88F09451AEF4917B99DB38D596CB10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction ID: f62a7e3c712747ec3032839da713c06c279082095f181f860e761592c369468b
                          • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction Fuzzy Hash: 4A51F8326843C3C1E6749A2BE05C36A6B61F385784F56012FDD9A03B5BDB39C984CFA0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction ID: 3c3291cdee80793f077ca875b2c93d8f285802d27222ba8780e6ad337528432c
                          • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction Fuzzy Hash: 8541D532755B8282DB60CF26E8487A977A0F3987D4F92402AEE4DC7785EB3CC481CB51
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction ID: 207757b0be7941945bbc5168ef3fd331411ff0e9450000233a5a2120af0f3481
                          • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction Fuzzy Hash: 01114F32215B8182EB618F16F44435A77E5F788B98F594229EF8C47759EF3CC591CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2715128142.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991720000_winlogon.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: ierarchy Descriptor'$riptor at (
                          • API String ID: 592178966-758928094
                          • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction ID: a257186f3850c7b0ed0a211b5e55a5bcdb9ea12776083c4015b6f529102d0367
                          • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction Fuzzy Hash: 16E08661681B8990DF018F62E84429833A0EB59B64B499123995C06312FA38D2FAC720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000017.00000002.2715128142.000002E991720000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991720000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991720000_winlogon.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: Locator'$riptor at (
                          • API String ID: 592178966-4215709766
                          • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction ID: 666d30d5e13efd7c2989cd14f499e6fcad5fce96985e36ef4ac7ff9aefadf28a
                          • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction Fuzzy Hash: CFE0CD61641B89C0DF018F62E44019873A0F759B54F8AD123CD4C07312FB38D2E6C720
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction ID: d4a5e8aca712c33a79de3256f17f9e0da43bbae3851e7c4569dd7d8c7212e1c3
                          • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction Fuzzy Hash: FD119125641B8581EA44DB67E40C22973A1FB89FC1F5A402EDE4E93767DF39C482C750
                          APIs
                          Memory Dump Source
                          • Source File: 00000017.00000002.2716006104.000002E991750000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002E991750000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_23_2_2e991750000_winlogon.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction ID: 1436bcb16dbf9b340cef29a2e619caaeb5be8261704b43b7e2ccef2ff9d21f13
                          • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction Fuzzy Hash: 9EE06D35641645C7EB088F63D80C34A36E1FB89F86F86C028C90987352DF7D84D9CBA1

                          Execution Graph

                          Execution Coverage:0.9%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:142
                          Total number of Limit Nodes:10
                          execution_graph 15400 213bdcb273c 15402 213bdcb276a 15400->15402 15401 213bdcb2858 LoadLibraryA 15401->15402 15402->15401 15403 213bdcb28d4 15402->15403 15404 213bdce1abc 15410 213bdce1628 GetProcessHeap 15404->15410 15406 213bdce1ad2 Sleep SleepEx 15408 213bdce1acb 15406->15408 15408->15406 15409 213bdce1598 StrCmpIW StrCmpW 15408->15409 15462 213bdce18b4 15408->15462 15409->15408 15411 213bdce1648 Concurrency::details::SchedulerProxy::DeleteThis 15410->15411 15479 213bdce1268 GetProcessHeap 15411->15479 15413 213bdce1650 15483 213bdce1000 GetProcessHeap 15413->15483 15415 213bdce1658 15416 213bdce1268 2 API calls 15415->15416 15417 213bdce1661 15416->15417 15418 213bdce1268 2 API calls 15417->15418 15419 213bdce166a 15418->15419 15420 213bdce1268 2 API calls 15419->15420 15421 213bdce1673 15420->15421 15422 213bdce1000 2 API calls 15421->15422 15423 213bdce167c 15422->15423 15424 213bdce1000 2 API calls 15423->15424 15425 213bdce1685 15424->15425 15426 213bdce1000 2 API calls 15425->15426 15427 213bdce168e RegOpenKeyExW 15426->15427 15428 213bdce16c0 RegOpenKeyExW 15427->15428 15429 213bdce18a6 15427->15429 15430 213bdce16ff RegOpenKeyExW 15428->15430 15431 213bdce16e9 15428->15431 15429->15408 15433 213bdce173a RegOpenKeyExW 15430->15433 15434 213bdce1723 15430->15434 15487 213bdce12bc RegQueryInfoKeyW 15431->15487 15435 213bdce175e 15433->15435 15436 213bdce1775 RegOpenKeyExW 15433->15436 15498 213bdce104c RegQueryInfoKeyW 15434->15498 15440 213bdce12bc 11 API calls 15435->15440 15441 213bdce17b0 RegOpenKeyExW 15436->15441 15442 213bdce1799 15436->15442 15437 213bdce16f5 RegCloseKey 15437->15430 15443 213bdce176b RegCloseKey 15440->15443 15445 213bdce17eb RegOpenKeyExW 15441->15445 15446 213bdce17d4 15441->15446 15444 213bdce12bc 11 API calls 15442->15444 15443->15436 15447 213bdce17a6 RegCloseKey 15444->15447 15449 213bdce180f 15445->15449 15450 213bdce1826 RegOpenKeyExW 15445->15450 15448 213bdce12bc 11 API calls 15446->15448 15447->15441 15453 213bdce17e1 RegCloseKey 15448->15453 15454 213bdce104c 4 API calls 15449->15454 15451 213bdce1861 RegOpenKeyExW 15450->15451 15452 213bdce184a 15450->15452 15457 213bdce189c RegCloseKey 15451->15457 15458 213bdce1885 15451->15458 15456 213bdce104c 4 API calls 15452->15456 15453->15445 15455 213bdce181c RegCloseKey 15454->15455 15455->15450 15459 213bdce1857 RegCloseKey 15456->15459 15457->15429 15460 213bdce104c 4 API calls 15458->15460 15459->15451 15461 213bdce1892 RegCloseKey 15460->15461 15461->15457 15511 213bdce14a4 15462->15511 15504 213bdcf6168 15479->15504 15482 213bdce12ae Concurrency::details::SchedulerProxy::DeleteThis 15482->15413 15484 213bdcf6168 Concurrency::details::SchedulerProxy::DeleteThis 15483->15484 15485 213bdce101b GetProcessHeap 15484->15485 15486 213bdce103d Concurrency::details::SchedulerProxy::DeleteThis 15485->15486 15486->15415 15488 213bdce148a Concurrency::details::SchedulerProxy::DeleteThis 15487->15488 15489 213bdce1327 GetProcessHeap 15487->15489 15488->15437 15495 213bdce133e Concurrency::details::SchedulerProxy::DeleteThis 15489->15495 15490 213bdce1352 RegEnumValueW 15490->15495 15491 213bdce1476 GetProcessHeap 15491->15488 15493 213bdce141e lstrlenW GetProcessHeap 15493->15495 15494 213bdce13d3 GetProcessHeap 15494->15495 15495->15490 15495->15491 15495->15493 15495->15494 15496 213bdce13f3 GetProcessHeap 15495->15496 15497 213bdce1443 StrCpyW 15495->15497 15506 213bdce152c 15495->15506 15496->15495 15497->15495 15499 213bdce10bf Concurrency::details::SchedulerProxy::DeleteThis 15498->15499 15500 213bdce11b5 RegCloseKey 15498->15500 15499->15500 15501 213bdce10cf RegEnumValueW 15499->15501 15502 213bdce114e GetProcessHeap 15499->15502 15503 213bdce116e GetProcessHeap 15499->15503 15500->15433 15501->15499 15502->15499 15503->15499 15505 213bdce1283 GetProcessHeap 15504->15505 15505->15482 15507 213bdce1546 15506->15507 15508 213bdce157c 15506->15508 15507->15508 15509 213bdce155d StrCmpIW 15507->15509 15510 213bdce1565 StrCmpW 15507->15510 15508->15495 15509->15507 15510->15507 15512 213bdce14e1 GetProcessHeap 15511->15512 15513 213bdce14c1 GetProcessHeap 15511->15513 15517 213bdcf6180 15512->15517 15514 213bdce14da Concurrency::details::SchedulerProxy::DeleteThis 15513->15514 15514->15512 15514->15513 15518 213bdce14f6 GetProcessHeap HeapFree 15517->15518 15519 213bdce253c 15520 213bdce25bb 15519->15520 15521 213bdce261d GetFileType 15520->15521 15533 213bdce27aa 15520->15533 15522 213bdce2641 15521->15522 15523 213bdce262b StrCpyW 15521->15523 15535 213bdce1a40 GetFinalPathNameByHandleW 15522->15535 15524 213bdce2650 15523->15524 15529 213bdce265a 15524->15529 15530 213bdce26ff 15524->15530 15527 213bdce3844 StrCmpNIW 15527->15530 15529->15533 15540 213bdce3844 15529->15540 15543 213bdce3044 StrCmpIW 15529->15543 15547 213bdce1cac 15529->15547 15530->15527 15532 213bdce3044 4 API calls 15530->15532 15530->15533 15534 213bdce1cac 2 API calls 15530->15534 15532->15530 15534->15530 15536 213bdce1aa9 15535->15536 15537 213bdce1a6a StrCmpNIW 15535->15537 15536->15524 15537->15536 15538 213bdce1a84 lstrlenW 15537->15538 15538->15536 15539 213bdce1a96 StrCpyW 15538->15539 15539->15536 15541 213bdce3851 StrCmpNIW 15540->15541 15542 213bdce3866 15540->15542 15541->15542 15542->15529 15544 213bdce308d PathCombineW 15543->15544 15545 213bdce3076 StrCpyW StrCatW 15543->15545 15546 213bdce3096 15544->15546 15545->15546 15546->15529 15548 213bdce1ccc 15547->15548 15549 213bdce1cc3 15547->15549 15548->15529 15550 213bdce152c 2 API calls 15549->15550 15550->15548 15551 213bdce202c 15552 213bdce205d 15551->15552 15553 213bdce213e 15552->15553 15554 213bdce2173 15552->15554 15560 213bdce2081 15552->15560 15555 213bdce21e7 15554->15555 15556 213bdce2178 15554->15556 15555->15553 15559 213bdce2f04 7 API calls 15555->15559 15569 213bdce2f04 GetProcessHeap 15556->15569 15558 213bdce20b9 StrCmpNIW 15558->15560 15559->15553 15560->15553 15560->15558 15562 213bdce1bf4 15560->15562 15563 213bdce1c1b GetProcessHeap 15562->15563 15567 213bdce1c8b Concurrency::details::SchedulerProxy::DeleteThis 15562->15567 15564 213bdce1c41 Concurrency::details::SchedulerProxy::DeleteThis 15563->15564 15565 213bdce1c77 GetProcessHeap 15564->15565 15566 213bdce152c 2 API calls 15564->15566 15564->15567 15565->15567 15568 213bdce1c6e 15566->15568 15567->15560 15568->15565 15575 213bdce2f40 Concurrency::details::SchedulerProxy::DeleteThis 15569->15575 15570 213bdce3015 GetProcessHeap 15571 213bdce3029 Concurrency::details::SchedulerProxy::DeleteThis 15570->15571 15571->15553 15572 213bdce3010 15572->15570 15573 213bdce2fa2 StrCmpNIW 15573->15575 15574 213bdce1bf4 4 API calls 15574->15575 15575->15570 15575->15572 15575->15573 15575->15574

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5 213bdce253c-213bdce25c0 call 213bdd02cc0 8 213bdce27d8-213bdce27fb 5->8 9 213bdce25c6-213bdce25c9 5->9 9->8 10 213bdce25cf-213bdce25dd 9->10 10->8 11 213bdce25e3-213bdce2629 call 213bdce8c60 * 3 GetFileType 10->11 18 213bdce2641-213bdce264b call 213bdce1a40 11->18 19 213bdce262b-213bdce263f StrCpyW 11->19 20 213bdce2650-213bdce2654 18->20 19->20 22 213bdce26ff-213bdce2704 20->22 23 213bdce265a-213bdce2673 call 213bdce30a8 call 213bdce3844 20->23 24 213bdce2707-213bdce270c 22->24 36 213bdce26aa-213bdce26f4 call 213bdd02cc0 23->36 37 213bdce2675-213bdce26a4 call 213bdce30a8 call 213bdce3044 call 213bdce1cac 23->37 26 213bdce270e-213bdce2711 24->26 27 213bdce2729 24->27 26->27 29 213bdce2713-213bdce2716 26->29 31 213bdce272c-213bdce2745 call 213bdce30a8 call 213bdce3844 27->31 29->27 32 213bdce2718-213bdce271b 29->32 46 213bdce2787-213bdce2789 31->46 47 213bdce2747-213bdce2776 call 213bdce30a8 call 213bdce3044 call 213bdce1cac 31->47 32->27 35 213bdce271d-213bdce2720 32->35 35->27 40 213bdce2722-213bdce2727 35->40 36->8 48 213bdce26fa 36->48 37->8 37->36 40->27 40->31 51 213bdce278b-213bdce27a5 46->51 52 213bdce27aa-213bdce27ad 46->52 47->46 69 213bdce2778-213bdce2783 47->69 48->23 51->24 55 213bdce27af-213bdce27b5 52->55 56 213bdce27b7-213bdce27ba 52->56 55->8 59 213bdce27bc-213bdce27bf 56->59 60 213bdce27d5 56->60 59->60 62 213bdce27c1-213bdce27c4 59->62 60->8 62->60 64 213bdce27c6-213bdce27c9 62->64 64->60 66 213bdce27cb-213bdce27ce 64->66 66->60 68 213bdce27d0-213bdce27d3 66->68 68->8 68->60 69->8 70 213bdce2785 69->70 70->24
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction ID: 402ccc82d5c6591d2abd376835e1d3f6cc6d53c76c666844c3b5344b78894b12
                          • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction Fuzzy Hash: 1371C6B620879987EF24DF25D8483EAA796F3A978CF540036DD0943B89FE36D7458700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 76 213bdce202c-213bdce2057 call 213bdd02d00 78 213bdce205d-213bdce2066 76->78 79 213bdce206f-213bdce2072 78->79 80 213bdce2068-213bdce206c 78->80 81 213bdce2078-213bdce207b 79->81 82 213bdce2223-213bdce2243 79->82 80->79 83 213bdce2081-213bdce2093 81->83 84 213bdce2173-213bdce2176 81->84 83->82 85 213bdce2099-213bdce20a5 83->85 86 213bdce21e7-213bdce21ea 84->86 87 213bdce2178-213bdce2192 call 213bdce2f04 84->87 88 213bdce20a7-213bdce20b7 85->88 89 213bdce20d3-213bdce20de call 213bdce1bbc 85->89 86->82 90 213bdce21ec-213bdce21ff call 213bdce2f04 86->90 87->82 99 213bdce2198-213bdce21ae 87->99 88->89 92 213bdce20b9-213bdce20d1 StrCmpNIW 88->92 96 213bdce20ff-213bdce2111 89->96 101 213bdce20e0-213bdce20f8 call 213bdce1bf4 89->101 90->82 100 213bdce2201-213bdce2209 90->100 92->89 92->96 102 213bdce2121-213bdce2123 96->102 103 213bdce2113-213bdce2115 96->103 99->82 104 213bdce21b0-213bdce21cc 99->104 100->82 105 213bdce220b-213bdce2213 100->105 101->96 118 213bdce20fa-213bdce20fd 101->118 109 213bdce212a 102->109 110 213bdce2125-213bdce2128 102->110 107 213bdce211c-213bdce211f 103->107 108 213bdce2117-213bdce211a 103->108 111 213bdce21d0-213bdce21e3 104->111 114 213bdce2216-213bdce2221 105->114 112 213bdce212d-213bdce2130 107->112 108->112 109->112 110->112 111->111 113 213bdce21e5 111->113 116 213bdce2132-213bdce2138 112->116 117 213bdce213e-213bdce2141 112->117 113->82 114->82 114->114 116->85 116->117 117->82 119 213bdce2147-213bdce214b 117->119 118->112 120 213bdce2162-213bdce216e 119->120 121 213bdce214d-213bdce2150 119->121 120->82 121->82 122 213bdce2156-213bdce215b 121->122 122->119 123 213bdce215d 122->123 123->82
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: S$dialer
                          • API String ID: 756756679-3873981283
                          • Opcode ID: 10a6181ad89868b013f95f8d430f86fb0b73c76b57149a1256a42c526e771eaa
                          • Instruction ID: 01a705c1139b4e3a3236aaa51ba8ea78d077b3526d5db40ec5641de093292221
                          • Opcode Fuzzy Hash: 10a6181ad89868b013f95f8d430f86fb0b73c76b57149a1256a42c526e771eaa
                          • Instruction Fuzzy Hash: C951B2B2B1862887EF61CF25D8487EDA3E6F72879CF459021DE0552B85EB36EB51C300

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction ID: 9a3ceae17c6c449fcd09eca06c2232397e8d057c9f4e4c09271c551668b01824
                          • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction Fuzzy Hash: 4AF0317230864592EF70CB21E8887D96762F768B9CF945020DA494A558EB3DC74DCB00

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: 5b325dc3880ca3c93f8f4c7f4460fba72f6c1ea06a067b14687c409243df247f
                          • Instruction ID: f613eb4a6c9d5595687b5f6d6db476b834a7316b017e4d15599aea490d94b422
                          • Opcode Fuzzy Hash: 5b325dc3880ca3c93f8f4c7f4460fba72f6c1ea06a067b14687c409243df247f
                          • Instruction Fuzzy Hash: 5FE0ED7565160486EB08DB62D8082DA76B2FB98B1AF44C024C9090B315EE3A8699C610

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                          • String ID:
                          • API String ID: 1683269324-0
                          • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction ID: 5d40ba2aa3b61c65a6b29e875bc405932eba3ae14eb689a115a8dbd4c5664118
                          • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction Fuzzy Hash: 3411E1B161CA0883FF20D720F80DBE92297ABB430EF5001389946451A6FF3BF3488254

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00000213BDCE1628: GetProcessHeap.KERNEL32 ref: 00000213BDCE1633
                            • Part of subcall function 00000213BDCE1628: HeapAlloc.KERNEL32 ref: 00000213BDCE1642
                            • Part of subcall function 00000213BDCE1628: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE16B2
                            • Part of subcall function 00000213BDCE1628: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE16DF
                            • Part of subcall function 00000213BDCE1628: RegCloseKey.ADVAPI32 ref: 00000213BDCE16F9
                            • Part of subcall function 00000213BDCE1628: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE1719
                            • Part of subcall function 00000213BDCE1628: RegCloseKey.ADVAPI32 ref: 00000213BDCE1734
                            • Part of subcall function 00000213BDCE1628: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE1754
                            • Part of subcall function 00000213BDCE1628: RegCloseKey.ADVAPI32 ref: 00000213BDCE176F
                            • Part of subcall function 00000213BDCE1628: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE178F
                            • Part of subcall function 00000213BDCE1628: RegCloseKey.ADVAPI32 ref: 00000213BDCE17AA
                            • Part of subcall function 00000213BDCE1628: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE17CA
                          • Sleep.KERNEL32 ref: 00000213BDCE1AD7
                          • SleepEx.KERNELBASE ref: 00000213BDCE1ADD
                            • Part of subcall function 00000213BDCE1628: RegCloseKey.ADVAPI32 ref: 00000213BDCE17E5
                            • Part of subcall function 00000213BDCE1628: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE1805
                            • Part of subcall function 00000213BDCE1628: RegCloseKey.ADVAPI32 ref: 00000213BDCE1820
                            • Part of subcall function 00000213BDCE1628: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE1840
                            • Part of subcall function 00000213BDCE1628: RegCloseKey.ADVAPI32 ref: 00000213BDCE185B
                            • Part of subcall function 00000213BDCE1628: RegOpenKeyExW.ADVAPI32 ref: 00000213BDCE187B
                            • Part of subcall function 00000213BDCE1628: RegCloseKey.ADVAPI32 ref: 00000213BDCE1896
                            • Part of subcall function 00000213BDCE1628: RegCloseKey.ADVAPI32 ref: 00000213BDCE18A0
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: CloseOpen$HeapSleep$AllocProcess
                          • String ID:
                          • API String ID: 1534210851-0
                          • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction ID: 5c1e5f493c3240c0c1d6ba6cc6eea2f3c80886ee07ec0849ec39ecbda1c65d01
                          • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction Fuzzy Hash: 2D31F0F120964943FF50DB26DA593E913A6ABA4BCCF0474319E098B695FE36E771C310

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 181 213bdcb273c-213bdcb27a4 call 213bdcb29d4 * 4 190 213bdcb29b2 181->190 191 213bdcb27aa-213bdcb27ad 181->191 193 213bdcb29b4-213bdcb29d0 190->193 191->190 192 213bdcb27b3-213bdcb27b6 191->192 192->190 194 213bdcb27bc-213bdcb27bf 192->194 194->190 195 213bdcb27c5-213bdcb27e6 194->195 195->190 197 213bdcb27ec-213bdcb280c 195->197 198 213bdcb280e-213bdcb2836 197->198 199 213bdcb2838-213bdcb283f 197->199 198->198 198->199 200 213bdcb28df-213bdcb28e6 199->200 201 213bdcb2845-213bdcb2852 199->201 203 213bdcb28ec-213bdcb2901 200->203 204 213bdcb2992-213bdcb29b0 200->204 201->200 202 213bdcb2858-213bdcb286a LoadLibraryA 201->202 205 213bdcb286c-213bdcb2878 202->205 206 213bdcb28ca-213bdcb28d2 202->206 203->204 207 213bdcb2907 203->207 204->193 208 213bdcb28c5-213bdcb28c8 205->208 206->202 209 213bdcb28d4-213bdcb28d9 206->209 211 213bdcb290d-213bdcb2921 207->211 208->206 212 213bdcb287a-213bdcb287d 208->212 209->200 213 213bdcb2982-213bdcb298c 211->213 214 213bdcb2923-213bdcb2934 211->214 217 213bdcb287f-213bdcb28a5 212->217 218 213bdcb28a7-213bdcb28b7 212->218 213->204 213->211 215 213bdcb293f-213bdcb2943 214->215 216 213bdcb2936-213bdcb293d 214->216 221 213bdcb294d-213bdcb2951 215->221 222 213bdcb2945-213bdcb294b 215->222 220 213bdcb2970-213bdcb2980 216->220 223 213bdcb28ba-213bdcb28c1 217->223 218->223 220->213 220->214 224 213bdcb2963-213bdcb2967 221->224 225 213bdcb2953-213bdcb2961 221->225 222->220 223->208 224->220 227 213bdcb2969-213bdcb296c 224->227 225->220 227->220
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736461371.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdcb0000_lsass.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction ID: 62858d15b17bcbc33b2ca6a6066d80486455f950e6546258cbebb37c44571cfa
                          • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction Fuzzy Hash: AF61E132B4969887EF54CF1590087ADB3A3F764BACF588125DE5D07788EA3ADA53C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 489 213bdce2b2c-213bdce2ba5 call 213bdd02ce0 492 213bdce2ee0-213bdce2f03 489->492 493 213bdce2bab-213bdce2bb1 489->493 493->492 494 213bdce2bb7-213bdce2bba 493->494 494->492 495 213bdce2bc0-213bdce2bc3 494->495 495->492 496 213bdce2bc9-213bdce2bd9 GetModuleHandleA 495->496 497 213bdce2bed 496->497 498 213bdce2bdb-213bdce2beb GetProcAddress 496->498 499 213bdce2bf0-213bdce2c0e 497->499 498->499 499->492 501 213bdce2c14-213bdce2c33 StrCmpNIW 499->501 501->492 502 213bdce2c39-213bdce2c3d 501->502 502->492 503 213bdce2c43-213bdce2c4d 502->503 503->492 504 213bdce2c53-213bdce2c5a 503->504 504->492 505 213bdce2c60-213bdce2c73 504->505 506 213bdce2c75-213bdce2c81 505->506 507 213bdce2c83 505->507 508 213bdce2c86-213bdce2c8a 506->508 507->508 509 213bdce2c8c-213bdce2c98 508->509 510 213bdce2c9a 508->510 511 213bdce2c9d-213bdce2ca7 509->511 510->511 512 213bdce2d9d-213bdce2da1 511->512 513 213bdce2cad-213bdce2cb0 511->513 514 213bdce2ed2-213bdce2eda 512->514 515 213bdce2da7-213bdce2daa 512->515 516 213bdce2cc2-213bdce2ccc 513->516 517 213bdce2cb2-213bdce2cbf call 213bdce199c 513->517 514->492 514->505 521 213bdce2dbb-213bdce2dc5 515->521 522 213bdce2dac-213bdce2db8 call 213bdce199c 515->522 519 213bdce2d00-213bdce2d0a 516->519 520 213bdce2cce-213bdce2cdb 516->520 517->516 525 213bdce2d0c-213bdce2d19 519->525 526 213bdce2d3a-213bdce2d3d 519->526 520->519 524 213bdce2cdd-213bdce2cea 520->524 528 213bdce2dc7-213bdce2dd4 521->528 529 213bdce2df5-213bdce2df8 521->529 522->521 533 213bdce2ced-213bdce2cf3 524->533 525->526 534 213bdce2d1b-213bdce2d28 525->534 535 213bdce2d3f-213bdce2d49 call 213bdce1bbc 526->535 536 213bdce2d4b-213bdce2d58 lstrlenW 526->536 528->529 530 213bdce2dd6-213bdce2de3 528->530 531 213bdce2dfa-213bdce2e03 call 213bdce1bbc 529->531 532 213bdce2e05-213bdce2e12 lstrlenW 529->532 538 213bdce2de6-213bdce2dec 530->538 531->532 549 213bdce2e4a-213bdce2e55 531->549 544 213bdce2e35-213bdce2e3f call 213bdce3844 532->544 545 213bdce2e14-213bdce2e1e 532->545 542 213bdce2cf9-213bdce2cfe 533->542 543 213bdce2d93-213bdce2d98 533->543 546 213bdce2d2b-213bdce2d31 534->546 535->536 535->543 539 213bdce2d7b-213bdce2d8d call 213bdce3844 536->539 540 213bdce2d5a-213bdce2d64 536->540 548 213bdce2dee-213bdce2df3 538->548 538->549 539->543 553 213bdce2e42-213bdce2e44 539->553 540->539 550 213bdce2d66-213bdce2d79 call 213bdce152c 540->550 542->519 542->533 543->553 544->553 545->544 554 213bdce2e20-213bdce2e33 call 213bdce152c 545->554 546->543 555 213bdce2d33-213bdce2d38 546->555 548->529 548->538 558 213bdce2ecc-213bdce2ed0 549->558 559 213bdce2e57-213bdce2e5b 549->559 550->539 550->543 553->514 553->549 554->544 554->549 555->526 555->546 558->514 564 213bdce2e5d-213bdce2e61 559->564 565 213bdce2e63-213bdce2e7d call 213bdce85c0 559->565 564->565 568 213bdce2e80-213bdce2e83 564->568 565->568 571 213bdce2e85-213bdce2ea3 call 213bdce85c0 568->571 572 213bdce2ea6-213bdce2ea9 568->572 571->572 572->558 574 213bdce2eab-213bdce2ec9 call 213bdce85c0 572->574 574->558
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction ID: 5807444a8450fc688cd656404e5327faf8bf80d9ed4d8e3fcbe0e129d3a2233c
                          • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction Fuzzy Hash: 16B190B2219A9883EF65CF25D4487E9A3A6FB68B8DF445026DE0953794FB36DF40C340
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction ID: b5ca2973510a18e9044a362400021c8bf4fd35d0e5851b09ad40746068c8bd5a
                          • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction Fuzzy Hash: E9311772209A848AEB60DF60E8847EE7366F79474CF44442ADA4E57A98EF39C748C710
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction ID: 8c31cb887ca66331edc06f01b646ec043365c389dcc0a630b6fed02098722ee4
                          • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction Fuzzy Hash: 6B319E76218B8086EB60CF25E8443DE73A1F79975CF500126EA9D47B99EF39C75ACB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 2135414181-2879589442
                          • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction ID: 9ce6f8576089a91c0a41a3022284374a307a37465a46bb01b2766921063186a7
                          • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction Fuzzy Hash: BE712A76318A5486EF10DF22E848AD923A6F7A4B8CF402121DE4E47B6DEF36C758C744

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction ID: 7e46c3b6a7d5331c3c7ee4b2a60feacf72bead3f45980719ba22298b4a17c25e
                          • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction Fuzzy Hash: 42514D76208B8487EB54CF62E5483DA77A2F799F9DF448124DA4A0B758EF3DC259CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: CurrentThread$AddressHandleModuleProc
                          • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                          • API String ID: 4175298099-1975688563
                          • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction ID: 8f728ad5951c134e967336f2fc31f6c713d23b700de02865da5b7b8926e8932e
                          • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction Fuzzy Hash: D431E3B411998EA2EF01EF65EC697D4A323BB7435CF801023A44D0656AFF7A934DC391

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 331 213bdcb6910-213bdcb6916 332 213bdcb6951-213bdcb695b 331->332 333 213bdcb6918-213bdcb691b 331->333 336 213bdcb6a78-213bdcb6a8d 332->336 334 213bdcb691d-213bdcb6920 333->334 335 213bdcb6945-213bdcb6984 call 213bdcb6fc0 333->335 337 213bdcb6922-213bdcb6925 334->337 338 213bdcb6938 __scrt_dllmain_crt_thread_attach 334->338 351 213bdcb6a52 335->351 352 213bdcb698a-213bdcb699f call 213bdcb6e54 335->352 339 213bdcb6a9c-213bdcb6ab6 call 213bdcb6e54 336->339 340 213bdcb6a8f 336->340 342 213bdcb6931-213bdcb6936 call 213bdcb6f04 337->342 343 213bdcb6927-213bdcb6930 337->343 346 213bdcb693d-213bdcb6944 338->346 354 213bdcb6aef-213bdcb6b20 call 213bdcb7190 339->354 355 213bdcb6ab8-213bdcb6aed call 213bdcb6f7c call 213bdcb6e1c call 213bdcb7318 call 213bdcb7130 call 213bdcb7154 call 213bdcb6fac 339->355 344 213bdcb6a91-213bdcb6a9b 340->344 342->346 356 213bdcb6a54-213bdcb6a69 351->356 363 213bdcb69a5-213bdcb69b6 call 213bdcb6ec4 352->363 364 213bdcb6a6a-213bdcb6a77 call 213bdcb7190 352->364 365 213bdcb6b22-213bdcb6b28 354->365 366 213bdcb6b31-213bdcb6b37 354->366 355->344 384 213bdcb69b8-213bdcb69dc call 213bdcb72dc call 213bdcb6e0c call 213bdcb6e38 call 213bdcbac0c 363->384 385 213bdcb6a07-213bdcb6a11 call 213bdcb7130 363->385 364->336 365->366 370 213bdcb6b2a-213bdcb6b2c 365->370 371 213bdcb6b7e-213bdcb6b94 call 213bdcb268c 366->371 372 213bdcb6b39-213bdcb6b43 366->372 378 213bdcb6c1f-213bdcb6c2c 370->378 392 213bdcb6bcc-213bdcb6bce 371->392 393 213bdcb6b96-213bdcb6b98 371->393 379 213bdcb6b4f-213bdcb6b5d call 213bdcc5780 372->379 380 213bdcb6b45-213bdcb6b4d 372->380 381 213bdcb6b63-213bdcb6b78 call 213bdcb6910 379->381 397 213bdcb6c15-213bdcb6c1d 379->397 380->381 381->371 381->397 384->385 433 213bdcb69de-213bdcb69e5 __scrt_dllmain_after_initialize_c 384->433 385->351 404 213bdcb6a13-213bdcb6a1f call 213bdcb7180 385->404 394 213bdcb6bd0-213bdcb6bd3 392->394 395 213bdcb6bd5-213bdcb6bea call 213bdcb6910 392->395 393->392 401 213bdcb6b9a-213bdcb6bbc call 213bdcb268c call 213bdcb6a78 393->401 394->395 394->397 395->397 413 213bdcb6bec-213bdcb6bf6 395->413 397->378 401->392 428 213bdcb6bbe-213bdcb6bc6 call 213bdcc5780 401->428 421 213bdcb6a21-213bdcb6a2b call 213bdcb7098 404->421 422 213bdcb6a45-213bdcb6a50 404->422 418 213bdcb6c01-213bdcb6c11 call 213bdcc5780 413->418 419 213bdcb6bf8-213bdcb6bff 413->419 418->397 419->397 421->422 434 213bdcb6a2d-213bdcb6a3b 421->434 422->356 428->392 433->385 435 213bdcb69e7-213bdcb6a04 call 213bdcbabc8 433->435 434->422 435->385
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736461371.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdcb0000_lsass.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                          • API String ID: 190073905-1786718095
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: f8cd9e1dbe3062c5f4ba020bde542ea39c0e4a61bba442b43b9d51f3a524e4ca
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: 0781F4317DC24986FE50EB25D4493D966A3E7B4B8CF284025DA494B7D6FB3BCB468700

                          Control-flow Graph

                          APIs
                          • GetLastError.KERNEL32 ref: 00000213BDCECE37
                          • FlsGetValue.KERNEL32(?,?,?,00000213BDCF0A6B,?,?,?,00000213BDCF045C,?,?,?,00000213BDCEC84F), ref: 00000213BDCECE4C
                          • FlsSetValue.KERNEL32(?,?,?,00000213BDCF0A6B,?,?,?,00000213BDCF045C,?,?,?,00000213BDCEC84F), ref: 00000213BDCECE6D
                          • FlsSetValue.KERNEL32(?,?,?,00000213BDCF0A6B,?,?,?,00000213BDCF045C,?,?,?,00000213BDCEC84F), ref: 00000213BDCECE9A
                          • FlsSetValue.KERNEL32(?,?,?,00000213BDCF0A6B,?,?,?,00000213BDCF045C,?,?,?,00000213BDCEC84F), ref: 00000213BDCECEAB
                          • FlsSetValue.KERNEL32(?,?,?,00000213BDCF0A6B,?,?,?,00000213BDCF045C,?,?,?,00000213BDCEC84F), ref: 00000213BDCECEBC
                          • SetLastError.KERNEL32 ref: 00000213BDCECED7
                          • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00000213BDCF0A6B,?,?,?,00000213BDCF045C,?,?,?,00000213BDCEC84F), ref: 00000213BDCECF0D
                          • FlsSetValue.KERNEL32(?,?,00000001,00000213BDCEECCC,?,?,?,?,00000213BDCEBF9F,?,?,?,?,?,00000213BDCE7AB0), ref: 00000213BDCECF2C
                            • Part of subcall function 00000213BDCED6CC: HeapAlloc.KERNEL32 ref: 00000213BDCED721
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000213BDCF0A6B,?,?,?,00000213BDCF045C,?,?,?,00000213BDCEC84F), ref: 00000213BDCECF54
                            • Part of subcall function 00000213BDCED744: HeapFree.KERNEL32 ref: 00000213BDCED75A
                            • Part of subcall function 00000213BDCED744: GetLastError.KERNEL32 ref: 00000213BDCED764
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000213BDCF0A6B,?,?,?,00000213BDCF045C,?,?,?,00000213BDCEC84F), ref: 00000213BDCECF65
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000213BDCF0A6B,?,?,?,00000213BDCF045C,?,?,?,00000213BDCEC84F), ref: 00000213BDCECF76
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Value$ErrorLast$Heap$AllocFree
                          • String ID:
                          • API String ID: 570795689-0
                          • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction ID: 9cfdffa4e4f0b56bcb752030e4244594aa8fca63efa0d4e671618fb2b64398c0
                          • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction Fuzzy Hash: 85418DB424928C43FE68E371565E3F962435BB47BCF144738A83A476D7FE3AAB414600

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                          • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                          • API String ID: 2171963597-1373409510
                          • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction ID: 6b7d2558ae4a3ac574cfc8a772d118d668cf07695c60263a9c00d2c5ba11f754
                          • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction Fuzzy Hash: 2E213D7261864483EF10CB25F44879967A2F799BACF504215EA5906BA8EF3DC349CB04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction ID: a4356b529713084a557e2c4423f012a0144f846992504cd020869ae66375d7b3
                          • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction Fuzzy Hash: E0E19BB26087888BEF20DB6594883DD77A6F76578CF100126EA8D97B95EB35E381C704

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 587 213bdcb9944-213bdcb99ac call 213bdcba814 590 213bdcb99b2-213bdcb99b5 587->590 591 213bdcb9e13-213bdcb9e1b call 213bdcbbb48 587->591 590->591 592 213bdcb99bb-213bdcb99c1 590->592 594 213bdcb9a90-213bdcb9aa2 592->594 595 213bdcb99c7-213bdcb99cb 592->595 597 213bdcb9d63-213bdcb9d67 594->597 598 213bdcb9aa8-213bdcb9aac 594->598 595->594 599 213bdcb99d1-213bdcb99dc 595->599 602 213bdcb9da0-213bdcb9daa call 213bdcb8a34 597->602 603 213bdcb9d69-213bdcb9d70 597->603 598->597 600 213bdcb9ab2-213bdcb9abd 598->600 599->594 601 213bdcb99e2-213bdcb99e7 599->601 600->597 605 213bdcb9ac3-213bdcb9aca 600->605 601->594 606 213bdcb99ed-213bdcb99f7 call 213bdcb8a34 601->606 602->591 613 213bdcb9dac-213bdcb9dcb call 213bdcb6d40 602->613 603->591 607 213bdcb9d76-213bdcb9d9b call 213bdcb9e1c 603->607 610 213bdcb9ad0-213bdcb9b07 call 213bdcb8e10 605->610 611 213bdcb9c94-213bdcb9ca0 605->611 606->613 621 213bdcb99fd-213bdcb9a28 call 213bdcb8a34 * 2 call 213bdcb9124 606->621 607->602 610->611 625 213bdcb9b0d-213bdcb9b15 610->625 611->602 614 213bdcb9ca6-213bdcb9caa 611->614 618 213bdcb9cac-213bdcb9cb8 call 213bdcb90e4 614->618 619 213bdcb9cba-213bdcb9cc2 614->619 618->619 632 213bdcb9cdb-213bdcb9ce3 618->632 619->602 624 213bdcb9cc8-213bdcb9cd5 call 213bdcb8cb4 619->624 655 213bdcb9a2a-213bdcb9a2e 621->655 656 213bdcb9a48-213bdcb9a52 call 213bdcb8a34 621->656 624->602 624->632 629 213bdcb9b19-213bdcb9b4b 625->629 634 213bdcb9b51-213bdcb9b5c 629->634 635 213bdcb9c87-213bdcb9c8e 629->635 636 213bdcb9df6-213bdcb9e12 call 213bdcb8a34 * 2 call 213bdcbbaa8 632->636 637 213bdcb9ce9-213bdcb9ced 632->637 634->635 638 213bdcb9b62-213bdcb9b7b 634->638 635->611 635->629 636->591 640 213bdcb9d00 637->640 641 213bdcb9cef-213bdcb9cfe call 213bdcb90e4 637->641 642 213bdcb9b81-213bdcb9bc6 call 213bdcb90f8 * 2 638->642 643 213bdcb9c74-213bdcb9c79 638->643 651 213bdcb9d03-213bdcb9d0d call 213bdcba8ac 640->651 641->651 668 213bdcb9c04-213bdcb9c0a 642->668 669 213bdcb9bc8-213bdcb9bee call 213bdcb90f8 call 213bdcba038 642->669 648 213bdcb9c84 643->648 648->635 651->602 666 213bdcb9d13-213bdcb9d61 call 213bdcb8d44 call 213bdcb8f50 651->666 655->656 660 213bdcb9a30-213bdcb9a3b 655->660 656->594 672 213bdcb9a54-213bdcb9a74 call 213bdcb8a34 * 2 call 213bdcba8ac 656->672 660->656 665 213bdcb9a3d-213bdcb9a42 660->665 665->591 665->656 666->602 676 213bdcb9c0c-213bdcb9c10 668->676 677 213bdcb9c7b 668->677 687 213bdcb9bf0-213bdcb9c02 669->687 688 213bdcb9c15-213bdcb9c72 call 213bdcb9870 669->688 693 213bdcb9a8b 672->693 694 213bdcb9a76-213bdcb9a80 call 213bdcba99c 672->694 676->642 678 213bdcb9c80 677->678 678->648 687->668 687->669 688->678 693->594 697 213bdcb9df0-213bdcb9df5 call 213bdcbbaa8 694->697 698 213bdcb9a86-213bdcb9def call 213bdcb86ac call 213bdcba3f4 call 213bdcb88a0 694->698 697->636 698->697
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736461371.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdcb0000_lsass.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction ID: f386ab9bdd8cc4c87b67ff9b5e600b282352f279eca3ceb4b3cc66de4f1deea9
                          • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction Fuzzy Hash: 87E1AD32648B888AEF60DB65D4883DD77A2F769B8CF100115EE8957B99EF36C391C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: AddressFreeLibraryProc
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3013587201-537541572
                          • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction ID: 64b1116dec4a1fc2bb3371278ef814e94841622c5338f0fb36631d38e615d017
                          • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction Fuzzy Hash: 7941F6B231AA0442FE16CB56A8087D52393FB65BACF1442399D0D8B789FE3ED7458354
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction ID: c9b898f511c2e52726208957a962c9b291cdc106b1d13140a09b1ea003ed6b20
                          • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction Fuzzy Hash: 9E417273218B84C6EB60CF21E4487DE77A2F399B9CF048125DA894B758EF39D659CB00
                          APIs
                          • FlsGetValue.KERNEL32(?,?,?,00000213BDCEC7DE,?,?,?,?,?,?,?,?,00000213BDCECF9D,?,?,00000001), ref: 00000213BDCED087
                          • FlsSetValue.KERNEL32(?,?,?,00000213BDCEC7DE,?,?,?,?,?,?,?,?,00000213BDCECF9D,?,?,00000001), ref: 00000213BDCED0A6
                          • FlsSetValue.KERNEL32(?,?,?,00000213BDCEC7DE,?,?,?,?,?,?,?,?,00000213BDCECF9D,?,?,00000001), ref: 00000213BDCED0CE
                          • FlsSetValue.KERNEL32(?,?,?,00000213BDCEC7DE,?,?,?,?,?,?,?,?,00000213BDCECF9D,?,?,00000001), ref: 00000213BDCED0DF
                          • FlsSetValue.KERNEL32(?,?,?,00000213BDCEC7DE,?,?,?,?,?,?,?,?,00000213BDCECF9D,?,?,00000001), ref: 00000213BDCED0F0
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Value
                          • String ID: 1%$Y%
                          • API String ID: 3702945584-1395475152
                          • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction ID: 19c205c0411bc615aa3bccdf6f4f64bbad6ab17fba574e3ff0c824cae7453082
                          • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction Fuzzy Hash: 801184B070D24843FD64D725655E3E962475BB43FCF188338A87D466DAFE3AE7024600
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: 551094e2023b39dc9ace01dde74fdb1ba5573d69ed1bde9d232f088fcbd9e271
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: 2B81D3B160C24987FE60EB66A44D3D92293ABB578CF344439E944477D6FB3BEB468700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction ID: 4d4d0faf7020efbe67ed0a855dfe3d6003a087379504cbf48fb87940a6e137d3
                          • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction Fuzzy Hash: 6631C57121A744D2EE25DB42A4087D57296F768BACF590935DE1E0B394FF3AE7458300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction ID: 1e37ad57197f2f5fd627e52480ce6183fe70d503e9319598513a9094b24cedb1
                          • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction Fuzzy Hash: DC118631718B4086EB50CB52F8583D976A1F7A8FECF144214EE5A8B798EF39C7188744
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID: wr
                          • API String ID: 1092925422-2678910430
                          • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction ID: 12712e2fa7eb8b967a2fcefc972e563151717b3967eefe160898bd9f6f4aa3e4
                          • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction Fuzzy Hash: E7115A76308B4583EF14DB11E4082A962B2F799B8DF14012ADE890B758FF3ED709C704
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                          • Instruction ID: 3446894e02afeb19a9966952644c75a0c5e86968940c19ee8a431a5bd0db41b7
                          • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                          • Instruction Fuzzy Hash: B6D18176219B4882DA70DB06E49439A7BA1F7D8B8CF100126EACD47BA9DF3DD751CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: dialer
                          • API String ID: 756756679-3528709123
                          • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction ID: 44251474c1ee8a42ccd6e3d1f93cc1b766dec72a69286a1cba37760e0419152a
                          • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction Fuzzy Hash: FC31B572709B59C3EE14CF1695487A9A7A2FB68B8CF044030AE4807B55FF36E7658700
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Value$ErrorLast
                          • String ID:
                          • API String ID: 2506987500-0
                          • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction ID: 77ac6954afd6c966781107e5719d7c64fe3f53195b268d9a5bd80fbe793f95d1
                          • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction Fuzzy Hash: 08118EB024D28843FE24D321665E3E962435BB47BCF144738A87A477DAFE3AAB018700
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction ID: 3eb0d0c2679584ddfa503f59038269ae77ed88556fc385ff5f1d0553037a01c9
                          • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction Fuzzy Hash: F0015B71308A4482EA20DB52A4487D963A2F798BCCF588035DE4A47758EF39CB49C700
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction ID: 88d3306e3c19d980f3158101e8290f900e8424f24f65f37777eb6f4afb0b7499
                          • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction Fuzzy Hash: 0B015B7421AB4482EF24DB21F81D79632A2FB65B8EF140428C9890B758FF3EC7088714
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 2395640692-629598281
                          • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                          • Instruction ID: 6fb5bacd63384bb3f90134f8c5460c85208d4914d2655ed1bad9711df1c3dd6d
                          • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                          • Instruction Fuzzy Hash: 22518BB26096048BEF14CB25E84CB9937A7F369B8CF508524DA1687788FF36EB41C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction ID: 540f723a61500467f8a8b8c4ca4f47b4269590684ce67fd343b054dd3f87c0fa
                          • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction Fuzzy Hash: EEF0627121960582EF14CF24E44D3E96363EBA576DF540229CA6A492E8EF3EC34CC300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction ID: 143933a49c9e38150b676d3b6c803f89c80bf75aa8c52dce601b1f25c80bbb55
                          • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction Fuzzy Hash: 13F0F874718B8482EE14CB52B9181D96662AB68FDDF089130EE4A4BB18EE3DD74D8700
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                          • Instruction ID: ff1cd853ef15dbd82275a915282ff6a598436b67fb0be58782aaa7236b1550e1
                          • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                          • Instruction Fuzzy Hash: 3502EF7221DB8486DB60CB55F45439ABBA1F3D4798F100125EACE87BA9DF7DDA44CB00
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                          • Instruction ID: d223e9dcadd96ac9e86b04a6cfbd1f11c297519e412362c6c507cdbf370bb6f3
                          • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                          • Instruction Fuzzy Hash: 4361DC7652CB44C7EA60CB15E45835A7BA1F39478CF500129E68E87BA8EB7DDB51CF00
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: f9e4e7116411792c9900663e4fd0b77c758cabd73c1539257dc2faf97d7e1066
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: C311C132A1CA4711FF649568D4DD3E511436B783BCF188A24E9764E6DEEB36CB4C4200
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736461371.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdcb0000_lsass.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: d2d7dd6e1439f03189a3226a9b5cce41787e5537534634c01bb2080864e62fb7
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: D711E73265CE0101FE949328F44E3E910836B79B7CF4D4728AF66063D6FA36DB4042C1
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: ErrorLast
                          • String ID:
                          • API String ID: 1452528299-0
                          • Opcode ID: 46c896f13dff0714c7ccebb8ca9383bb675cc38bcf091c92c481f4a556b8b138
                          • Instruction ID: 32291ebe63344caa2b2a00819642319f6feb277e8a2eeb88ccaa8891375a908e
                          • Opcode Fuzzy Hash: 46c896f13dff0714c7ccebb8ca9383bb675cc38bcf091c92c481f4a556b8b138
                          • Instruction Fuzzy Hash: 4311B4B021925843FE60DB61A84D3E832976BA47ECF044635E966477DAFE3AEB41C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736461371.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdcb0000_lsass.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: Tuesday$Wednesday$or copy constructor iterator'
                          • API String ID: 3215553584-4202648911
                          • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction ID: dd33b7bdeea741fb6d5fb3879698249c2b400a189a1bb143957139dfcfd1a244
                          • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction Fuzzy Hash: E561F73668E20842FE6ACB28E54C3EE6BA3E77174CF545815CA46177A5FB37CB418301
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: 1fa883078d8b0df735174c791d3315410991ce76529377e33f37aec33171b3e6
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: 876179B3608B88CAEB10DF65D0443DD77A2F364B8CF144225EE4957B98EB39E284C704
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: 3c048601c7fcc0ffe57f7261eab226645e3cc41df1823d05877d79c368e95740
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: FD515FB2108388CFEF64CB159588399B7A2F364B8DF184125EA5D87B95EB39E760C704
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736461371.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdcb0000_lsass.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: f6b80d2922ff79a09da4c367b45cc3c1b98fc3b25da29179d71979c1a959d6c1
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: E351AF32188288CAEF64CB15D44839C77A2F365B8CF185116DACD87BD5EB7AD750C709
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736461371.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdcb0000_lsass.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction ID: dc5653ac438f2d6e495d45b1ca0cfa69a93c7d117f4fad526aed404aa48302df
                          • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction Fuzzy Hash: 2D51ED327592088AEF19CF15E448B9837A6FB68B9CF548024DA0643788FB36DF458B08
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736461371.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdcb0000_lsass.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction ID: 82ec953c2abcd69afeb9a379956e593d8954b52f8e7d0185f21bbf325504b95f
                          • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction Fuzzy Hash: A331C23165974486EF19DF11E8487993BA6FB68F8CF058014EE5B03788EB3ACB41CB48
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction ID: d0ae188cb9208859d57580f57e68af91c772b1affd1422831023fc799dab810f
                          • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction Fuzzy Hash: BAD1E272718A808AEB11CFA5D4443DC7BB2F36579CF108216CE599BB9DEA35C70AC740
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction ID: 31cca27c97c10b50b0d1f4af92040512d4615bcca040e4e08102490f9d85dd7c
                          • Opcode Fuzzy Hash: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction Fuzzy Hash: 91015A32648B94C6EB04DF66E9081CA77B2F798F8DF048425EA4A47729EE39D255C740
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: ConsoleErrorLastMode
                          • String ID:
                          • API String ID: 953036326-0
                          • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction ID: 0ed097bee9c2838b483cb9f14b03d6e6f10cfa9755ec3a11846def29111419fb
                          • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction Fuzzy Hash: AF91073270865089FF60DF6594483EDBBA2F764B8CF144109DE4A9B69CEB36C78AC700
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction ID: f3e89c732882dc4be1fda66988cc4488258048f9f4970aa2de9805cb3fbce708
                          • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction Fuzzy Hash: 80111F32754B0589EF00CB60E8593E833A4F76975CF440D25DAAD86798EB79C3988380
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736461371.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdcb0000_lsass.jbxd
                          Similarity
                          • API ID: CallTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3163161869-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: bbb7cdb92cb596dcb0788d693a3b58d75f0e34908b0e226618241f28b02e5c54
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: ED616A32608B888AEB20DF65D4443DD77A2F768B8CF144215EF8917B98EB79D255C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction ID: 188ea66b7bcfd0c47726733c40de34c55d45513101da1f913a5e3211a342359a
                          • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction Fuzzy Hash: A151D4B220C78983EE64DE29A55C3FAA753F3AA74CF440135DD5903B49EA3BE7058780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction ID: 7ca704e4079fb843e18e962332c75f2c7a1687e35e23e5be027c6cd1584b2488
                          • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction Fuzzy Hash: D841A572319A8082DB20CF25E4483D9B7A1F7A879CF504121EE8D8B798EB3DC645CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction ID: 450ba37ac19791e17a21ad49c035722d0e53f3451afd1a5ee852b307dddf2d54
                          • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction Fuzzy Hash: AC112B32219B8482EB61CB15E44439977E6F798B9CF584220EE8D07768EF3DC655CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736461371.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdcb0000_lsass.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: ierarchy Descriptor'$riptor at (
                          • API String ID: 592178966-758928094
                          • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction ID: f4862c4d9b7376f1182d3b6f5f2b365ac3009e22aec70bc65f16aebbe18ce939
                          • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction Fuzzy Hash: 4EE08671654B4890DF01CF21E8442D833A5DB68B6CB8891229A5C06315FA38D7EBC300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736461371.00000213BDCB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdcb0000_lsass.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: Locator'$riptor at (
                          • API String ID: 592178966-4215709766
                          • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction ID: 27a04a9311f7d125a749bde97889680f3ba368b48a2d80739b1b772cb5aa5af3
                          • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction Fuzzy Hash: 6FE08C71A54B4880DF02CF21E8802D873A6EB68B6CF889122DA4C06311FA38D7EAC300
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction ID: 02eb1687d551be4925cf3a57e29467bdb8e87c8f6b08593b3f3d5ec8add5e525
                          • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction Fuzzy Hash: C9118275605B4882EE04DB66A4082A977A2FB99FCCF185024DE4D87765EF3AD652D300
                          APIs
                          Memory Dump Source
                          • Source File: 0000001C.00000002.2736881956.00000213BDCE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000213BDCE0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_28_2_213bdce0000_lsass.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction ID: ca62a568da37a1804808f6c472a8f8a8754ce746572dadf88ae12087715b600f
                          • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction Fuzzy Hash: CCE0393564160486EB04CB62D80838A36E2EB99B0AF04C02489090B355EF7E8699C750
                          Memory Dump Source
                          • Source File: 0000001D.00000002.1484360566.00007FF61C0A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF61C0A0000, based on PE: true
                          • Associated: 0000001D.00000002.1484336293.00007FF61C0A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 0000001D.00000002.1484382081.00007FF61C0AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 0000001D.00000002.1484409869.00007FF61C0AE000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 0000001D.00000002.1484434372.00007FF61C0AF000.00000008.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 0000001D.00000002.1484952699.00007FF61C5D8000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 0000001D.00000002.1484977655.00007FF61C5DA000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_29_2_7ff61c0a0000_lrgkmixyjzta.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 09aa500106249f898c70f176d5dd8b6a7b84f69ff7d021052aa52de95c06f874
                          • Instruction ID: 0e5c22bc9e7b26d5b1651f83b0919e3ce3844d5e7faa2d17ffed164cc46211f6
                          • Opcode Fuzzy Hash: 09aa500106249f898c70f176d5dd8b6a7b84f69ff7d021052aa52de95c06f874
                          • Instruction Fuzzy Hash: 64B09234904A0984E2002B4298412EC22606B88F92F600420C51C42362DF6E90404B10

                          Execution Graph

                          Execution Coverage:0.7%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:81
                          Total number of Limit Nodes:2
                          execution_graph 14927 158709d1abc 14933 158709d1628 GetProcessHeap 14927->14933 14929 158709d1ad2 Sleep SleepEx 14931 158709d1acb 14929->14931 14931->14929 14932 158709d1598 StrCmpIW StrCmpW 14931->14932 14978 158709d18b4 14931->14978 14932->14931 14934 158709d1648 _invalid_parameter_noinfo 14933->14934 14995 158709d1268 GetProcessHeap 14934->14995 14936 158709d1650 14937 158709d1268 2 API calls 14936->14937 14938 158709d1661 14937->14938 14939 158709d1268 2 API calls 14938->14939 14940 158709d166a 14939->14940 14941 158709d1268 2 API calls 14940->14941 14942 158709d1673 14941->14942 14943 158709d168e RegOpenKeyExW 14942->14943 14944 158709d18a6 14943->14944 14945 158709d16c0 RegOpenKeyExW 14943->14945 14944->14931 14946 158709d16ff RegOpenKeyExW 14945->14946 14947 158709d16e9 14945->14947 14949 158709d1723 14946->14949 14950 158709d173a RegOpenKeyExW 14946->14950 14999 158709d12bc RegQueryInfoKeyW 14947->14999 15010 158709d104c RegQueryInfoKeyW 14949->15010 14953 158709d1775 RegOpenKeyExW 14950->14953 14954 158709d175e 14950->14954 14951 158709d16f5 RegCloseKey 14951->14946 14957 158709d17b0 RegOpenKeyExW 14953->14957 14958 158709d1799 14953->14958 14956 158709d12bc 11 API calls 14954->14956 14962 158709d176b RegCloseKey 14956->14962 14960 158709d17d4 14957->14960 14961 158709d17eb RegOpenKeyExW 14957->14961 14959 158709d12bc 11 API calls 14958->14959 14963 158709d17a6 RegCloseKey 14959->14963 14964 158709d12bc 11 API calls 14960->14964 14965 158709d1826 RegOpenKeyExW 14961->14965 14966 158709d180f 14961->14966 14962->14953 14963->14957 14967 158709d17e1 RegCloseKey 14964->14967 14969 158709d1861 RegOpenKeyExW 14965->14969 14970 158709d184a 14965->14970 14968 158709d104c 4 API calls 14966->14968 14967->14961 14971 158709d181c RegCloseKey 14968->14971 14973 158709d1885 14969->14973 14974 158709d189c RegCloseKey 14969->14974 14972 158709d104c 4 API calls 14970->14972 14971->14965 14976 158709d1857 RegCloseKey 14972->14976 14975 158709d104c 4 API calls 14973->14975 14974->14944 14977 158709d1892 RegCloseKey 14975->14977 14976->14969 14977->14974 15023 158709d14a4 14978->15023 15016 158709e6168 14995->15016 14998 158709d12ae _invalid_parameter_noinfo 14998->14936 15000 158709d1327 GetProcessHeap 14999->15000 15001 158709d148a __free_lconv_mon 14999->15001 15004 158709d133e _invalid_parameter_noinfo __free_lconv_mon 15000->15004 15001->14951 15002 158709d1476 GetProcessHeap 15002->15001 15003 158709d1352 RegEnumValueW 15003->15004 15004->15002 15004->15003 15006 158709d13d3 GetProcessHeap 15004->15006 15007 158709d141e lstrlenW GetProcessHeap 15004->15007 15008 158709d13f3 GetProcessHeap 15004->15008 15009 158709d1443 StrCpyW 15004->15009 15018 158709d152c 15004->15018 15006->15004 15007->15004 15008->15004 15009->15004 15011 158709d11b5 RegCloseKey 15010->15011 15012 158709d10bf _invalid_parameter_noinfo __free_lconv_mon 15010->15012 15011->14950 15012->15011 15013 158709d10cf RegEnumValueW 15012->15013 15014 158709d114e GetProcessHeap 15012->15014 15015 158709d116e GetProcessHeap 15012->15015 15013->15012 15014->15012 15015->15012 15017 158709d1283 GetProcessHeap 15016->15017 15017->14998 15019 158709d157c 15018->15019 15022 158709d1546 15018->15022 15019->15004 15020 158709d1565 StrCmpW 15020->15022 15021 158709d155d StrCmpIW 15021->15022 15022->15019 15022->15020 15022->15021 15024 158709d14e1 GetProcessHeap 15023->15024 15025 158709d14c1 GetProcessHeap 15023->15025 15029 158709e6180 15024->15029 15026 158709d14da __free_lconv_mon 15025->15026 15026->15024 15026->15025 15030 158709d14f6 GetProcessHeap HeapFree 15029->15030 15031 158709a273c 15033 158709a276a 15031->15033 15032 158709a2858 LoadLibraryA 15032->15033 15033->15032 15034 158709a28d4 15033->15034

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                          • String ID:
                          • API String ID: 1683269324-0
                          • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction ID: d10138deb8bbbe3c9e36edbeaa6ef6b6b2d091da5ebc89b531e029dc850f4207
                          • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction Fuzzy Hash: 9211C43E658E08C2F7609B21FE053D97294B7CC387FB08124990A6D6E6EF78C0468E00

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00000158709D1628: GetProcessHeap.KERNEL32 ref: 00000158709D1633
                            • Part of subcall function 00000158709D1628: HeapAlloc.KERNEL32 ref: 00000158709D1642
                            • Part of subcall function 00000158709D1628: RegOpenKeyExW.ADVAPI32 ref: 00000158709D16B2
                            • Part of subcall function 00000158709D1628: RegOpenKeyExW.ADVAPI32 ref: 00000158709D16DF
                            • Part of subcall function 00000158709D1628: RegCloseKey.ADVAPI32 ref: 00000158709D16F9
                            • Part of subcall function 00000158709D1628: RegOpenKeyExW.ADVAPI32 ref: 00000158709D1719
                            • Part of subcall function 00000158709D1628: RegCloseKey.ADVAPI32 ref: 00000158709D1734
                            • Part of subcall function 00000158709D1628: RegOpenKeyExW.ADVAPI32 ref: 00000158709D1754
                            • Part of subcall function 00000158709D1628: RegCloseKey.ADVAPI32 ref: 00000158709D176F
                            • Part of subcall function 00000158709D1628: RegOpenKeyExW.ADVAPI32 ref: 00000158709D178F
                            • Part of subcall function 00000158709D1628: RegCloseKey.ADVAPI32 ref: 00000158709D17AA
                            • Part of subcall function 00000158709D1628: RegOpenKeyExW.ADVAPI32 ref: 00000158709D17CA
                          • Sleep.KERNEL32 ref: 00000158709D1AD7
                          • SleepEx.KERNELBASE ref: 00000158709D1ADD
                            • Part of subcall function 00000158709D1628: RegCloseKey.ADVAPI32 ref: 00000158709D17E5
                            • Part of subcall function 00000158709D1628: RegOpenKeyExW.ADVAPI32 ref: 00000158709D1805
                            • Part of subcall function 00000158709D1628: RegCloseKey.ADVAPI32 ref: 00000158709D1820
                            • Part of subcall function 00000158709D1628: RegOpenKeyExW.ADVAPI32 ref: 00000158709D1840
                            • Part of subcall function 00000158709D1628: RegCloseKey.ADVAPI32 ref: 00000158709D185B
                            • Part of subcall function 00000158709D1628: RegOpenKeyExW.ADVAPI32 ref: 00000158709D187B
                            • Part of subcall function 00000158709D1628: RegCloseKey.ADVAPI32 ref: 00000158709D1896
                            • Part of subcall function 00000158709D1628: RegCloseKey.ADVAPI32 ref: 00000158709D18A0
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: CloseOpen$HeapSleep$AllocProcess
                          • String ID:
                          • API String ID: 1534210851-0
                          • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction ID: dd6c86af37df3cdfce808d9367ca0a589ea4c12304fe849a19c5307a2c397293
                          • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction Fuzzy Hash: C931B47B244D49E1EB509B36DE513F93394A7CCBD2F2454229E09AF79BEE18C4538A10

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 57 158709d3844-158709d384f 58 158709d3851-158709d3864 StrCmpNIW 57->58 59 158709d3869-158709d3870 57->59 58->59 60 158709d3866 58->60 60->59
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: dialer
                          • API String ID: 0-3528709123
                          • Opcode ID: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                          • Instruction ID: 780bff3d9f94a45a4787809db9a9868108e6e80b955a58f819050ff7eb005af9
                          • Opcode Fuzzy Hash: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                          • Instruction Fuzzy Hash: 8ED05E79351A09C6FB149FA68CC47A03350AB8C7D6FA89020990019160DF188D9EAE10

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2721983767.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709a0000_svchost.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction ID: 917a96bc1d6c895ecea56c2d7ec6bba4e4c507b6cb4fc8ea2b9ce0172117c01a
                          • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction Fuzzy Hash: 9A61E3BAB09A90C7DB548F19D9007EA7392F7D8B95F248121DE593B784DE38D853EB00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 369 158709d2b2c-158709d2ba5 call 158709f2ce0 372 158709d2ee0-158709d2f03 369->372 373 158709d2bab-158709d2bb1 369->373 373->372 374 158709d2bb7-158709d2bba 373->374 374->372 375 158709d2bc0-158709d2bc3 374->375 375->372 376 158709d2bc9-158709d2bd9 GetModuleHandleA 375->376 377 158709d2bed 376->377 378 158709d2bdb-158709d2beb GetProcAddress 376->378 379 158709d2bf0-158709d2c0e 377->379 378->379 379->372 381 158709d2c14-158709d2c33 StrCmpNIW 379->381 381->372 382 158709d2c39-158709d2c3d 381->382 382->372 383 158709d2c43-158709d2c4d 382->383 383->372 384 158709d2c53-158709d2c5a 383->384 384->372 385 158709d2c60-158709d2c73 384->385 386 158709d2c75-158709d2c81 385->386 387 158709d2c83 385->387 388 158709d2c86-158709d2c8a 386->388 387->388 389 158709d2c8c-158709d2c98 388->389 390 158709d2c9a 388->390 391 158709d2c9d-158709d2ca7 389->391 390->391 392 158709d2d9d-158709d2da1 391->392 393 158709d2cad-158709d2cb0 391->393 394 158709d2da7-158709d2daa 392->394 395 158709d2ed2-158709d2eda 392->395 396 158709d2cc2-158709d2ccc 393->396 397 158709d2cb2-158709d2cbf call 158709d199c 393->397 398 158709d2dac-158709d2db8 call 158709d199c 394->398 399 158709d2dbb-158709d2dc5 394->399 395->372 395->385 401 158709d2d00-158709d2d0a 396->401 402 158709d2cce-158709d2cdb 396->402 397->396 398->399 406 158709d2df5-158709d2df8 399->406 407 158709d2dc7-158709d2dd4 399->407 403 158709d2d0c-158709d2d19 401->403 404 158709d2d3a-158709d2d3d 401->404 402->401 409 158709d2cdd-158709d2cea 402->409 403->404 410 158709d2d1b-158709d2d28 403->410 411 158709d2d3f-158709d2d49 call 158709d1bbc 404->411 412 158709d2d4b-158709d2d58 lstrlenW 404->412 415 158709d2e05-158709d2e12 lstrlenW 406->415 416 158709d2dfa-158709d2e03 call 158709d1bbc 406->416 407->406 414 158709d2dd6-158709d2de3 407->414 417 158709d2ced-158709d2cf3 409->417 420 158709d2d2b-158709d2d31 410->420 411->412 426 158709d2d93-158709d2d98 411->426 422 158709d2d7b-158709d2d8d call 158709d3844 412->422 423 158709d2d5a-158709d2d64 412->423 424 158709d2de6-158709d2dec 414->424 418 158709d2e35-158709d2e3f call 158709d3844 415->418 419 158709d2e14-158709d2e1e 415->419 416->415 435 158709d2e4a-158709d2e55 416->435 417->426 427 158709d2cf9-158709d2cfe 417->427 429 158709d2e42-158709d2e44 418->429 419->418 428 158709d2e20-158709d2e33 call 158709d152c 419->428 420->426 430 158709d2d33-158709d2d38 420->430 422->426 422->429 423->422 433 158709d2d66-158709d2d79 call 158709d152c 423->433 434 158709d2dee-158709d2df3 424->434 424->435 426->429 427->401 427->417 428->418 428->435 429->395 429->435 430->404 430->420 433->422 433->426 434->406 434->424 440 158709d2e57-158709d2e5b 435->440 441 158709d2ecc-158709d2ed0 435->441 445 158709d2e63-158709d2e7d call 158709d85c0 440->445 446 158709d2e5d-158709d2e61 440->446 441->395 448 158709d2e80-158709d2e83 445->448 446->445 446->448 451 158709d2e85-158709d2ea3 call 158709d85c0 448->451 452 158709d2ea6-158709d2ea9 448->452 451->452 452->441 454 158709d2eab-158709d2ec9 call 158709d85c0 452->454 454->441
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction ID: e19b0cfe6a8045a754af9c3da777dccb95321baacbab1f044a34d1dd9148c669
                          • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction Fuzzy Hash: 4EB1B03A218E58C2EB648F25DC407E973A5FBD8B96F245016EE496B796DF34CC42CB40
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction ID: e7c148938d73b118393facd0308456c1e40248a19777e3d89d8291f9a2c8a452
                          • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction Fuzzy Hash: 9D313A76205E84CAEB609F60E8403EE7361F788745F54402ADA4D6BBA5EF38C949CB10
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction ID: 059a4172f76ea96128a6440cafd08da1c107212dcb3790aa4d309b172f3a75cd
                          • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction Fuzzy Hash: C5315B3A214F84C6DB60CB25E8403DE73A0F7C9799F640126EA9D5BBA5EF38C556CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 106492572-2879589442
                          • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction ID: 0f6089fd75106e825002abacbaf1900165387074937e0fada7e43ed3f6eff390
                          • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction Fuzzy Hash: 3371183B314E14D6EB109F72EC4079933A5F7C8B8AF101121DA4E6BB29DE34C956CB40

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction ID: eb3ce238f31fcb04bd06a980f3a210d1e24ed5b83b152061e04dc28651e22d57
                          • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction Fuzzy Hash: E5513A3B208B84D6EB55CF62E84839A77A1F7C9BDAF144124DA491B729DF38C456CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentThread$AddressHandleModuleProc
                          • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                          • API String ID: 4175298099-1975688563
                          • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction ID: fe178ff9f80e494172ea236cf487610b27fb66f29a12b80d336874847e16e756
                          • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction Fuzzy Hash: B131AE7E545E4AE0EA04EBA9EC517E43320F7DC346FA9401394493E277AF38865BCB50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 211 158709a6910-158709a6916 212 158709a6951-158709a695b 211->212 213 158709a6918-158709a691b 211->213 216 158709a6a78-158709a6a8d 212->216 214 158709a6945-158709a6984 call 158709a6fc0 213->214 215 158709a691d-158709a6920 213->215 231 158709a6a52 214->231 232 158709a698a-158709a699f call 158709a6e54 214->232 217 158709a6922-158709a6925 215->217 218 158709a6938 __scrt_dllmain_crt_thread_attach 215->218 219 158709a6a8f 216->219 220 158709a6a9c-158709a6ab6 call 158709a6e54 216->220 222 158709a6931-158709a6936 call 158709a6f04 217->222 223 158709a6927-158709a6930 217->223 226 158709a693d-158709a6944 218->226 224 158709a6a91-158709a6a9b 219->224 234 158709a6ab8-158709a6aed call 158709a6f7c call 158709a6e1c call 158709a7318 call 158709a7130 call 158709a7154 call 158709a6fac 220->234 235 158709a6aef-158709a6b20 call 158709a7190 220->235 222->226 236 158709a6a54-158709a6a69 231->236 243 158709a69a5-158709a69b6 call 158709a6ec4 232->243 244 158709a6a6a-158709a6a77 call 158709a7190 232->244 234->224 245 158709a6b22-158709a6b28 235->245 246 158709a6b31-158709a6b37 235->246 263 158709a6a07-158709a6a11 call 158709a7130 243->263 264 158709a69b8-158709a69dc call 158709a72dc call 158709a6e0c call 158709a6e38 call 158709aac0c 243->264 244->216 245->246 250 158709a6b2a-158709a6b2c 245->250 251 158709a6b39-158709a6b43 246->251 252 158709a6b7e-158709a6b94 call 158709a268c 246->252 257 158709a6c1f-158709a6c2c 250->257 258 158709a6b45-158709a6b4d 251->258 259 158709a6b4f-158709a6b5d call 158709b5780 251->259 272 158709a6b96-158709a6b98 252->272 273 158709a6bcc-158709a6bce 252->273 266 158709a6b63-158709a6b78 call 158709a6910 258->266 259->266 276 158709a6c15-158709a6c1d 259->276 263->231 284 158709a6a13-158709a6a1f call 158709a7180 263->284 264->263 314 158709a69de-158709a69e5 __scrt_dllmain_after_initialize_c 264->314 266->252 266->276 272->273 281 158709a6b9a-158709a6bbc call 158709a268c call 158709a6a78 272->281 274 158709a6bd0-158709a6bd3 273->274 275 158709a6bd5-158709a6bea call 158709a6910 273->275 274->275 274->276 275->276 293 158709a6bec-158709a6bf6 275->293 276->257 281->273 308 158709a6bbe-158709a6bc6 call 158709b5780 281->308 301 158709a6a21-158709a6a2b call 158709a7098 284->301 302 158709a6a45-158709a6a50 284->302 298 158709a6c01-158709a6c11 call 158709b5780 293->298 299 158709a6bf8-158709a6bff 293->299 298->276 299->276 301->302 313 158709a6a2d-158709a6a3b 301->313 302->236 308->273 313->302 314->263 315 158709a69e7-158709a6a04 call 158709aabc8 314->315 315->263
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2721983767.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709a0000_svchost.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                          • API String ID: 190073905-1786718095
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: 2bc89b2b44f4cc9601cd367f7fcf5040b1f2b50bcf0555486a2ee6e897309275
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: 0481AFBD708E41C6FA909B659C413D972A0A7CD782F7480259A49BF796DF38C847EF00

                          Control-flow Graph

                          APIs
                          • GetLastError.KERNEL32 ref: 00000158709DCE37
                          • FlsGetValue.KERNEL32(?,?,?,00000158709E0A6B,?,?,?,00000158709E045C,?,?,?,00000158709DC84F), ref: 00000158709DCE4C
                          • FlsSetValue.KERNEL32(?,?,?,00000158709E0A6B,?,?,?,00000158709E045C,?,?,?,00000158709DC84F), ref: 00000158709DCE6D
                          • FlsSetValue.KERNEL32(?,?,?,00000158709E0A6B,?,?,?,00000158709E045C,?,?,?,00000158709DC84F), ref: 00000158709DCE9A
                          • FlsSetValue.KERNEL32(?,?,?,00000158709E0A6B,?,?,?,00000158709E045C,?,?,?,00000158709DC84F), ref: 00000158709DCEAB
                          • FlsSetValue.KERNEL32(?,?,?,00000158709E0A6B,?,?,?,00000158709E045C,?,?,?,00000158709DC84F), ref: 00000158709DCEBC
                          • SetLastError.KERNEL32 ref: 00000158709DCED7
                          • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00000158709E0A6B,?,?,?,00000158709E045C,?,?,?,00000158709DC84F), ref: 00000158709DCF0D
                          • FlsSetValue.KERNEL32(?,?,00000001,00000158709DECCC,?,?,?,?,00000158709DBF9F,?,?,?,?,?,00000158709D7AB0), ref: 00000158709DCF2C
                            • Part of subcall function 00000158709DD6CC: HeapAlloc.KERNEL32 ref: 00000158709DD721
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000158709E0A6B,?,?,?,00000158709E045C,?,?,?,00000158709DC84F), ref: 00000158709DCF54
                            • Part of subcall function 00000158709DD744: HeapFree.KERNEL32 ref: 00000158709DD75A
                            • Part of subcall function 00000158709DD744: GetLastError.KERNEL32 ref: 00000158709DD764
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000158709E0A6B,?,?,?,00000158709E045C,?,?,?,00000158709DC84F), ref: 00000158709DCF65
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000158709E0A6B,?,?,?,00000158709E045C,?,?,?,00000158709DC84F), ref: 00000158709DCF76
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Value$ErrorLast$Heap$AllocFree
                          • String ID:
                          • API String ID: 570795689-0
                          • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction ID: 9975690624174f1e8eecd39a416a149b1b9c960f19d828ddab801993930161a0
                          • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction Fuzzy Hash: DB4184BC289E4DC1FA6867255D523E932425BCC7B6F740724A8367E7DBED28D8434E80

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                          • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                          • API String ID: 2171963597-1373409510
                          • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction ID: 9d08b4948e7ab7a7583e3835b8c16d8cf2b2d0085f3f9790f0536a71d5975b49
                          • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction Fuzzy Hash: 0D21303A618A54C2E710CB25F84439977A0F7C9BE6F640215DA591ABA8CF3CC55ACF00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 588 158709da544-158709da5ac call 158709db414 591 158709daa13-158709daa1b call 158709dc748 588->591 592 158709da5b2-158709da5b5 588->592 592->591 593 158709da5bb-158709da5c1 592->593 596 158709da5c7-158709da5cb 593->596 597 158709da690-158709da6a2 593->597 596->597 600 158709da5d1-158709da5dc 596->600 598 158709da963-158709da967 597->598 599 158709da6a8-158709da6ac 597->599 601 158709da9a0-158709da9aa call 158709d9634 598->601 602 158709da969-158709da970 598->602 599->598 603 158709da6b2-158709da6bd 599->603 600->597 604 158709da5e2-158709da5e7 600->604 601->591 616 158709da9ac-158709da9cb call 158709d7940 601->616 602->591 606 158709da976-158709da99b call 158709daa1c 602->606 603->598 608 158709da6c3-158709da6ca 603->608 604->597 605 158709da5ed-158709da5f7 call 158709d9634 604->605 605->616 619 158709da5fd-158709da628 call 158709d9634 * 2 call 158709d9d24 605->619 606->601 609 158709da894-158709da8a0 608->609 610 158709da6d0-158709da707 call 158709d9a10 608->610 609->601 617 158709da8a6-158709da8aa 609->617 610->609 624 158709da70d-158709da715 610->624 621 158709da8ac-158709da8b8 call 158709d9ce4 617->621 622 158709da8ba-158709da8c2 617->622 656 158709da648-158709da652 call 158709d9634 619->656 657 158709da62a-158709da62e 619->657 621->622 632 158709da8db-158709da8e3 621->632 622->601 623 158709da8c8-158709da8d5 call 158709d98b4 622->623 623->601 623->632 630 158709da719-158709da74b 624->630 634 158709da887-158709da88e 630->634 635 158709da751-158709da75c 630->635 637 158709da9f6-158709daa12 call 158709d9634 * 2 call 158709dc6a8 632->637 638 158709da8e9-158709da8ed 632->638 634->609 634->630 635->634 639 158709da762-158709da77b 635->639 637->591 641 158709da900 638->641 642 158709da8ef-158709da8fe call 158709d9ce4 638->642 643 158709da874-158709da879 639->643 644 158709da781-158709da7c6 call 158709d9cf8 * 2 639->644 652 158709da903-158709da90d call 158709db4ac 641->652 642->652 648 158709da884 643->648 670 158709da804-158709da80a 644->670 671 158709da7c8-158709da7ee call 158709d9cf8 call 158709dac38 644->671 648->634 652->601 667 158709da913-158709da961 call 158709d9944 call 158709d9b50 652->667 656->597 669 158709da654-158709da674 call 158709d9634 * 2 call 158709db4ac 656->669 657->656 661 158709da630-158709da63b 657->661 661->656 666 158709da63d-158709da642 661->666 666->591 666->656 667->601 694 158709da676-158709da680 call 158709db59c 669->694 695 158709da68b 669->695 676 158709da80c-158709da810 670->676 677 158709da87b 670->677 688 158709da815-158709da872 call 158709da470 671->688 689 158709da7f0-158709da802 671->689 676->644 681 158709da880 677->681 681->648 688->681 689->670 689->671 698 158709da686-158709da9ef call 158709d92ac call 158709daff4 call 158709d94a0 694->698 699 158709da9f0-158709da9f5 call 158709dc6a8 694->699 695->597 698->699 699->637
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction ID: f3fa1228f9b23b1bab88f1be00c529a69e786049c2ce1459848cac513dec6a52
                          • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction Fuzzy Hash: D0E1807A648F48CAEB20DF65D8803DD77A0F799799F640115EE896BB96CF34C492CB00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 467 158709a9944-158709a99ac call 158709aa814 470 158709a99b2-158709a99b5 467->470 471 158709a9e13-158709a9e1b call 158709abb48 467->471 470->471 472 158709a99bb-158709a99c1 470->472 474 158709a9a90-158709a9aa2 472->474 475 158709a99c7-158709a99cb 472->475 477 158709a9d63-158709a9d67 474->477 478 158709a9aa8-158709a9aac 474->478 475->474 479 158709a99d1-158709a99dc 475->479 482 158709a9da0-158709a9daa call 158709a8a34 477->482 483 158709a9d69-158709a9d70 477->483 478->477 480 158709a9ab2-158709a9abd 478->480 479->474 481 158709a99e2-158709a99e7 479->481 480->477 484 158709a9ac3-158709a9aca 480->484 481->474 485 158709a99ed-158709a99f7 call 158709a8a34 481->485 482->471 493 158709a9dac-158709a9dcb call 158709a6d40 482->493 483->471 486 158709a9d76-158709a9d9b call 158709a9e1c 483->486 489 158709a9ad0-158709a9b07 call 158709a8e10 484->489 490 158709a9c94-158709a9ca0 484->490 485->493 501 158709a99fd-158709a9a28 call 158709a8a34 * 2 call 158709a9124 485->501 486->482 489->490 505 158709a9b0d-158709a9b15 489->505 490->482 494 158709a9ca6-158709a9caa 490->494 498 158709a9cba-158709a9cc2 494->498 499 158709a9cac-158709a9cb8 call 158709a90e4 494->499 498->482 504 158709a9cc8-158709a9cd5 call 158709a8cb4 498->504 499->498 511 158709a9cdb-158709a9ce3 499->511 535 158709a9a2a-158709a9a2e 501->535 536 158709a9a48-158709a9a52 call 158709a8a34 501->536 504->482 504->511 509 158709a9b19-158709a9b4b 505->509 513 158709a9b51-158709a9b5c 509->513 514 158709a9c87-158709a9c8e 509->514 516 158709a9df6-158709a9e12 call 158709a8a34 * 2 call 158709abaa8 511->516 517 158709a9ce9-158709a9ced 511->517 513->514 518 158709a9b62-158709a9b7b 513->518 514->490 514->509 516->471 520 158709a9d00 517->520 521 158709a9cef-158709a9cfe call 158709a90e4 517->521 522 158709a9b81-158709a9bc6 call 158709a90f8 * 2 518->522 523 158709a9c74-158709a9c79 518->523 528 158709a9d03-158709a9d0d call 158709aa8ac 520->528 521->528 548 158709a9c04-158709a9c0a 522->548 549 158709a9bc8-158709a9bee call 158709a90f8 call 158709aa038 522->549 531 158709a9c84 523->531 528->482 546 158709a9d13-158709a9d61 call 158709a8d44 call 158709a8f50 528->546 531->514 535->536 540 158709a9a30-158709a9a3b 535->540 536->474 552 158709a9a54-158709a9a74 call 158709a8a34 * 2 call 158709aa8ac 536->552 540->536 545 158709a9a3d-158709a9a42 540->545 545->471 545->536 546->482 556 158709a9c7b 548->556 557 158709a9c0c-158709a9c10 548->557 567 158709a9bf0-158709a9c02 549->567 568 158709a9c15-158709a9c72 call 158709a9870 549->568 573 158709a9a76-158709a9a80 call 158709aa99c 552->573 574 158709a9a8b 552->574 558 158709a9c80 556->558 557->522 558->531 567->548 567->549 568->558 577 158709a9df0-158709a9df5 call 158709abaa8 573->577 578 158709a9a86-158709a9def call 158709a86ac call 158709aa3f4 call 158709a88a0 573->578 574->474 577->516 578->577
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2721983767.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709a0000_svchost.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction ID: 08ab0671c9424b5081223383289d6080edcd3caa4dd75a7e0d5916fa68029c91
                          • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction Fuzzy Hash: 8AE16EBA608F40CAEB60DB69DC403DD77A4F799799F204116EE896BB95CF34C492DB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: AddressFreeLibraryProc
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3013587201-537541572
                          • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction ID: cb0434ac2a4b0d4f8a64736bfb55d34b7dfcd7b844d76ba5a6e5c12046194fd4
                          • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction Fuzzy Hash: 9441293A359E04D1EA15CB16AC147D63391B7CDBE2F2541299D0DAF7AAEE38C4478B40

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction ID: 406b0553ad116c0cf0cb50d7a38d1fd5da460869398bb6113de0fb484408bd0d
                          • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction Fuzzy Hash: 99418237218F84D6E760CF21E84439E77A1F389B99F148129DB891B758DF38C586CB00
                          APIs
                          • FlsGetValue.KERNEL32(?,?,?,00000158709DC7DE,?,?,?,?,?,?,?,?,00000158709DCF9D,?,?,00000001), ref: 00000158709DD087
                          • FlsSetValue.KERNEL32(?,?,?,00000158709DC7DE,?,?,?,?,?,?,?,?,00000158709DCF9D,?,?,00000001), ref: 00000158709DD0A6
                          • FlsSetValue.KERNEL32(?,?,?,00000158709DC7DE,?,?,?,?,?,?,?,?,00000158709DCF9D,?,?,00000001), ref: 00000158709DD0CE
                          • FlsSetValue.KERNEL32(?,?,?,00000158709DC7DE,?,?,?,?,?,?,?,?,00000158709DCF9D,?,?,00000001), ref: 00000158709DD0DF
                          • FlsSetValue.KERNEL32(?,?,?,00000158709DC7DE,?,?,?,?,?,?,?,?,00000158709DCF9D,?,?,00000001), ref: 00000158709DD0F0
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Value
                          • String ID: 1%$Y%
                          • API String ID: 3702945584-1395475152
                          • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction ID: 1d2e9aa775ac6edd092d1a246d88b9f5446202352410f6619a6c14a773fb799f
                          • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction Fuzzy Hash: 9811307878DE4CC1FA6857259D523F971419BCC7A6F78422594292E7DBDE28D4438A00
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: 3d8f95e5633d4c6b653d59d18f429cffb185ad790c80063b25e37e7c71a7f415
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: 03817E3D688E49C6FA50EB65AC413D9B291ABCD782F744415A9086F7A7FF38C8478F01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction ID: 7fb3335a45b0d0e99637cb6ac1d0fd9b443a23753f7729f4e4207a61b16c956a
                          • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction Fuzzy Hash: 2031D83A35AE44E1EE11EB42AC007D97394B7CCBA2F7906259D1E6F392DF38C4568B10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction ID: 5854a10f70b8acde66e217e2d3e673b9bf3bb195df514e6a525a3e7a0ccb6496
                          • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction Fuzzy Hash: 52118236314F40C6E7508B52FC5435976A0F7CCFE6F244218EA5A9B7A4CF78C9668B80
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID: wr
                          • API String ID: 1092925422-2678910430
                          • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction ID: c1706b2b0473ed2e9d02f1dddf1a74ec365221044fa21d2a3e131ac40444c417
                          • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction Fuzzy Hash: 60113C3A708F45C2EF549B22E8043A972A1F788B97F644029DE895B765EF3DC916CB04
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                          • Instruction ID: 60ab21630707aac3798ecf9166792788bd74f2907c85a2321cc20bfd57c17da0
                          • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                          • Instruction Fuzzy Hash: CFD17B7A259F48D1DA70DB16E89439A77A0F3CCB85F200116EA8D5BBA5DF38C552CF40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: dialer
                          • API String ID: 756756679-3528709123
                          • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction ID: e6d8faa326a562ef7d00f18873055ee8b9534239608773783dd45c2c1394fe41
                          • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction Fuzzy Hash: FE31923A709F59C2E615CF16ED407E977A0FB98B82F1884249E485BB56EF34C462CB00
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Value$ErrorLast
                          • String ID:
                          • API String ID: 2506987500-0
                          • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction ID: aa873455afc96999b87c21931bd58146887484eb7e08ab61906587a09483081b
                          • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction Fuzzy Hash: EA116379389E48C1FA6457259E553E931425BCC7F6F344714A8366F7DBDD28C4438E40
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction ID: 7cc37782291b92a2b75e31e5930a5bab2ef7aa798e5d7ec79eb9ff034366abf0
                          • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction Fuzzy Hash: 2F016D36304E44C2EB54DB62A84839973A1F78CBC2FA84035DE4967765DF3CC99ACB00
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction ID: d92c0bde52101c03c87867e95d8acc90603132017f221265b0eb273a598ab5d0
                          • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction Fuzzy Hash: 3B011B7A215F44C2FB249B22EC0839973A0BB9DB87F244428CD492B765EF3DC51A8B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 2395640692-629598281
                          • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction ID: 04aa9ae47b2a9c131ca64884b0331827bb0d1dcec54a8120c3393878895a1e76
                          • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction Fuzzy Hash: CE51C63A74DA06CADB14EF15EC48B993795F389B9AF218124DA076B74ADF75CC42CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 2395640692-629598281
                          • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction ID: cc6c5033e38e6afa751b52c8de9f6da4c93002e611e71df0da7fecd0cba56087
                          • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction Fuzzy Hash: 0F31C43A348A44D6E714EF11EC447993765F388BCAF258114EE4A2B746DF39C942CF04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction ID: 698509cad8b23d240c0b825ecc2b97b4a5749d1b6b2534689e1e69f203ffbdc3
                          • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction Fuzzy Hash: 77F03C37704A45D2EB608B61FC847997760F78CBDAFA44020DA495AA65DE2CCA9ECF00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction ID: de2cf2f2a9d9284385138a2729b234b0e2eb91eb51179958fd2d97b66a3f2f3e
                          • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction Fuzzy Hash: 8EF05439204F84C1EA104B12BD042997260A78CFD2F289120DD461BB29DE28C8568B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction ID: 10d4d02c46d8948fd3dba8b0568bcad9390f76deb3f3d4399e5b44582f6e7a45
                          • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction Fuzzy Hash: C0F0627A215E04D1EB148B29EC443997320FBCDBA7F640219CA6A5D2F4CF2CC956CB00
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                          • Instruction ID: d8e4fcef7782aab0e6196fa45eef77e5817cd3fcfaeadc4be3155837d2d64916
                          • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                          • Instruction Fuzzy Hash: EF02A83625DB84C6E760CB55E89039AB7A1F3C8795F204015EA8E9BBA9DF7CC495CF00
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                          • Instruction ID: 2d239d733d9f377039aa2bd8920474b359dab336e32e40763e3e9fde822d2307
                          • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                          • Instruction Fuzzy Hash: 4961C73A559E48C6E760CB15E85435AB7A0F3CC786F600116EA8E5BBA9DF7CC452CF40
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: 45fce9a1b44715b5da1f110af4fbf2b5e72d243b065df00d6a6cb7d411a89504
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: F011B23BA18F40E1FE645578DC553E531416BFC3A6E380624A5766E6F6CEA8CCA34901
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2721983767.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709a0000_svchost.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: b22d272b1eca59d2f8be55dc33f3d675a4ea0f3ee1479b912bd1a7d695708eec
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: C411C47A610E01D1FA749568EC513E934806BDC37EF78C728BD6ABEED78EA4C8474900
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2721983767.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709a0000_svchost.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: Tuesday$Wednesday$or copy constructor iterator'
                          • API String ID: 3215553584-4202648911
                          • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction ID: bfa070ed68fe50ba7f1f2c297ac04698a413684fc1faf6f2fb695e8f31954a37
                          • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction Fuzzy Hash: 2A6192BE60CE00C2FA658BA4DC603EA7A90E7CD792F714516CA153F795EE34C847EA00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: 7893eb5ab0e642a1a0fa3d649198329584f3167fee0553330bce6cb7a40f68a6
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: 06614C3A605A48CAEB109F65D8403DD77A1F388B99F244216DE492BB95DF38D556CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: c55e6b89f1deeede7607d44a4678232a21c5566193418bc64356b270fa1dde39
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: 8A51B57A148B88CAEB748F25D9443D977A0F3D8B96F244115DA496BBD6CF34C462CF00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2721983767.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709a0000_svchost.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: ad2e3dc20faeaab019d23fdd26e7ac47928873f210296601eed610e87e364d0a
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: C051D1BA108A80CBEF648B15984439877A0F3DCB96F284116DA596BBC5CF39D462EF40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2721983767.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709a0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction ID: 522bc94808ccd0891ba8f4ee668879e4334006ea7c9bfdc7b7a578e3ad5792e1
                          • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction Fuzzy Hash: 4F51E7BAB15A00CAD754CF15D808B9AB395F3C8B99F609064EE066B748EF34CC42DF04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2721983767.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709a0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction ID: 425ae51dfe7bd6ea10f93c1d87e22065c9b592431508976835fcf9b4f7ab9431
                          • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction Fuzzy Hash: 1131D1B9615B40DAE710DF11EC4879AB7A4F3C8B9AF258014EE4A6B794DF38C942DB04
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction ID: 30429b6e85d52d015e3732def11cd14d4559421b5eb639c62a2224f3fa9bfba5
                          • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction Fuzzy Hash: 66D1CF77714A80C9E711CF65D8403DC3BA1F398799F24421ADE59ABBA9EE34C927CB40
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction ID: 6c2322820e03c340fe85ce000d17cb2736a86ce4299153c466e268a4634f297b
                          • Opcode Fuzzy Hash: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction Fuzzy Hash: CF014C3B608E94D6D705DF66ED0428A77A1F78CFC2F144429EA4967729DE38C462CB40
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: ConsoleErrorLastMode
                          • String ID:
                          • API String ID: 953036326-0
                          • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction ID: 9698fe35d1373322723ac282d06d8dd41e13e0f968837ab8ea655e484caeaefb
                          • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction Fuzzy Hash: 45918E7B610A54C5F7609F65DC403ED3BA0B789B8AF38411DDE4A7B6A5DE34C8A38B00
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction ID: d83516dcc5bf840c11a0c3c522cc2f90a05092959f30cd3160fc22130dc72981
                          • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction Fuzzy Hash: A9115A3A714F00CAEB00CF60EC543A833A4F79D769F540E21EA6D5A7A4DF78D5A98780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction ID: f47752b0ae6f6901657473cb0ccd733c6e7a9ca02a6f2b5df069b7bf189e1af2
                          • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction Fuzzy Hash: C571C23A248F89C6E7349E25DC443EA7794F3DDB86F640026DD496BB8ADE35C646CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2721983767.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709a0000_svchost.jbxd
                          Similarity
                          • API ID: CallTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3163161869-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: 489574c67d8b5b6cc54a2877ae297f4e8f41fd0bb560a578f5265c3132118aee
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: 3761497A608B44CAEB20DF65D8403DD77A0F388B89F244215EF492BB99DF38D556DB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction ID: babde32fb5154fc8530fc586cff3b7450ac821e147294971176bd01e01761f2d
                          • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction Fuzzy Hash: B051E63A24CB89C1E6359B29E8583EA7751F3ED782F640125DD492BB6BCE39C5068F40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction ID: 21ff62e2b89e22826b140db66bb7822c727ad4cd8fe966186e5f0310e84707f2
                          • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction Fuzzy Hash: 8841A037219A80C2DB208F25E8443EAB7A0F79C795F644025EE4D9B798EF3CC952CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction ID: 20f4be22c22dfa457ef3525fbc3f7e3b2bed3974d008a9829f0cdff42773ce01
                          • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction Fuzzy Hash: 8D112B36218F84C2EB619B15F94039977E5F788B95F684224EE8D1BB69DF3CC952CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2721983767.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709a0000_svchost.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: ierarchy Descriptor'$riptor at (
                          • API String ID: 592178966-758928094
                          • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction ID: 3b3cf7cab3b32b493eb2ba88bbe49323af7bffc66ca1579de9ffd3a8dc560e24
                          • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction Fuzzy Hash: 13E086B1640F44D0DF018F61EC403D873A0DB9CB68BA89122D95C5A311FE38D5FAC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2721983767.00000158709A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709a0000_svchost.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: Locator'$riptor at (
                          • API String ID: 592178966-4215709766
                          • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction ID: 8b563b15b0da3dea3b2a42213421ba672c2fb53560027d55dbb8324bba71f4a8
                          • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction Fuzzy Hash: EDE08671600F44D0DF028F61D8403D87360E79CB68B989122C94C5A311EE38D5E6C700
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction ID: 29c7f6ae37fee443e275d0900ba1dffe24d5f51a1d6125abf64e6308baa90841
                          • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction Fuzzy Hash: B2118E3A615F48C1EA048B66A8043A977A0E7CDFC2F2840289E8D6B766DE38C852C700
                          APIs
                          Memory Dump Source
                          • Source File: 0000001E.00000002.2722834758.00000158709D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000158709D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_30_2_158709d0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction ID: 0df0b71972fc614dcc7a18976dac37df89d2385fd46c5fb6c76c0ed9fa5f8c47
                          • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction Fuzzy Hash: 24E0653A601A04C6E7058F52DC0838E3AE1FBCDF56F14C014C9090B361DF7D88A6CB50

                          Execution Graph

                          Execution Coverage:1.6%
                          Dynamic/Decrypted Code Coverage:95.2%
                          Signature Coverage:0%
                          Total number of Nodes:124
                          Total number of Limit Nodes:16
                          execution_graph 15073 26db16d3ab9 15074 26db16d3a06 15073->15074 15075 26db16d3a56 VirtualQuery 15074->15075 15076 26db16d3a8a VirtualAlloc 15074->15076 15078 26db16d3a70 15074->15078 15075->15074 15075->15078 15077 26db16d3abb GetLastError 15076->15077 15076->15078 15077->15074 15077->15078 15079 26db16d1abc 15085 26db16d1628 GetProcessHeap 15079->15085 15081 26db16d1ad2 Sleep SleepEx 15083 26db16d1acb 15081->15083 15083->15081 15084 26db16d1598 StrCmpIW StrCmpW 15083->15084 15130 26db16d18b4 15083->15130 15084->15083 15086 26db16d1648 __free_lconv_mon 15085->15086 15147 26db16d1268 GetProcessHeap 15086->15147 15088 26db16d1650 15089 26db16d1268 2 API calls 15088->15089 15090 26db16d1661 15089->15090 15091 26db16d1268 2 API calls 15090->15091 15092 26db16d166a 15091->15092 15093 26db16d1268 2 API calls 15092->15093 15094 26db16d1673 15093->15094 15095 26db16d168e RegOpenKeyExW 15094->15095 15096 26db16d18a6 15095->15096 15097 26db16d16c0 RegOpenKeyExW 15095->15097 15096->15083 15098 26db16d16e9 15097->15098 15099 26db16d16ff RegOpenKeyExW 15097->15099 15158 26db16d12bc RegQueryInfoKeyW 15098->15158 15101 26db16d173a RegOpenKeyExW 15099->15101 15102 26db16d1723 15099->15102 15105 26db16d1775 RegOpenKeyExW 15101->15105 15106 26db16d175e 15101->15106 15151 26db16d104c RegQueryInfoKeyW 15102->15151 15103 26db16d16f5 RegCloseKey 15103->15099 15107 26db16d1799 15105->15107 15108 26db16d17b0 RegOpenKeyExW 15105->15108 15110 26db16d12bc 11 API calls 15106->15110 15111 26db16d12bc 11 API calls 15107->15111 15112 26db16d17eb RegOpenKeyExW 15108->15112 15113 26db16d17d4 15108->15113 15114 26db16d176b RegCloseKey 15110->15114 15115 26db16d17a6 RegCloseKey 15111->15115 15117 26db16d1826 RegOpenKeyExW 15112->15117 15118 26db16d180f 15112->15118 15116 26db16d12bc 11 API calls 15113->15116 15114->15105 15115->15108 15119 26db16d17e1 RegCloseKey 15116->15119 15121 26db16d184a 15117->15121 15122 26db16d1861 RegOpenKeyExW 15117->15122 15120 26db16d104c 4 API calls 15118->15120 15119->15112 15125 26db16d181c RegCloseKey 15120->15125 15126 26db16d104c 4 API calls 15121->15126 15123 26db16d189c RegCloseKey 15122->15123 15124 26db16d1885 15122->15124 15123->15096 15127 26db16d104c 4 API calls 15124->15127 15125->15117 15128 26db16d1857 RegCloseKey 15126->15128 15129 26db16d1892 RegCloseKey 15127->15129 15128->15122 15129->15123 15176 26db16d14a4 15130->15176 15169 26db16e6168 15147->15169 15150 26db16d12ae __free_lconv_mon 15150->15088 15152 26db16d11b5 RegCloseKey 15151->15152 15153 26db16d10bf 15151->15153 15152->15101 15153->15152 15154 26db16d10cf RegEnumValueW 15153->15154 15155 26db16d1125 __free_lconv_mon 15154->15155 15155->15152 15155->15154 15156 26db16d114e GetProcessHeap 15155->15156 15157 26db16d116e GetProcessHeap 15155->15157 15156->15155 15157->15155 15159 26db16d148a __free_lconv_mon 15158->15159 15160 26db16d1327 GetProcessHeap 15158->15160 15159->15103 15163 26db16d133e __free_lconv_mon 15160->15163 15161 26db16d1476 GetProcessHeap 15161->15159 15162 26db16d1352 RegEnumValueW 15162->15163 15163->15161 15163->15162 15165 26db16d13d3 GetProcessHeap 15163->15165 15166 26db16d141e lstrlenW GetProcessHeap 15163->15166 15167 26db16d1443 StrCpyW 15163->15167 15168 26db16d13f3 GetProcessHeap 15163->15168 15171 26db16d152c 15163->15171 15165->15163 15166->15163 15167->15163 15168->15163 15170 26db16d1283 GetProcessHeap 15169->15170 15170->15150 15172 26db16d1546 15171->15172 15175 26db16d157c 15171->15175 15173 26db16d1565 StrCmpW 15172->15173 15174 26db16d155d StrCmpIW 15172->15174 15172->15175 15173->15172 15174->15172 15175->15163 15177 26db16d14e1 GetProcessHeap 15176->15177 15178 26db16d14c1 GetProcessHeap 15176->15178 15182 26db16e6180 15177->15182 15179 26db16d14da __free_lconv_mon 15178->15179 15179->15177 15179->15178 15183 26db16d14f6 GetProcessHeap HeapFree 15182->15183 15184 26db16a273c 15185 26db16a276a 15184->15185 15186 26db16a27c5 VirtualAlloc 15185->15186 15189 26db16a28d4 15185->15189 15188 26db16a27ec 15186->15188 15186->15189 15187 26db16a2858 LoadLibraryA 15187->15188 15188->15187 15188->15189 15190 26db16d28c8 15192 26db16d290e 15190->15192 15191 26db16d2970 15192->15191 15194 26db16d3844 15192->15194 15195 26db16d3866 15194->15195 15196 26db16d3851 StrCmpNIW 15194->15196 15195->15192 15196->15195 15197 26db16d554d 15199 26db16d5554 15197->15199 15198 26db16d55bb 15199->15198 15200 26db16d5637 VirtualProtect 15199->15200 15201 26db16d5671 15200->15201 15202 26db16d5663 GetLastError 15200->15202 15202->15201 15203 26db16d5cf0 15204 26db16d5cfd 15203->15204 15205 26db16d5d09 15204->15205 15211 26db16d5e1a 15204->15211 15206 26db16d5d3e 15205->15206 15207 26db16d5d8d 15205->15207 15208 26db16d5d66 SetThreadContext 15206->15208 15208->15207 15209 26db16d5e41 VirtualProtect FlushInstructionCache 15209->15211 15210 26db16d5efe 15212 26db16d5f1e 15210->15212 15223 26db16d43e0 15210->15223 15211->15209 15211->15210 15219 26db16d4df0 GetCurrentProcess 15212->15219 15215 26db16d5f23 15216 26db16d5f37 ResumeThread 15215->15216 15218 26db16d5f77 _log10_special 15215->15218 15217 26db16d5f6b 15216->15217 15217->15215 15222 26db16d4e0c 15219->15222 15220 26db16d4e22 VirtualProtect FlushInstructionCache 15220->15222 15221 26db16d4e53 15221->15215 15222->15220 15222->15221 15225 26db16d43fc 15223->15225 15224 26db16d445f 15224->15212 15225->15224 15226 26db16d4412 VirtualFree 15225->15226 15226->15225

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 106492572-2879589442
                          • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction ID: 4ce60c9cfab9b5366f898af9bc43f1963af320a3cfcb6bf805752a04d3ff00ad
                          • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction Fuzzy Hash: 57712B37B10A18C6EB509F66EC5869923B5F798B8CF425211DE4E87B6CEF76C544C380

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID: wr
                          • API String ID: 1092925422-2678910430
                          • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction ID: a5bfad009d77d4f236170802a3cd6a43ef16cd8bdcb0cf630a703b92f7e835be
                          • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction Fuzzy Hash: 84118B76B00B4882EF549B22E80C26967B0FB88B89F460128DE8903798EF3EC605C744

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 59 26db16d5b30-26db16d5b57 60 26db16d5b59-26db16d5b68 59->60 61 26db16d5b6b-26db16d5b76 GetCurrentThreadId 59->61 60->61 62 26db16d5b78-26db16d5b7d 61->62 63 26db16d5b82-26db16d5b89 61->63 64 26db16d5faf-26db16d5fc6 call 26db16d7940 62->64 65 26db16d5b9b-26db16d5baf 63->65 66 26db16d5b8b-26db16d5b96 call 26db16d5960 63->66 68 26db16d5bbe-26db16d5bc4 65->68 66->64 71 26db16d5bca-26db16d5bd3 68->71 72 26db16d5c95-26db16d5cb6 68->72 75 26db16d5c1a-26db16d5c8d call 26db16d4510 call 26db16d44b0 call 26db16d4470 71->75 76 26db16d5bd5-26db16d5c18 call 26db16d85c0 71->76 77 26db16d5cbc-26db16d5cdc GetThreadContext 72->77 78 26db16d5e1f-26db16d5e30 call 26db16d74bf 72->78 88 26db16d5c90 75->88 76->88 82 26db16d5e1a 77->82 83 26db16d5ce2-26db16d5d03 77->83 91 26db16d5e35-26db16d5e3b 78->91 82->78 83->82 92 26db16d5d09-26db16d5d12 83->92 88->68 97 26db16d5e41-26db16d5e98 VirtualProtect FlushInstructionCache 91->97 98 26db16d5efe-26db16d5f0e 91->98 94 26db16d5d92-26db16d5da3 92->94 95 26db16d5d14-26db16d5d25 92->95 104 26db16d5e15 94->104 105 26db16d5da5-26db16d5dc3 94->105 99 26db16d5d27-26db16d5d3c 95->99 100 26db16d5d8d 95->100 102 26db16d5e9a-26db16d5ea4 97->102 103 26db16d5ec9-26db16d5ef9 call 26db16d78ac 97->103 106 26db16d5f1e-26db16d5f2a call 26db16d4df0 98->106 107 26db16d5f10-26db16d5f17 98->107 99->100 108 26db16d5d3e-26db16d5d88 call 26db16d3970 SetThreadContext 99->108 100->104 102->103 110 26db16d5ea6-26db16d5ec1 call 26db16d4390 102->110 103->91 105->104 112 26db16d5dc5-26db16d5e0c call 26db16d3900 105->112 121 26db16d5f2f-26db16d5f35 106->121 107->106 113 26db16d5f19 call 26db16d43e0 107->113 108->100 110->103 112->104 126 26db16d5e10 call 26db16d74dd 112->126 113->106 124 26db16d5f77-26db16d5f95 121->124 125 26db16d5f37-26db16d5f75 ResumeThread call 26db16d78ac 121->125 128 26db16d5fa9 124->128 129 26db16d5f97-26db16d5fa6 124->129 125->121 126->104 128->64 129->128
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                          • Instruction ID: d32536d4505a5c157cb9107ef26c06028ea8f41c32301a1541970d7f654dc29e
                          • Opcode Fuzzy Hash: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                          • Instruction Fuzzy Hash: 43D18976605B8881DB709B0AE89835A77B0F3C9B88F114216EECD47BA9DF3DC551CB80

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 131 26db16d50d0-26db16d50fc 132 26db16d50fe-26db16d5106 131->132 133 26db16d510d-26db16d5116 131->133 132->133 134 26db16d5118-26db16d5120 133->134 135 26db16d5127-26db16d5130 133->135 134->135 136 26db16d5132-26db16d513a 135->136 137 26db16d5141-26db16d514a 135->137 136->137 138 26db16d514c-26db16d5151 137->138 139 26db16d5156-26db16d5161 GetCurrentThreadId 137->139 140 26db16d56d3-26db16d56da 138->140 141 26db16d5163-26db16d5168 139->141 142 26db16d516d-26db16d5174 139->142 141->140 143 26db16d5176-26db16d517c 142->143 144 26db16d5181-26db16d518a 142->144 143->140 145 26db16d518c-26db16d5191 144->145 146 26db16d5196-26db16d51a2 144->146 145->140 147 26db16d51a4-26db16d51c9 146->147 148 26db16d51ce-26db16d5225 call 26db16d56e0 * 2 146->148 147->140 153 26db16d523a-26db16d5243 148->153 154 26db16d5227-26db16d522e 148->154 157 26db16d5255-26db16d525e 153->157 158 26db16d5245-26db16d5252 153->158 155 26db16d5236 154->155 156 26db16d5230 154->156 155->153 160 26db16d52a6-26db16d52aa 155->160 159 26db16d52b0-26db16d52b6 156->159 161 26db16d5273-26db16d5298 call 26db16d7870 157->161 162 26db16d5260-26db16d5270 157->162 158->157 163 26db16d52e5-26db16d52eb 159->163 164 26db16d52b8-26db16d52d4 call 26db16d4390 159->164 160->159 170 26db16d529e 161->170 171 26db16d532d-26db16d5342 call 26db16d3cc0 161->171 162->161 166 26db16d5315-26db16d5328 163->166 167 26db16d52ed-26db16d530c call 26db16d78ac 163->167 164->163 176 26db16d52d6-26db16d52de 164->176 166->140 167->166 170->160 178 26db16d5351-26db16d535a 171->178 179 26db16d5344-26db16d534c 171->179 176->163 180 26db16d536c-26db16d53ba call 26db16d8c60 178->180 181 26db16d535c-26db16d5369 178->181 179->160 184 26db16d53c2-26db16d53ca 180->184 181->180 185 26db16d54d7-26db16d54df 184->185 186 26db16d53d0-26db16d54bb call 26db16d7440 184->186 188 26db16d54e1-26db16d54f4 call 26db16d4590 185->188 189 26db16d5523-26db16d552b 185->189 197 26db16d54bd 186->197 198 26db16d54bf-26db16d54ce call 26db16d4060 186->198 200 26db16d54f6 188->200 201 26db16d54f8-26db16d5521 188->201 190 26db16d5537-26db16d5546 189->190 191 26db16d552d-26db16d5535 189->191 195 26db16d5548 190->195 196 26db16d554f 190->196 191->190 194 26db16d5554-26db16d5561 191->194 203 26db16d5564-26db16d55b9 call 26db16d85c0 194->203 204 26db16d5563 194->204 195->196 196->194 197->185 207 26db16d54d2 198->207 208 26db16d54d0 198->208 200->189 201->185 210 26db16d55bb-26db16d55c3 203->210 211 26db16d55c8-26db16d5661 call 26db16d4510 call 26db16d4470 VirtualProtect 203->211 204->203 207->184 208->185 216 26db16d5671-26db16d56d1 211->216 217 26db16d5663-26db16d5668 GetLastError 211->217 216->140 217->216
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                          • Instruction ID: 0be94f0c496fe40b7e2810e11e0833423463446b708cc81adc7848cfe4bc36ee
                          • Opcode Fuzzy Hash: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                          • Instruction Fuzzy Hash: C902D932A19B8886E760CB56F89475AB7B1F3C5788F114016EA8E87BACDF7DC454CB40

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Virtual$AllocQuery
                          • String ID:
                          • API String ID: 31662377-0
                          • Opcode ID: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                          • Instruction ID: 3b48648ec94fa092fe4efad0f9a845e9b6d15b3daaeba4c17bc1270e402ca5cd
                          • Opcode Fuzzy Hash: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                          • Instruction Fuzzy Hash: 31313272F19A8881EA70DB16E85935E67A0F38878CF150565F9CD06BACDF7EC2408B85

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                          • String ID:
                          • API String ID: 1683269324-0
                          • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction ID: beae08deab80b084e2f725f676bd954daefd8a7d270af60b78aa60878441051e
                          • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction Fuzzy Hash: B41192B2F1068C82FB60AB22FE0D36923A4B75434CF934168D906816DDEF7BC244C6D0

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                          • String ID:
                          • API String ID: 3733156554-0
                          • Opcode ID: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                          • Instruction ID: 3d6453755da34854a45dfe5c773d63dc72ce5a17786c93c6050d11d114495951
                          • Opcode Fuzzy Hash: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                          • Instruction Fuzzy Hash: CEF0D036B19B08C1D631DB06E85575AABA0F3887DCF154115FA8D47B6DCE3EC5908B80

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 265 26db16a273c-26db16a27a4 call 26db16a29d4 * 4 274 26db16a27aa-26db16a27ad 265->274 275 26db16a29b2 265->275 274->275 276 26db16a27b3-26db16a27b6 274->276 277 26db16a29b4-26db16a29d0 275->277 276->275 278 26db16a27bc-26db16a27bf 276->278 278->275 279 26db16a27c5-26db16a27e6 VirtualAlloc 278->279 279->275 280 26db16a27ec-26db16a280c 279->280 281 26db16a2838-26db16a283f 280->281 282 26db16a280e-26db16a2836 280->282 283 26db16a2845-26db16a2852 281->283 284 26db16a28df-26db16a28e6 281->284 282->281 282->282 283->284 287 26db16a2858-26db16a286a LoadLibraryA 283->287 285 26db16a28ec-26db16a2901 284->285 286 26db16a2992-26db16a29b0 284->286 285->286 288 26db16a2907 285->288 286->277 289 26db16a286c-26db16a2878 287->289 290 26db16a28ca-26db16a28d2 287->290 293 26db16a290d-26db16a2921 288->293 294 26db16a28c5-26db16a28c8 289->294 290->287 291 26db16a28d4-26db16a28d9 290->291 291->284 296 26db16a2923-26db16a2934 293->296 297 26db16a2982-26db16a298c 293->297 294->290 295 26db16a287a-26db16a287d 294->295 301 26db16a28a7-26db16a28b7 295->301 302 26db16a287f-26db16a28a5 295->302 299 26db16a2936-26db16a293d 296->299 300 26db16a293f-26db16a2943 296->300 297->286 297->293 303 26db16a2970-26db16a2980 299->303 304 26db16a2945-26db16a294b 300->304 305 26db16a294d-26db16a2951 300->305 306 26db16a28ba-26db16a28c1 301->306 302->306 303->296 303->297 304->303 307 26db16a2963-26db16a2967 305->307 308 26db16a2953-26db16a2961 305->308 306->294 307->303 310 26db16a2969-26db16a296c 307->310 308->303 310->303
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767375526.0000026DB16A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16a0000_dwm.jbxd
                          Similarity
                          • API ID: AllocLibraryLoadVirtual
                          • String ID:
                          • API String ID: 3550616410-0
                          • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction ID: 07f0f15155d3b63fe84f44c856708faa1704cd92427126b808b8d471c6300ea4
                          • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction Fuzzy Hash: 9E615532F6129887DB14CF16C80872DB392F754FA8F1A8139EE190378CCA39D85AC780

                          Control-flow Graph

                          APIs
                            • Part of subcall function 0000026DB16D1628: GetProcessHeap.KERNEL32 ref: 0000026DB16D1633
                            • Part of subcall function 0000026DB16D1628: HeapAlloc.KERNEL32 ref: 0000026DB16D1642
                            • Part of subcall function 0000026DB16D1628: RegOpenKeyExW.ADVAPI32 ref: 0000026DB16D16B2
                            • Part of subcall function 0000026DB16D1628: RegOpenKeyExW.ADVAPI32 ref: 0000026DB16D16DF
                            • Part of subcall function 0000026DB16D1628: RegCloseKey.ADVAPI32 ref: 0000026DB16D16F9
                            • Part of subcall function 0000026DB16D1628: RegOpenKeyExW.ADVAPI32 ref: 0000026DB16D1719
                            • Part of subcall function 0000026DB16D1628: RegCloseKey.ADVAPI32 ref: 0000026DB16D1734
                            • Part of subcall function 0000026DB16D1628: RegOpenKeyExW.ADVAPI32 ref: 0000026DB16D1754
                            • Part of subcall function 0000026DB16D1628: RegCloseKey.ADVAPI32 ref: 0000026DB16D176F
                            • Part of subcall function 0000026DB16D1628: RegOpenKeyExW.ADVAPI32 ref: 0000026DB16D178F
                            • Part of subcall function 0000026DB16D1628: RegCloseKey.ADVAPI32 ref: 0000026DB16D17AA
                            • Part of subcall function 0000026DB16D1628: RegOpenKeyExW.ADVAPI32 ref: 0000026DB16D17CA
                          • Sleep.KERNEL32 ref: 0000026DB16D1AD7
                          • SleepEx.KERNELBASE ref: 0000026DB16D1ADD
                            • Part of subcall function 0000026DB16D1628: RegCloseKey.ADVAPI32 ref: 0000026DB16D17E5
                            • Part of subcall function 0000026DB16D1628: RegOpenKeyExW.ADVAPI32 ref: 0000026DB16D1805
                            • Part of subcall function 0000026DB16D1628: RegCloseKey.ADVAPI32 ref: 0000026DB16D1820
                            • Part of subcall function 0000026DB16D1628: RegOpenKeyExW.ADVAPI32 ref: 0000026DB16D1840
                            • Part of subcall function 0000026DB16D1628: RegCloseKey.ADVAPI32 ref: 0000026DB16D185B
                            • Part of subcall function 0000026DB16D1628: RegOpenKeyExW.ADVAPI32 ref: 0000026DB16D187B
                            • Part of subcall function 0000026DB16D1628: RegCloseKey.ADVAPI32 ref: 0000026DB16D1896
                            • Part of subcall function 0000026DB16D1628: RegCloseKey.ADVAPI32 ref: 0000026DB16D18A0
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: CloseOpen$HeapSleep$AllocProcess
                          • String ID:
                          • API String ID: 1534210851-0
                          • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction ID: 9ab9c7c3dc2898fd20a131f18e933c9410a2ef9eabe600e11c67b36a472d32f7
                          • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction Fuzzy Hash: C53115B1F10649C1FF509B27DE693A913A4AB54BC8F0A54219E09877DEFF96C451C390

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 575 26db16d2b2c-26db16d2ba5 call 26db16f2ce0 578 26db16d2bab-26db16d2bb1 575->578 579 26db16d2ee0-26db16d2f03 575->579 578->579 580 26db16d2bb7-26db16d2bba 578->580 580->579 581 26db16d2bc0-26db16d2bc3 580->581 581->579 582 26db16d2bc9-26db16d2bd9 GetModuleHandleA 581->582 583 26db16d2bdb-26db16d2beb GetProcAddress 582->583 584 26db16d2bed 582->584 585 26db16d2bf0-26db16d2c0e 583->585 584->585 585->579 587 26db16d2c14-26db16d2c33 StrCmpNIW 585->587 587->579 588 26db16d2c39-26db16d2c3d 587->588 588->579 589 26db16d2c43-26db16d2c4d 588->589 589->579 590 26db16d2c53-26db16d2c5a 589->590 590->579 591 26db16d2c60-26db16d2c73 590->591 592 26db16d2c75-26db16d2c81 591->592 593 26db16d2c83 591->593 594 26db16d2c86-26db16d2c8a 592->594 593->594 595 26db16d2c9a 594->595 596 26db16d2c8c-26db16d2c98 594->596 597 26db16d2c9d-26db16d2ca7 595->597 596->597 598 26db16d2d9d-26db16d2da1 597->598 599 26db16d2cad-26db16d2cb0 597->599 602 26db16d2da7-26db16d2daa 598->602 603 26db16d2ed2-26db16d2eda 598->603 600 26db16d2cc2-26db16d2ccc 599->600 601 26db16d2cb2-26db16d2cbf call 26db16d199c 599->601 605 26db16d2cce-26db16d2cdb 600->605 606 26db16d2d00-26db16d2d0a 600->606 601->600 607 26db16d2dac-26db16d2db8 call 26db16d199c 602->607 608 26db16d2dbb-26db16d2dc5 602->608 603->579 603->591 605->606 612 26db16d2cdd-26db16d2cea 605->612 613 26db16d2d3a-26db16d2d3d 606->613 614 26db16d2d0c-26db16d2d19 606->614 607->608 609 26db16d2df5-26db16d2df8 608->609 610 26db16d2dc7-26db16d2dd4 608->610 617 26db16d2dfa-26db16d2e03 call 26db16d1bbc 609->617 618 26db16d2e05-26db16d2e12 lstrlenW 609->618 610->609 616 26db16d2dd6-26db16d2de3 610->616 619 26db16d2ced-26db16d2cf3 612->619 621 26db16d2d4b-26db16d2d58 lstrlenW 613->621 622 26db16d2d3f-26db16d2d49 call 26db16d1bbc 613->622 614->613 620 26db16d2d1b-26db16d2d28 614->620 625 26db16d2de6-26db16d2dec 616->625 617->618 635 26db16d2e4a-26db16d2e55 617->635 631 26db16d2e35-26db16d2e3f call 26db16d3844 618->631 632 26db16d2e14-26db16d2e1e 618->632 629 26db16d2cf9-26db16d2cfe 619->629 630 26db16d2d93-26db16d2d98 619->630 633 26db16d2d2b-26db16d2d31 620->633 626 26db16d2d5a-26db16d2d64 621->626 627 26db16d2d7b-26db16d2d8d call 26db16d3844 621->627 622->621 622->630 625->635 636 26db16d2dee-26db16d2df3 625->636 626->627 637 26db16d2d66-26db16d2d79 call 26db16d152c 626->637 627->630 640 26db16d2e42-26db16d2e44 627->640 629->606 629->619 630->640 631->640 632->631 641 26db16d2e20-26db16d2e33 call 26db16d152c 632->641 633->630 642 26db16d2d33-26db16d2d38 633->642 645 26db16d2ecc-26db16d2ed0 635->645 646 26db16d2e57-26db16d2e5b 635->646 636->609 636->625 637->627 637->630 640->603 640->635 641->631 641->635 642->613 642->633 645->603 650 26db16d2e63-26db16d2e7d call 26db16d85c0 646->650 651 26db16d2e5d-26db16d2e61 646->651 654 26db16d2e80-26db16d2e83 650->654 651->650 651->654 657 26db16d2ea6-26db16d2ea9 654->657 658 26db16d2e85-26db16d2ea3 call 26db16d85c0 654->658 657->645 660 26db16d2eab-26db16d2ec9 call 26db16d85c0 657->660 658->657 660->645
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction ID: f061ad95e55fc97d5369ddb75918f1acae21ca7b815b603edbd11f341a23fd41
                          • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction Fuzzy Hash: 80B1A172B10A5896EBA4CF26DC587A963A5FB44B8CF46501AEE095779CDF36CC40C7C0
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction ID: a44980cde4e59342962f7947f53dae7cc18474da5eac7b5d5cd06663a62caf82
                          • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction Fuzzy Hash: 6931AB73704B848AEB608F61E8843EE7360F78470CF85412ADA4E47B98EF39C648C740
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction ID: 7dbb111ec5903a8c84558684a7ad943c46906c24a6f9754f8a798c5606a36e66
                          • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction Fuzzy Hash: 44317E33714B848AEB60DF26EC443AE73A4F789758F550226EA9D43BA8DF39C545CB40

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction ID: 783d29d2bda3d253132f4994b95c9cc293394daab674e68720b3b73a17300f3c
                          • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction Fuzzy Hash: 50516A32B10B88C6EB51CF66E94839A77A1F388B99F454224DA490772CDF3DC049C780

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: CurrentThread$AddressHandleModuleProc
                          • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                          • API String ID: 4175298099-1975688563
                          • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction ID: 5ca48a310db2dafeee8d07d252f49e53e2c646e65f9d6de92084b7a15179caae
                          • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction Fuzzy Hash: 4431D2B5F00A4EA0EA00EBAAEC597E42321B75478CFC35117980D4657EAF7AC649C7D0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 417 26db16a6910-26db16a6916 418 26db16a6918-26db16a691b 417->418 419 26db16a6951-26db16a695b 417->419 421 26db16a6945-26db16a6984 call 26db16a6fc0 418->421 422 26db16a691d-26db16a6920 418->422 420 26db16a6a78-26db16a6a8d 419->420 425 26db16a6a9c-26db16a6ab6 call 26db16a6e54 420->425 426 26db16a6a8f 420->426 440 26db16a698a-26db16a699f call 26db16a6e54 421->440 441 26db16a6a52 421->441 423 26db16a6938 __scrt_dllmain_crt_thread_attach 422->423 424 26db16a6922-26db16a6925 422->424 432 26db16a693d-26db16a6944 423->432 428 26db16a6927-26db16a6930 424->428 429 26db16a6931-26db16a6936 call 26db16a6f04 424->429 438 26db16a6ab8-26db16a6aed call 26db16a6f7c call 26db16a6e1c call 26db16a7318 call 26db16a7130 call 26db16a7154 call 26db16a6fac 425->438 439 26db16a6aef-26db16a6b20 call 26db16a7190 425->439 430 26db16a6a91-26db16a6a9b 426->430 429->432 438->430 449 26db16a6b31-26db16a6b37 439->449 450 26db16a6b22-26db16a6b28 439->450 452 26db16a69a5-26db16a69b6 call 26db16a6ec4 440->452 453 26db16a6a6a-26db16a6a77 call 26db16a7190 440->453 444 26db16a6a54-26db16a6a69 441->444 456 26db16a6b39-26db16a6b43 449->456 457 26db16a6b7e-26db16a6b94 call 26db16a268c 449->457 450->449 455 26db16a6b2a-26db16a6b2c 450->455 467 26db16a6a07-26db16a6a11 call 26db16a7130 452->467 468 26db16a69b8-26db16a69dc call 26db16a72dc call 26db16a6e0c call 26db16a6e38 call 26db16aac0c 452->468 453->420 462 26db16a6c1f-26db16a6c2c 455->462 463 26db16a6b45-26db16a6b4d 456->463 464 26db16a6b4f-26db16a6b5d call 26db16b5780 456->464 475 26db16a6b96-26db16a6b98 457->475 476 26db16a6bcc-26db16a6bce 457->476 470 26db16a6b63-26db16a6b78 call 26db16a6910 463->470 464->470 486 26db16a6c15-26db16a6c1d 464->486 467->441 488 26db16a6a13-26db16a6a1f call 26db16a7180 467->488 468->467 520 26db16a69de-26db16a69e5 __scrt_dllmain_after_initialize_c 468->520 470->457 470->486 475->476 483 26db16a6b9a-26db16a6bbc call 26db16a268c call 26db16a6a78 475->483 484 26db16a6bd5-26db16a6bea call 26db16a6910 476->484 485 26db16a6bd0-26db16a6bd3 476->485 483->476 514 26db16a6bbe-26db16a6bc6 call 26db16b5780 483->514 484->486 499 26db16a6bec-26db16a6bf6 484->499 485->484 485->486 486->462 507 26db16a6a45-26db16a6a50 488->507 508 26db16a6a21-26db16a6a2b call 26db16a7098 488->508 504 26db16a6bf8-26db16a6bff 499->504 505 26db16a6c01-26db16a6c11 call 26db16b5780 499->505 504->486 505->486 507->444 508->507 519 26db16a6a2d-26db16a6a3b 508->519 514->476 519->507 520->467 521 26db16a69e7-26db16a6a04 call 26db16aabc8 520->521 521->467
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767375526.0000026DB16A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16a0000_dwm.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                          • API String ID: 190073905-1786718095
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: 3a6fecc462d4599d32a4f435162b826d9bb8301b484b22a45ca561f754a01f80
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: A2810231F2024D86FA94AB269C5D39962D0EBA578CF4BA0259F054379EDF3BC84D8780

                          Control-flow Graph

                          APIs
                          • GetLastError.KERNEL32 ref: 0000026DB16DCE37
                          • FlsGetValue.KERNEL32(?,?,?,0000026DB16E0A6B,?,?,?,0000026DB16E045C,?,?,?,0000026DB16DC84F), ref: 0000026DB16DCE4C
                          • FlsSetValue.KERNEL32(?,?,?,0000026DB16E0A6B,?,?,?,0000026DB16E045C,?,?,?,0000026DB16DC84F), ref: 0000026DB16DCE6D
                          • FlsSetValue.KERNEL32(?,?,?,0000026DB16E0A6B,?,?,?,0000026DB16E045C,?,?,?,0000026DB16DC84F), ref: 0000026DB16DCE9A
                          • FlsSetValue.KERNEL32(?,?,?,0000026DB16E0A6B,?,?,?,0000026DB16E045C,?,?,?,0000026DB16DC84F), ref: 0000026DB16DCEAB
                          • FlsSetValue.KERNEL32(?,?,?,0000026DB16E0A6B,?,?,?,0000026DB16E045C,?,?,?,0000026DB16DC84F), ref: 0000026DB16DCEBC
                          • SetLastError.KERNEL32 ref: 0000026DB16DCED7
                          • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,0000026DB16E0A6B,?,?,?,0000026DB16E045C,?,?,?,0000026DB16DC84F), ref: 0000026DB16DCF0D
                          • FlsSetValue.KERNEL32(?,?,00000001,0000026DB16DECCC,?,?,?,?,0000026DB16DBF9F,?,?,?,?,?,0000026DB16D7AB0), ref: 0000026DB16DCF2C
                            • Part of subcall function 0000026DB16DD6CC: HeapAlloc.KERNEL32 ref: 0000026DB16DD721
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000026DB16E0A6B,?,?,?,0000026DB16E045C,?,?,?,0000026DB16DC84F), ref: 0000026DB16DCF54
                            • Part of subcall function 0000026DB16DD744: HeapFree.KERNEL32 ref: 0000026DB16DD75A
                            • Part of subcall function 0000026DB16DD744: GetLastError.KERNEL32 ref: 0000026DB16DD764
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000026DB16E0A6B,?,?,?,0000026DB16E045C,?,?,?,0000026DB16DC84F), ref: 0000026DB16DCF65
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000026DB16E0A6B,?,?,?,0000026DB16E045C,?,?,?,0000026DB16DC84F), ref: 0000026DB16DCF76
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Value$ErrorLast$Heap$AllocFree
                          • String ID:
                          • API String ID: 570795689-0
                          • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction ID: 1dfd4429d99dc5b3bfe79a887dc16bb6e87e9ad2ea3952576508cef4c5d25d48
                          • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction Fuzzy Hash: 49419570F0128C41FA69A7379D5D37922429F957FCF170B68A936466EEFE6BC84182C0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                          • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                          • API String ID: 2171963597-1373409510
                          • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction ID: 614e3c959a348e1a0bd1af7f8105fb8c116d018bd81af7a4b925cfae25fccb79
                          • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction Fuzzy Hash: 59213832B14A5882EB10CB25E94835A67A0F799BA8F910315EA5903AA8CF7DC589CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction ID: cb15ce58358aa12ddbad5d6868dfc74487d81a3d160813501bf1dccd4f5a7ce6
                          • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction Fuzzy Hash: 57E1A272F08B888AEB20DF66D84939D77A0F745B9CF160115EE8997BADCB35C481C781
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767375526.0000026DB16A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16a0000_dwm.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction ID: 8b2dbfb1c0290860a701e07f0150c360fa714c78082b514e8e4bc3028f1fecd3
                          • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction Fuzzy Hash: 4DE1C232B20B488AEB60DF65D88839D77A4F74578CF220116EF8957B9DCB36C499C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: AddressFreeLibraryProc
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3013587201-537541572
                          • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction ID: 23862d01230f99906d7ba31e603bacaa232843ea2f24dfae770fb89b3f623dbd
                          • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction Fuzzy Hash: 0E41D432B12A1891FB16CB17AD0C7597391BB55BE8F4B42299D0E8778DEE3AC446C3C0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction ID: 80980c4cf32087191c45bf0831024f043970d1b07aacf444f87c9caeb67ac13b
                          • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction Fuzzy Hash: CC416F33614B88C6E760CF22E84879E77A1F389B9DF458129DA8907B5CDF79C549CB40
                          APIs
                          • FlsGetValue.KERNEL32(?,?,?,0000026DB16DC7DE,?,?,?,?,?,?,?,?,0000026DB16DCF9D,?,?,00000001), ref: 0000026DB16DD087
                          • FlsSetValue.KERNEL32(?,?,?,0000026DB16DC7DE,?,?,?,?,?,?,?,?,0000026DB16DCF9D,?,?,00000001), ref: 0000026DB16DD0A6
                          • FlsSetValue.KERNEL32(?,?,?,0000026DB16DC7DE,?,?,?,?,?,?,?,?,0000026DB16DCF9D,?,?,00000001), ref: 0000026DB16DD0CE
                          • FlsSetValue.KERNEL32(?,?,?,0000026DB16DC7DE,?,?,?,?,?,?,?,?,0000026DB16DCF9D,?,?,00000001), ref: 0000026DB16DD0DF
                          • FlsSetValue.KERNEL32(?,?,?,0000026DB16DC7DE,?,?,?,?,?,?,?,?,0000026DB16DCF9D,?,?,00000001), ref: 0000026DB16DD0F0
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Value
                          • String ID: 1%$Y%
                          • API String ID: 3702945584-1395475152
                          • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction ID: 4aa6b3a8704498592abd708b5eb6e15fef0dbd7259eb9a06b53c85cb51cfc9dc
                          • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction Fuzzy Hash: 94119830F0468C41FA6877379D5D37962419B947FCF1643249839877DEDE6BC842C280
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: 442f895a101040b9a6ca9aa65b692f4df1b749e70d04fc0ed39d60586071f16d
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: 7F810631F0024D86FB589B67AC4D3A923D0B79578CF5745259E284379EEB3BC84587C2
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction ID: 6ca346e454cfd92a7849e01f24f1a2e046116f5d531bd515520c9fa46ff87167
                          • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction Fuzzy Hash: EA31E832B12648E1EE16DF43EC0875963A4BB48BA8F5B06259D1D4B39CDF3AC445C380
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction ID: 6ffd71a2568f34f4d0a4be1afeabc81a42479b8ea2c55d714e7d91cc3bbf7f53
                          • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction Fuzzy Hash: 4F118F32B10B84C6E7508B56EC4831977A0F798FE9F454325EA5A877A8DF7AC91487C0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: dialer
                          • API String ID: 756756679-3528709123
                          • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction ID: 518d90a15e203b60b77fc06b985c2e5cd065da236590d968bda13b6ce4ccb7ae
                          • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction Fuzzy Hash: 7E31D432B01B5992EB15CF1BED4876967A0FB54B88F0A45289F4847B5DEF36C4A1C780
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Value$ErrorLast
                          • String ID:
                          • API String ID: 2506987500-0
                          • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction ID: aadf191c3bc430bf2b71899c07df16868e5666ad7837e1ceb6418e549bce8ab6
                          • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction Fuzzy Hash: 19117230F0028C81FA64A7379D4D3692241AF997FCF164764A836877DEEE6BC842C2C0
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction ID: 2ef424fd71c33c3275d9d0364e62af2e3daa73f11d3374b53f5eb61c150a89b5
                          • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction Fuzzy Hash: F5016932B00A4882EB60DB53E84C39963A1F798BC9F894135DE4943758DF3EC989C780
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction ID: 9b693a77c80fedb0c5e290b7f00261e59e3aa41f474713aacdf3ed26c8cd5b2a
                          • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction Fuzzy Hash: 85012D76B11B4882FB649B22EC0C72967B0BB55B8AF460528CD4907758EF3EC148C784
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 2395640692-629598281
                          • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                          • Instruction ID: a8ddc4b7fa55c18ae27fb7ec41ef27b85f914138bcb2f2a1d9efbdd7369d3ae6
                          • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                          • Instruction Fuzzy Hash: 2851DF32B016098AEB14DF27EC4CB5937A6F355B9DF528528EE1A4778CEB36C841C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction ID: 6cb0346c15be34064597705ea3373a5a206949c9eb0e788294d4bcc24a6b25ad
                          • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction Fuzzy Hash: 40F0AF33B0064882EB208B21FC8875967A0F758B9CFC94120CA494795CDF7EC68DCB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction ID: 3bbfbd0405c91b612498a7494207a9781375a7c4c5686d7bd9aa336d4ec1e5e2
                          • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction Fuzzy Hash: AFF08C72B04B8882EA108F13FD0C1196260BB58FD8F89A230EE4A47B1CDF3DC5498780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction ID: 0f3e6374350b6b08af56951c568dee6a3c39e094098c9b90a3b4e8b2bce32597
                          • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction Fuzzy Hash: 6DF06272B1160881EB148B25EC4C3596320FB9976DF950319CA6A451ECCF2EC144C780
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                          • Instruction ID: 7290aec49ca32193504c701ef8a2b982d3efc03b80afbc7b78ee5f1d21fe62db
                          • Opcode Fuzzy Hash: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                          • Instruction Fuzzy Hash: A9619C36A19B88C6E7608B16E84832A77F1F389798F121115EA8D47BACDF7EC554CB40
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: 2b69298bfac46e0e9955329393b1e83c6515748aae9c4a278b795cb3214705fd
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: 2B115133F14B5911FE641578DC5D3F611417BAC3BDFDB0724A976C66DE9A2AC8418280
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767375526.0000026DB16A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16a0000_dwm.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: 593f35775e50da7d32896c4b2545752251af864b4640db53a9cca433e2b3f410
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: 4511C273F20E1951FBA41569EC5F36B11806B5837CF4B8638AA76063EFCB2ACB4542D0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767375526.0000026DB16A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16a0000_dwm.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: Tuesday$Wednesday$or copy constructor iterator'
                          • API String ID: 3215553584-4202648911
                          • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction ID: 5ebd46b730b06b6c3a7c5ba3bded52db2250872c8954f7079273c702de355f0d
                          • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction Fuzzy Hash: 5061E736F2024C42FA659B65DC5C36E6AA1F78278DF538595CA0A037ACDB37D849C382
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: 69a9012ee5ea0548b0d2bbdee781d3d077830e5aa702081f5ddeea3bace69942
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: 57617C33B05B888AEB20DF66D84439D77A0F344B9CF094215EF4957BA8DB39D595C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: 327da065cc4a45ab55e3526cc89f2f74f37924d3f51ae6d31c598fe3f463d74a
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: 73519472B083888AEB748F27D98835977A0F394B8DF168155DA5987BEDCB39D450C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767375526.0000026DB16A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16a0000_dwm.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: 39c8cd57d63b7f08941b248c3afec0bb9246d15bfd564bc99c248fffc6297a81
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: 5051A232B20388CAEB748F15984835C77A0F755B8CF198117DA99C7BD9CB7AD468C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767375526.0000026DB16A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16a0000_dwm.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction ID: ba0babd600ad823bb9d1fc2a7acd5a32e61694e61a44cef9269ad75d2de4c871
                          • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction Fuzzy Hash: 5D51D332F212088AEB94DF15E80CB5937A9F350B9DF628124DE864378CEB36CC48C784
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767375526.0000026DB16A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16a0000_dwm.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction ID: 47f39dc684159c25b116328b957df09f68f0ed95ef83e230d460e5f3f8123675
                          • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction Fuzzy Hash: 6E31CE32B217449AE754DF11EC4CB5A77A8F340B8DF268018EE9A4378DDB3AC944C784
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction ID: 91fbc802da0b0297f9476339cf9a4bd1c78bf95e9cf061a25798af8d89c02c3e
                          • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction Fuzzy Hash: D0D1F173B15A88C9E711CFA9D84839C3BB2F35879CF91821ACE5997B9DDA35C506C380
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction ID: 8684bb06715233c5d01a5712643569e94e2febd60b731d297dff651c11180fa2
                          • Opcode Fuzzy Hash: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction Fuzzy Hash: 0F015A33A11B98C6E705DF6AED0818E77A1F798F8AF464529EA4A43729DE39C051C780
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: ConsoleErrorLastMode
                          • String ID:
                          • API String ID: 953036326-0
                          • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction ID: 14595e801368312b2b4d049948148bbe312ee04c196abcc8c76a6b5ef54d77ac
                          • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction Fuzzy Hash: B791C373F1065885FB609F65DC883AD3BA2B758B8CF96420DDE0A5769CDB36C486C780
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction ID: b3c880933e97eaa639dd4f6a8f64ed9772496b6a4d29c3b49defe1f114df9023
                          • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction Fuzzy Hash: 89112E32B10F0589EB00CF65EC583A833A4F75976CF450E25EA6D467A8DF79C198C380
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction ID: 298022a7acc73565e250f33f8b31f08b428c813ca84fb372204810daa8dcb42c
                          • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction Fuzzy Hash: A971AF36B0078996E7749E27DC483BA67A4F389B88F57002ADD0A53B8DDB76C645C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767375526.0000026DB16A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16a0000_dwm.jbxd
                          Similarity
                          • API ID: CallTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3163161869-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: e0b3fd25bbba28315ba649b84fa609878df92712a1dc12a9c2592f7d9f34f948
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: A6615832B10B888AEB20DF65D84439D77A0F744B8CF154216EF4917B9DDB39D599C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction ID: 0c2d0216a09e7878ccb6a2058fb5a8597ee3a79d05e1c0a718a1d56be4797acd
                          • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction Fuzzy Hash: 2F510532B0438991E675DF2BE89C3AA6761F385788F860129DE4A03B9DCA3BC545C7C0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction ID: 410ec2598750b0416dfc0247b74c10f1dc0129761037cd2abae50b5229506de2
                          • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction Fuzzy Hash: 3C41C473B14A8886DB20CF25EC483AA77A1F798798F824125EE4D87798EB7DC545C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction ID: 6597dff648576a4e1a734d6d6906ea731fc3c42b6a67da9cd1ec9f65bfd95259
                          • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction Fuzzy Hash: 71113A32615B8482EB618F16F848359B7E5FB88B98F594220EE8D07B6DDF3EC551CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767375526.0000026DB16A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16a0000_dwm.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: ierarchy Descriptor'$riptor at (
                          • API String ID: 592178966-758928094
                          • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction ID: afbb4bd82e327e952dd37b9e92ac0c03032dd50679c374ef09ccae5e46efb32c
                          • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction Fuzzy Hash: F8E08671B50B8890DF019F21EC452D833A4DB5AB68B599122DA5C06315FA38D1F9C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767375526.0000026DB16A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16A0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16a0000_dwm.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: Locator'$riptor at (
                          • API String ID: 592178966-4215709766
                          • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction ID: 573625d22f3197b235dd74c315a9913689c20fc06301d169117061f96ebbf3f0
                          • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction Fuzzy Hash: F4E08671B10B4880DF029F21D8411D87364E75AB58B899122CA4C06315EA38D1E9C340
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction ID: d475f02128de9ffa17f94c88c8097d29b2a1ac63b93d49f67c48d5d7655aa532
                          • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction Fuzzy Hash: CF11BF36B11B48C1EA04CB6BE80826973A0FB88FC9F4A4128CE4D43769DE7AC442C380
                          APIs
                          Memory Dump Source
                          • Source File: 0000001F.00000002.2767423019.0000026DB16D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026DB16D0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_31_2_26db16d0000_dwm.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction ID: d156c2d851116e99625aeddfa7d07a7ba4cbc1913b20b34856ab55b3619dfbea
                          • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction Fuzzy Hash: 1DE06D36B2160886EB058F66DC0C38E36E1FB99F1AF86C128C90907355DF7EC499C790

                          Execution Graph

                          Execution Coverage:0.7%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:81
                          Total number of Limit Nodes:2
                          execution_graph 14943 2a3effc273c 14944 2a3effc276a 14943->14944 14945 2a3effc2858 LoadLibraryA 14944->14945 14946 2a3effc28d4 14944->14946 14945->14944 14947 2a3f0661abc 14953 2a3f0661628 GetProcessHeap 14947->14953 14949 2a3f0661ad2 Sleep SleepEx 14951 2a3f0661acb 14949->14951 14951->14949 14952 2a3f0661598 StrCmpIW StrCmpW 14951->14952 14998 2a3f06618b4 14951->14998 14952->14951 14954 2a3f0661648 _invalid_parameter_noinfo 14953->14954 15015 2a3f0661268 GetProcessHeap 14954->15015 14956 2a3f0661650 14957 2a3f0661268 2 API calls 14956->14957 14958 2a3f0661661 14957->14958 14959 2a3f0661268 2 API calls 14958->14959 14960 2a3f066166a 14959->14960 14961 2a3f0661268 2 API calls 14960->14961 14962 2a3f0661673 14961->14962 14963 2a3f066168e RegOpenKeyExW 14962->14963 14964 2a3f06618a6 14963->14964 14965 2a3f06616c0 RegOpenKeyExW 14963->14965 14964->14951 14966 2a3f06616e9 14965->14966 14967 2a3f06616ff RegOpenKeyExW 14965->14967 15019 2a3f06612bc RegQueryInfoKeyW 14966->15019 14969 2a3f066173a RegOpenKeyExW 14967->14969 14970 2a3f0661723 14967->14970 14973 2a3f0661775 RegOpenKeyExW 14969->14973 14974 2a3f066175e 14969->14974 15030 2a3f066104c RegQueryInfoKeyW 14970->15030 14971 2a3f06616f5 RegCloseKey 14971->14967 14975 2a3f0661799 14973->14975 14976 2a3f06617b0 RegOpenKeyExW 14973->14976 14978 2a3f06612bc 11 API calls 14974->14978 14979 2a3f06612bc 11 API calls 14975->14979 14980 2a3f06617d4 14976->14980 14981 2a3f06617eb RegOpenKeyExW 14976->14981 14982 2a3f066176b RegCloseKey 14978->14982 14983 2a3f06617a6 RegCloseKey 14979->14983 14984 2a3f06612bc 11 API calls 14980->14984 14985 2a3f0661826 RegOpenKeyExW 14981->14985 14986 2a3f066180f 14981->14986 14982->14973 14983->14976 14987 2a3f06617e1 RegCloseKey 14984->14987 14989 2a3f066184a 14985->14989 14990 2a3f0661861 RegOpenKeyExW 14985->14990 14988 2a3f066104c 4 API calls 14986->14988 14987->14981 14993 2a3f066181c RegCloseKey 14988->14993 14994 2a3f066104c 4 API calls 14989->14994 14991 2a3f0661885 14990->14991 14992 2a3f066189c RegCloseKey 14990->14992 14995 2a3f066104c 4 API calls 14991->14995 14992->14964 14993->14985 14996 2a3f0661857 RegCloseKey 14994->14996 14997 2a3f0661892 RegCloseKey 14995->14997 14996->14990 14997->14992 15043 2a3f06614a4 14998->15043 15036 2a3f0676168 15015->15036 15018 2a3f06612ae _invalid_parameter_noinfo 15018->14956 15020 2a3f066148a __free_lconv_num 15019->15020 15021 2a3f0661327 GetProcessHeap 15019->15021 15020->14971 15024 2a3f066133e _invalid_parameter_noinfo __free_lconv_num 15021->15024 15022 2a3f0661476 GetProcessHeap 15022->15020 15023 2a3f0661352 RegEnumValueW 15023->15024 15024->15022 15024->15023 15026 2a3f06613d3 GetProcessHeap 15024->15026 15027 2a3f066141e lstrlenW GetProcessHeap 15024->15027 15028 2a3f0661443 StrCpyW 15024->15028 15029 2a3f06613f3 GetProcessHeap 15024->15029 15038 2a3f066152c 15024->15038 15026->15024 15027->15024 15028->15024 15029->15024 15031 2a3f06611b5 RegCloseKey 15030->15031 15033 2a3f06610bf _invalid_parameter_noinfo __free_lconv_num 15030->15033 15031->14969 15032 2a3f06610cf RegEnumValueW 15032->15033 15033->15031 15033->15032 15034 2a3f066114e GetProcessHeap 15033->15034 15035 2a3f066116e GetProcessHeap 15033->15035 15034->15033 15035->15033 15037 2a3f0661283 GetProcessHeap 15036->15037 15037->15018 15039 2a3f0661546 15038->15039 15040 2a3f066157c 15038->15040 15039->15040 15041 2a3f0661565 StrCmpW 15039->15041 15042 2a3f066155d StrCmpIW 15039->15042 15040->15024 15041->15039 15042->15039 15044 2a3f06614e1 GetProcessHeap 15043->15044 15045 2a3f06614c1 GetProcessHeap 15043->15045 15049 2a3f0676180 15044->15049 15047 2a3f06614da __free_lconv_num 15045->15047 15047->15044 15047->15045 15050 2a3f06614f6 GetProcessHeap HeapFree 15049->15050

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 106492572-2879589442
                          • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction ID: d6e49efe3d81a32690fa77fe862616ae2cfdfda5e723070bc013a806f6e0db3f
                          • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction Fuzzy Hash: 5E71EB26B20A508BEB90DF69EC5865D2374F7A7B88F041121F94E9BF69EE34C644C741

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                          • String ID:
                          • API String ID: 1683269324-0
                          • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction ID: 7e9bf6ca3dc4cd1ea628d8b54d7181c9f962757dd9737672e5874ad7b75af4a2
                          • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction Fuzzy Hash: 53110370F306918BFAE0DB29AE4D3AD2294EB67348F504138B906D9E91FF78C2448642

                          Control-flow Graph

                          APIs
                            • Part of subcall function 000002A3F0661628: GetProcessHeap.KERNEL32 ref: 000002A3F0661633
                            • Part of subcall function 000002A3F0661628: HeapAlloc.KERNEL32 ref: 000002A3F0661642
                            • Part of subcall function 000002A3F0661628: RegOpenKeyExW.ADVAPI32 ref: 000002A3F06616B2
                            • Part of subcall function 000002A3F0661628: RegOpenKeyExW.ADVAPI32 ref: 000002A3F06616DF
                            • Part of subcall function 000002A3F0661628: RegCloseKey.ADVAPI32 ref: 000002A3F06616F9
                            • Part of subcall function 000002A3F0661628: RegOpenKeyExW.ADVAPI32 ref: 000002A3F0661719
                            • Part of subcall function 000002A3F0661628: RegCloseKey.ADVAPI32 ref: 000002A3F0661734
                            • Part of subcall function 000002A3F0661628: RegOpenKeyExW.ADVAPI32 ref: 000002A3F0661754
                            • Part of subcall function 000002A3F0661628: RegCloseKey.ADVAPI32 ref: 000002A3F066176F
                            • Part of subcall function 000002A3F0661628: RegOpenKeyExW.ADVAPI32 ref: 000002A3F066178F
                            • Part of subcall function 000002A3F0661628: RegCloseKey.ADVAPI32 ref: 000002A3F06617AA
                            • Part of subcall function 000002A3F0661628: RegOpenKeyExW.ADVAPI32 ref: 000002A3F06617CA
                          • Sleep.KERNEL32 ref: 000002A3F0661AD7
                          • SleepEx.KERNELBASE ref: 000002A3F0661ADD
                            • Part of subcall function 000002A3F0661628: RegCloseKey.ADVAPI32 ref: 000002A3F06617E5
                            • Part of subcall function 000002A3F0661628: RegOpenKeyExW.ADVAPI32 ref: 000002A3F0661805
                            • Part of subcall function 000002A3F0661628: RegCloseKey.ADVAPI32 ref: 000002A3F0661820
                            • Part of subcall function 000002A3F0661628: RegOpenKeyExW.ADVAPI32 ref: 000002A3F0661840
                            • Part of subcall function 000002A3F0661628: RegCloseKey.ADVAPI32 ref: 000002A3F066185B
                            • Part of subcall function 000002A3F0661628: RegOpenKeyExW.ADVAPI32 ref: 000002A3F066187B
                            • Part of subcall function 000002A3F0661628: RegCloseKey.ADVAPI32 ref: 000002A3F0661896
                            • Part of subcall function 000002A3F0661628: RegCloseKey.ADVAPI32 ref: 000002A3F06618A0
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: CloseOpen$HeapSleep$AllocProcess
                          • String ID:
                          • API String ID: 1534210851-0
                          • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction ID: 18493aa65fc7477a11afd4ac97f0363bec50394c762ef9b304816d61159171c0
                          • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction Fuzzy Hash: 6631B451B205414BEFD0DB2ADE6936D53A4EBA7BC4F0C5431AE0ACFA95FE34C6518212

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 110 2a3effc273c-2a3effc27a4 call 2a3effc29d4 * 4 119 2a3effc29b2 110->119 120 2a3effc27aa-2a3effc27ad 110->120 122 2a3effc29b4-2a3effc29d0 119->122 120->119 121 2a3effc27b3-2a3effc27b6 120->121 121->119 123 2a3effc27bc-2a3effc27bf 121->123 123->119 124 2a3effc27c5-2a3effc27e6 123->124 124->119 126 2a3effc27ec-2a3effc280c 124->126 127 2a3effc280e-2a3effc2836 126->127 128 2a3effc2838-2a3effc283f 126->128 127->127 127->128 129 2a3effc28df-2a3effc28e6 128->129 130 2a3effc2845-2a3effc2852 128->130 131 2a3effc2992-2a3effc29b0 129->131 132 2a3effc28ec-2a3effc2901 129->132 130->129 133 2a3effc2858-2a3effc286a LoadLibraryA 130->133 131->122 132->131 134 2a3effc2907 132->134 135 2a3effc286c-2a3effc2878 133->135 136 2a3effc28ca-2a3effc28d2 133->136 139 2a3effc290d-2a3effc2921 134->139 140 2a3effc28c5-2a3effc28c8 135->140 136->133 137 2a3effc28d4-2a3effc28d9 136->137 137->129 142 2a3effc2982-2a3effc298c 139->142 143 2a3effc2923-2a3effc2934 139->143 140->136 141 2a3effc287a-2a3effc287d 140->141 147 2a3effc287f-2a3effc28a5 141->147 148 2a3effc28a7-2a3effc28b7 141->148 142->131 142->139 145 2a3effc293f-2a3effc2943 143->145 146 2a3effc2936-2a3effc293d 143->146 150 2a3effc294d-2a3effc2951 145->150 151 2a3effc2945-2a3effc294b 145->151 149 2a3effc2970-2a3effc2980 146->149 152 2a3effc28ba-2a3effc28c1 147->152 148->152 149->142 149->143 154 2a3effc2963-2a3effc2967 150->154 155 2a3effc2953-2a3effc2961 150->155 151->149 152->140 154->149 156 2a3effc2969-2a3effc296c 154->156 155->149 156->149
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2709411289.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3effc0000_svchost.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction ID: 0f6afa320c4a75fa81fbb62ff1d4a206d0eb164a0ac9f5765956537095b3a2cd
                          • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction Fuzzy Hash: 10613432B012A087DB68CF15C60872D7392FB95BA4F188123EE5983BC8DE78D953D709

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 365 2a3f0662b2c-2a3f0662ba5 call 2a3f0682ce0 368 2a3f0662ee0-2a3f0662f03 365->368 369 2a3f0662bab-2a3f0662bb1 365->369 369->368 370 2a3f0662bb7-2a3f0662bba 369->370 370->368 371 2a3f0662bc0-2a3f0662bc3 370->371 371->368 372 2a3f0662bc9-2a3f0662bd9 GetModuleHandleA 371->372 373 2a3f0662bed 372->373 374 2a3f0662bdb-2a3f0662beb GetProcAddress 372->374 375 2a3f0662bf0-2a3f0662c0e 373->375 374->375 375->368 377 2a3f0662c14-2a3f0662c33 StrCmpNIW 375->377 377->368 378 2a3f0662c39-2a3f0662c3d 377->378 378->368 379 2a3f0662c43-2a3f0662c4d 378->379 379->368 380 2a3f0662c53-2a3f0662c5a 379->380 380->368 381 2a3f0662c60-2a3f0662c73 380->381 382 2a3f0662c75-2a3f0662c81 381->382 383 2a3f0662c83 381->383 384 2a3f0662c86-2a3f0662c8a 382->384 383->384 385 2a3f0662c9a 384->385 386 2a3f0662c8c-2a3f0662c98 384->386 387 2a3f0662c9d-2a3f0662ca7 385->387 386->387 388 2a3f0662d9d-2a3f0662da1 387->388 389 2a3f0662cad-2a3f0662cb0 387->389 390 2a3f0662da7-2a3f0662daa 388->390 391 2a3f0662ed2-2a3f0662eda 388->391 392 2a3f0662cc2-2a3f0662ccc 389->392 393 2a3f0662cb2-2a3f0662cbf call 2a3f066199c 389->393 394 2a3f0662dbb-2a3f0662dc5 390->394 395 2a3f0662dac-2a3f0662db8 call 2a3f066199c 390->395 391->368 391->381 397 2a3f0662d00-2a3f0662d0a 392->397 398 2a3f0662cce-2a3f0662cdb 392->398 393->392 402 2a3f0662dc7-2a3f0662dd4 394->402 403 2a3f0662df5-2a3f0662df8 394->403 395->394 399 2a3f0662d3a-2a3f0662d3d 397->399 400 2a3f0662d0c-2a3f0662d19 397->400 398->397 405 2a3f0662cdd-2a3f0662cea 398->405 407 2a3f0662d3f-2a3f0662d49 call 2a3f0661bbc 399->407 408 2a3f0662d4b-2a3f0662d58 lstrlenW 399->408 400->399 406 2a3f0662d1b-2a3f0662d28 400->406 402->403 410 2a3f0662dd6-2a3f0662de3 402->410 411 2a3f0662dfa-2a3f0662e03 call 2a3f0661bbc 403->411 412 2a3f0662e05-2a3f0662e12 lstrlenW 403->412 413 2a3f0662ced-2a3f0662cf3 405->413 418 2a3f0662d2b-2a3f0662d31 406->418 407->408 415 2a3f0662d93-2a3f0662d98 407->415 420 2a3f0662d5a-2a3f0662d64 408->420 421 2a3f0662d7b-2a3f0662d8d call 2a3f0663844 408->421 422 2a3f0662de6-2a3f0662dec 410->422 411->412 432 2a3f0662e4a-2a3f0662e55 411->432 416 2a3f0662e35-2a3f0662e3f call 2a3f0663844 412->416 417 2a3f0662e14-2a3f0662e1e 412->417 414 2a3f0662cf9-2a3f0662cfe 413->414 413->415 414->397 414->413 426 2a3f0662e42-2a3f0662e44 415->426 416->426 417->416 427 2a3f0662e20-2a3f0662e33 call 2a3f066152c 417->427 418->415 428 2a3f0662d33-2a3f0662d38 418->428 420->421 431 2a3f0662d66-2a3f0662d79 call 2a3f066152c 420->431 421->415 421->426 422->432 433 2a3f0662dee-2a3f0662df3 422->433 426->391 426->432 427->416 427->432 428->399 428->418 431->415 431->421 437 2a3f0662e57-2a3f0662e5b 432->437 438 2a3f0662ecc-2a3f0662ed0 432->438 433->403 433->422 441 2a3f0662e63-2a3f0662e7d call 2a3f06685c0 437->441 442 2a3f0662e5d-2a3f0662e61 437->442 438->391 444 2a3f0662e80-2a3f0662e83 441->444 442->441 442->444 446 2a3f0662e85-2a3f0662ea3 call 2a3f06685c0 444->446 447 2a3f0662ea6-2a3f0662ea9 444->447 446->447 447->438 450 2a3f0662eab-2a3f0662ec9 call 2a3f06685c0 447->450 450->438
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction ID: e7264185e6627ca7a152c45ea673191d5828ce264668469caef4e6d9760e183d
                          • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction Fuzzy Hash: 1CB17161B20A528BEBD4CF29D85876D63A4FB67B88F045035F9499BF94EE35CA40C341
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction ID: 8a2399726a7e03ffd8de5c654530bf9e493a26281a99b78894901c300c8f31c7
                          • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction Fuzzy Hash: 7A315E72725B808AEBA0DF64E8543ED7360F796744F44443AEA4D87B95EF38C648C711
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction ID: 4648a46d89f0ed24374a6d89c06c8292b8bddab6eb90024b74db4ccdf504cc36
                          • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction Fuzzy Hash: 04315D32B24B808ADBA0CB29E8443AE73A4F79A754F500125FA9D87B55EF38C245CB01

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction ID: 6d6c9081a9e9c9d4ad7192b94bb72c94a9a7c429cca7302e1de0babd91853f21
                          • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction Fuzzy Hash: A2516E32B10B848BEB94CF6AE94C35A77A1F79AB99F444134EA494BB18EF3CC145C701

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: CurrentThread$AddressHandleModuleProc
                          • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                          • API String ID: 4175298099-1975688563
                          • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction ID: f24ac17cebfaa1330c927da688690566a7c830514d95f9ff872cdd76f91d0775
                          • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction Fuzzy Hash: 3531B9A4F30947ABEAC1DB5DED596E82360FB23748F840533B4099AD61FE788349C352

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 207 2a3effc6910-2a3effc6916 208 2a3effc6951-2a3effc695b 207->208 209 2a3effc6918-2a3effc691b 207->209 212 2a3effc6a78-2a3effc6a8d 208->212 210 2a3effc691d-2a3effc6920 209->210 211 2a3effc6945-2a3effc6984 call 2a3effc6fc0 209->211 213 2a3effc6922-2a3effc6925 210->213 214 2a3effc6938 __scrt_dllmain_crt_thread_attach 210->214 227 2a3effc6a52 211->227 228 2a3effc698a-2a3effc699f call 2a3effc6e54 211->228 215 2a3effc6a8f 212->215 216 2a3effc6a9c-2a3effc6ab6 call 2a3effc6e54 212->216 218 2a3effc6931-2a3effc6936 call 2a3effc6f04 213->218 219 2a3effc6927-2a3effc6930 213->219 222 2a3effc693d-2a3effc6944 214->222 220 2a3effc6a91-2a3effc6a9b 215->220 230 2a3effc6aef-2a3effc6b20 call 2a3effc7190 216->230 231 2a3effc6ab8-2a3effc6aed call 2a3effc6f7c call 2a3effc6e1c call 2a3effc7318 call 2a3effc7130 call 2a3effc7154 call 2a3effc6fac 216->231 218->222 232 2a3effc6a54-2a3effc6a69 227->232 239 2a3effc6a6a-2a3effc6a77 call 2a3effc7190 228->239 240 2a3effc69a5-2a3effc69b6 call 2a3effc6ec4 228->240 241 2a3effc6b31-2a3effc6b37 230->241 242 2a3effc6b22-2a3effc6b28 230->242 231->220 239->212 259 2a3effc6a07-2a3effc6a11 call 2a3effc7130 240->259 260 2a3effc69b8-2a3effc69dc call 2a3effc72dc call 2a3effc6e0c call 2a3effc6e38 call 2a3effcac0c 240->260 247 2a3effc6b7e-2a3effc6b94 call 2a3effc268c 241->247 248 2a3effc6b39-2a3effc6b43 241->248 242->241 246 2a3effc6b2a-2a3effc6b2c 242->246 253 2a3effc6c1f-2a3effc6c2c 246->253 268 2a3effc6bcc-2a3effc6bce 247->268 269 2a3effc6b96-2a3effc6b98 247->269 254 2a3effc6b4f-2a3effc6b5d call 2a3effd5780 248->254 255 2a3effc6b45-2a3effc6b4d 248->255 262 2a3effc6b63-2a3effc6b78 call 2a3effc6910 254->262 272 2a3effc6c15-2a3effc6c1d 254->272 255->262 259->227 280 2a3effc6a13-2a3effc6a1f call 2a3effc7180 259->280 260->259 310 2a3effc69de-2a3effc69e5 __scrt_dllmain_after_initialize_c 260->310 262->247 262->272 270 2a3effc6bd0-2a3effc6bd3 268->270 271 2a3effc6bd5-2a3effc6bea call 2a3effc6910 268->271 269->268 277 2a3effc6b9a-2a3effc6bbc call 2a3effc268c call 2a3effc6a78 269->277 270->271 270->272 271->272 289 2a3effc6bec-2a3effc6bf6 271->289 272->253 277->268 304 2a3effc6bbe-2a3effc6bc6 call 2a3effd5780 277->304 297 2a3effc6a21-2a3effc6a2b call 2a3effc7098 280->297 298 2a3effc6a45-2a3effc6a50 280->298 294 2a3effc6c01-2a3effc6c11 call 2a3effd5780 289->294 295 2a3effc6bf8-2a3effc6bff 289->295 294->272 295->272 297->298 309 2a3effc6a2d-2a3effc6a3b 297->309 298->232 304->268 309->298 310->259 311 2a3effc69e7-2a3effc6a04 call 2a3effcabc8 310->311 311->259
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2709411289.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3effc0000_svchost.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                          • API String ID: 190073905-1786718095
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: dc9269e48c0f5cace3bc677973e2ab88cdbd6d3f94d8d7241233d29b055281a4
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: C581022170826187FB54EB6597483992290EF87B80F588027BA0DC7796DFF9CB47830B

                          Control-flow Graph

                          APIs
                          • GetLastError.KERNEL32 ref: 000002A3F066CE37
                          • FlsGetValue.KERNEL32(?,?,?,000002A3F0670A6B,?,?,?,000002A3F067045C,?,?,?,000002A3F066C84F), ref: 000002A3F066CE4C
                          • FlsSetValue.KERNEL32(?,?,?,000002A3F0670A6B,?,?,?,000002A3F067045C,?,?,?,000002A3F066C84F), ref: 000002A3F066CE6D
                          • FlsSetValue.KERNEL32(?,?,?,000002A3F0670A6B,?,?,?,000002A3F067045C,?,?,?,000002A3F066C84F), ref: 000002A3F066CE9A
                          • FlsSetValue.KERNEL32(?,?,?,000002A3F0670A6B,?,?,?,000002A3F067045C,?,?,?,000002A3F066C84F), ref: 000002A3F066CEAB
                          • FlsSetValue.KERNEL32(?,?,?,000002A3F0670A6B,?,?,?,000002A3F067045C,?,?,?,000002A3F066C84F), ref: 000002A3F066CEBC
                          • SetLastError.KERNEL32 ref: 000002A3F066CED7
                          • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000002A3F0670A6B,?,?,?,000002A3F067045C,?,?,?,000002A3F066C84F), ref: 000002A3F066CF0D
                          • FlsSetValue.KERNEL32(?,?,00000001,000002A3F066ECCC,?,?,?,?,000002A3F066BF9F,?,?,?,?,?,000002A3F0667AB0), ref: 000002A3F066CF2C
                            • Part of subcall function 000002A3F066D6CC: HeapAlloc.KERNEL32 ref: 000002A3F066D721
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002A3F0670A6B,?,?,?,000002A3F067045C,?,?,?,000002A3F066C84F), ref: 000002A3F066CF54
                            • Part of subcall function 000002A3F066D744: HeapFree.KERNEL32 ref: 000002A3F066D75A
                            • Part of subcall function 000002A3F066D744: GetLastError.KERNEL32 ref: 000002A3F066D764
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002A3F0670A6B,?,?,?,000002A3F067045C,?,?,?,000002A3F066C84F), ref: 000002A3F066CF65
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002A3F0670A6B,?,?,?,000002A3F067045C,?,?,?,000002A3F066C84F), ref: 000002A3F066CF76
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Value$ErrorLast$Heap$AllocFree
                          • String ID:
                          • API String ID: 570795689-0
                          • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction ID: f1e0c32bd247f23febaa2d1440be5bafbc7f5de1e564a85961e4f744f3d8ce33
                          • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction Fuzzy Hash: B9415E20B21A484BF9E8E72D9D5D33D1292DFB77B0F540634B526CEED6FD7886418202

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                          • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                          • API String ID: 2171963597-1373409510
                          • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction ID: a19daec8a18c35cea35f3239cae1c3faf59040c82aea722701d635c2e9829244
                          • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction Fuzzy Hash: B1213036B24B4187FB50CB29E94835977A0F7977A4F500225FA5986FA8EF7CC249CB01

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 463 2a3effc9944-2a3effc99ac call 2a3effca814 466 2a3effc99b2-2a3effc99b5 463->466 467 2a3effc9e13-2a3effc9e1b call 2a3effcbb48 463->467 466->467 468 2a3effc99bb-2a3effc99c1 466->468 470 2a3effc9a90-2a3effc9aa2 468->470 471 2a3effc99c7-2a3effc99cb 468->471 473 2a3effc9aa8-2a3effc9aac 470->473 474 2a3effc9d63-2a3effc9d67 470->474 471->470 475 2a3effc99d1-2a3effc99dc 471->475 473->474 476 2a3effc9ab2-2a3effc9abd 473->476 478 2a3effc9da0-2a3effc9daa call 2a3effc8a34 474->478 479 2a3effc9d69-2a3effc9d70 474->479 475->470 477 2a3effc99e2-2a3effc99e7 475->477 476->474 481 2a3effc9ac3-2a3effc9aca 476->481 477->470 482 2a3effc99ed-2a3effc99f7 call 2a3effc8a34 477->482 478->467 489 2a3effc9dac-2a3effc9dcb call 2a3effc6d40 478->489 479->467 483 2a3effc9d76-2a3effc9d9b call 2a3effc9e1c 479->483 485 2a3effc9ad0-2a3effc9b07 call 2a3effc8e10 481->485 486 2a3effc9c94-2a3effc9ca0 481->486 482->489 497 2a3effc99fd-2a3effc9a28 call 2a3effc8a34 * 2 call 2a3effc9124 482->497 483->478 485->486 501 2a3effc9b0d-2a3effc9b15 485->501 486->478 490 2a3effc9ca6-2a3effc9caa 486->490 494 2a3effc9cac-2a3effc9cb8 call 2a3effc90e4 490->494 495 2a3effc9cba-2a3effc9cc2 490->495 494->495 507 2a3effc9cdb-2a3effc9ce3 494->507 495->478 500 2a3effc9cc8-2a3effc9cd5 call 2a3effc8cb4 495->500 531 2a3effc9a48-2a3effc9a52 call 2a3effc8a34 497->531 532 2a3effc9a2a-2a3effc9a2e 497->532 500->478 500->507 505 2a3effc9b19-2a3effc9b4b 501->505 509 2a3effc9b51-2a3effc9b5c 505->509 510 2a3effc9c87-2a3effc9c8e 505->510 512 2a3effc9ce9-2a3effc9ced 507->512 513 2a3effc9df6-2a3effc9e12 call 2a3effc8a34 * 2 call 2a3effcbaa8 507->513 509->510 514 2a3effc9b62-2a3effc9b7b 509->514 510->486 510->505 518 2a3effc9cef-2a3effc9cfe call 2a3effc90e4 512->518 519 2a3effc9d00 512->519 513->467 520 2a3effc9b81-2a3effc9bc6 call 2a3effc90f8 * 2 514->520 521 2a3effc9c74-2a3effc9c79 514->521 527 2a3effc9d03-2a3effc9d0d call 2a3effca8ac 518->527 519->527 544 2a3effc9bc8-2a3effc9bee call 2a3effc90f8 call 2a3effca038 520->544 545 2a3effc9c04-2a3effc9c0a 520->545 524 2a3effc9c84 521->524 524->510 527->478 542 2a3effc9d13-2a3effc9d61 call 2a3effc8d44 call 2a3effc8f50 527->542 531->470 548 2a3effc9a54-2a3effc9a74 call 2a3effc8a34 * 2 call 2a3effca8ac 531->548 532->531 536 2a3effc9a30-2a3effc9a3b 532->536 536->531 541 2a3effc9a3d-2a3effc9a42 536->541 541->467 541->531 542->478 563 2a3effc9bf0-2a3effc9c02 544->563 564 2a3effc9c15-2a3effc9c72 call 2a3effc9870 544->564 552 2a3effc9c7b 545->552 553 2a3effc9c0c-2a3effc9c10 545->553 569 2a3effc9a8b 548->569 570 2a3effc9a76-2a3effc9a80 call 2a3effca99c 548->570 554 2a3effc9c80 552->554 553->520 554->524 563->544 563->545 564->554 569->470 573 2a3effc9df0-2a3effc9df5 call 2a3effcbaa8 570->573 574 2a3effc9a86-2a3effc9def call 2a3effc86ac call 2a3effca3f4 call 2a3effc88a0 570->574 573->513 574->573
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2709411289.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3effc0000_svchost.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction ID: 756abd358e7a4783bdb9069bfade4474d8c2165fbc66eb76eb7e7523a4ab8011
                          • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction Fuzzy Hash: 5AE19F327047608BEB60DB25D68839D3BA0FB46B88F100117FE8997B95EF74C292C706

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 584 2a3f066a544-2a3f066a5ac call 2a3f066b414 587 2a3f066aa13-2a3f066aa1b call 2a3f066c748 584->587 588 2a3f066a5b2-2a3f066a5b5 584->588 588->587 589 2a3f066a5bb-2a3f066a5c1 588->589 591 2a3f066a5c7-2a3f066a5cb 589->591 592 2a3f066a690-2a3f066a6a2 589->592 591->592 596 2a3f066a5d1-2a3f066a5dc 591->596 594 2a3f066a6a8-2a3f066a6ac 592->594 595 2a3f066a963-2a3f066a967 592->595 594->595 597 2a3f066a6b2-2a3f066a6bd 594->597 599 2a3f066a969-2a3f066a970 595->599 600 2a3f066a9a0-2a3f066a9aa call 2a3f0669634 595->600 596->592 598 2a3f066a5e2-2a3f066a5e7 596->598 597->595 602 2a3f066a6c3-2a3f066a6ca 597->602 598->592 603 2a3f066a5ed-2a3f066a5f7 call 2a3f0669634 598->603 599->587 604 2a3f066a976-2a3f066a99b call 2a3f066aa1c 599->604 600->587 610 2a3f066a9ac-2a3f066a9cb call 2a3f0667940 600->610 606 2a3f066a894-2a3f066a8a0 602->606 607 2a3f066a6d0-2a3f066a707 call 2a3f0669a10 602->607 603->610 618 2a3f066a5fd-2a3f066a628 call 2a3f0669634 * 2 call 2a3f0669d24 603->618 604->600 606->600 611 2a3f066a8a6-2a3f066a8aa 606->611 607->606 622 2a3f066a70d-2a3f066a715 607->622 615 2a3f066a8ba-2a3f066a8c2 611->615 616 2a3f066a8ac-2a3f066a8b8 call 2a3f0669ce4 611->616 615->600 621 2a3f066a8c8-2a3f066a8d5 call 2a3f06698b4 615->621 616->615 628 2a3f066a8db-2a3f066a8e3 616->628 651 2a3f066a62a-2a3f066a62e 618->651 652 2a3f066a648-2a3f066a652 call 2a3f0669634 618->652 621->600 621->628 626 2a3f066a719-2a3f066a74b 622->626 630 2a3f066a887-2a3f066a88e 626->630 631 2a3f066a751-2a3f066a75c 626->631 634 2a3f066a8e9-2a3f066a8ed 628->634 635 2a3f066a9f6-2a3f066aa12 call 2a3f0669634 * 2 call 2a3f066c6a8 628->635 630->606 630->626 631->630 636 2a3f066a762-2a3f066a77b 631->636 637 2a3f066a8ef-2a3f066a8fe call 2a3f0669ce4 634->637 638 2a3f066a900 634->638 635->587 639 2a3f066a874-2a3f066a879 636->639 640 2a3f066a781-2a3f066a7c6 call 2a3f0669cf8 * 2 636->640 648 2a3f066a903-2a3f066a90d call 2a3f066b4ac 637->648 638->648 644 2a3f066a884 639->644 665 2a3f066a7c8-2a3f066a7ee call 2a3f0669cf8 call 2a3f066ac38 640->665 666 2a3f066a804-2a3f066a80a 640->666 644->630 648->600 663 2a3f066a913-2a3f066a961 call 2a3f0669944 call 2a3f0669b50 648->663 651->652 656 2a3f066a630-2a3f066a63b 651->656 652->592 669 2a3f066a654-2a3f066a674 call 2a3f0669634 * 2 call 2a3f066b4ac 652->669 656->652 661 2a3f066a63d-2a3f066a642 656->661 661->587 661->652 663->600 684 2a3f066a815-2a3f066a872 call 2a3f066a470 665->684 685 2a3f066a7f0-2a3f066a802 665->685 673 2a3f066a87b 666->673 674 2a3f066a80c-2a3f066a810 666->674 689 2a3f066a676-2a3f066a680 call 2a3f066b59c 669->689 690 2a3f066a68b 669->690 675 2a3f066a880 673->675 674->640 675->644 684->675 685->665 685->666 694 2a3f066a686-2a3f066a9ef call 2a3f06692ac call 2a3f066aff4 call 2a3f06694a0 689->694 695 2a3f066a9f0-2a3f066a9f5 call 2a3f066c6a8 689->695 690->592 694->695 695->635
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction ID: aa4e658e917060183268f1c8c89f55de4d13d97c418d00fdcdb57fe31860dc90
                          • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction Fuzzy Hash: 46E17072B207408BEBA0DF69D84439DB7A4F767798F101125EE899BB55EF34C681CB02

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: AddressFreeLibraryProc
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3013587201-537541572
                          • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction ID: 61af6b0a54addee8a0ecf1aaa533085d9c45a3ae1263d377a5430f1ccd05ebfc
                          • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction Fuzzy Hash: B641B322B35A004BEA95CB1EAD0875A23D5F767BA0F454135BD0ACBF85FE38C6458342

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction ID: a57b92eb83caeb59451c4dd08226f081d89081f5fb86dd51c534ee38d9341f93
                          • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction Fuzzy Hash: F5416633614B84CBE790CF25E84875EB7A1F396B98F448125EB894BB58EF38C545CB41

                          Control-flow Graph

                          APIs
                          • FlsGetValue.KERNEL32(?,?,?,000002A3F066C7DE,?,?,?,?,?,?,?,?,000002A3F066CF9D,?,?,00000001), ref: 000002A3F066D087
                          • FlsSetValue.KERNEL32(?,?,?,000002A3F066C7DE,?,?,?,?,?,?,?,?,000002A3F066CF9D,?,?,00000001), ref: 000002A3F066D0A6
                          • FlsSetValue.KERNEL32(?,?,?,000002A3F066C7DE,?,?,?,?,?,?,?,?,000002A3F066CF9D,?,?,00000001), ref: 000002A3F066D0CE
                          • FlsSetValue.KERNEL32(?,?,?,000002A3F066C7DE,?,?,?,?,?,?,?,?,000002A3F066CF9D,?,?,00000001), ref: 000002A3F066D0DF
                          • FlsSetValue.KERNEL32(?,?,?,000002A3F066C7DE,?,?,?,?,?,?,?,?,000002A3F066CF9D,?,?,00000001), ref: 000002A3F066D0F0
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Value
                          • String ID: 1%$Y%
                          • API String ID: 3702945584-1395475152
                          • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction ID: ac8d096a898dd5730031bc9e1ba0e049e1f0257e5f93eefe9e65e4ec58292f3b
                          • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction Fuzzy Hash: FC113020F242444BF9E4DB2D9E5936D5245EB777F0F244234B929CEEDAFE7886428602
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: 8d697aec170fad2f7e85e90d89f1eeed496da71b7a4a8009cf33773665725167
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: 89814A21F306418FFAE4DB6DAC6939D2690EBA7780F144535B905CBE96FE38CB458702
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction ID: 4aec6992857ec9459b33fbbd1df24a7ccaf45efe0a0ea625233a08a79b74cc52
                          • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction Fuzzy Hash: 5031EB21B22640DBEF91DB0AAC087592298FB67B60F590535BD1D8FB50FF39C6458312
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction ID: add0cb81a92618d40f986f0cde770ccea769e84635dcd21c0a004aec72a4038a
                          • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction Fuzzy Hash: 50118121B20A408BEB90CB1AED5831967A4F7AAFE4F440235FA59C7B94EF38C6448741
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID: wr
                          • API String ID: 1092925422-2678910430
                          • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction ID: 3f74865dcc16d314186019eeb74bf5e6ff4b2034cf18aa14283d1b7df7a44b63
                          • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction Fuzzy Hash: 8C117C26B207408BFF94DB29E90826962A0F75BB85F440038FE8987B54FF3DC605C705
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                          • Instruction ID: 8e4faef13cc65b4df83bcb70224ef88637d80fa51eeabec05ec18b16e28f9ac7
                          • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                          • Instruction Fuzzy Hash: C5D1AF76615B4886DBB0DB0AE89535E77A0F7DAB84F100126EACD8BB65DF3CC641CB01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: dialer
                          • API String ID: 756756679-3528709123
                          • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction ID: ea9854439b511021aae1834001287969d1888a578fed51192c4f0273032b74c8
                          • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction Fuzzy Hash: 87319521B11B518BEB94CF1A9D4876D67A0FB67B88F084030BE488BF55FF34C5658701
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Value$ErrorLast
                          • String ID:
                          • API String ID: 2506987500-0
                          • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction ID: 947d3cf771b2348594020022dc32aacc64b00baa03c3a342095d6466a6564fa0
                          • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction Fuzzy Hash: 38113020F216444BFAD4D7299E5D32D1282EBB77B4F540634B936CFED6FD7886418602
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction ID: c550c66311b3ef4270f20c8bfef90b432a44ad43bf1d2da68e71925a700b0db7
                          • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction Fuzzy Hash: 5D016D21B20A408BEB90DB5AA84C75963A1F79ABC4F884035FE4987B55EF3CC689C741
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction ID: ac31b1d2c87613b3d1a4613d73019e2fecec1a5e9f17726b67783639fbd08a0f
                          • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction Fuzzy Hash: EE010C65B217408BEFA4DB2AED4C71967A0FB67B85F040434E94986B54FF3DC2448705
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 2395640692-629598281
                          • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction ID: 25a10d7dd65eceb9c08ab646dbd368edc3832f33ef66c5238f1c828468f6184d
                          • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction Fuzzy Hash: AB516132B215018FDB94DB19D84C75D6769F367B84F208134EE068BB48FE75DA41C751
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 2395640692-629598281
                          • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction ID: 0183a1ec81c6fe5fc289bf6d038e9c0e67ef63b1d30c9ccc84fcdc7c2ff0671c
                          • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction Fuzzy Hash: 33319C31B206408BEB94DB19EC4C71D7768F363B88F148124BE468BB49EF39CA41C756
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction ID: 2723efdd31ef81cf0b780c40f8ffb03886298e9d5556f209259b56203b058ea2
                          • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction Fuzzy Hash: C0F0A922B1064087EBA0CB58FD887596360F75AB98F844030FA498AD54EF3CC74DC701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction ID: 3cb81280d6639494041b71beabffd4b8f748a6a3d86e386e790f439f9726afb7
                          • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction Fuzzy Hash: 56F04461721B05C7EF50CB2CAC483595320EB9B765F541225BA6A899E4EF38C2448741
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction ID: bc7fcf44eccac469d712f6677f5295184d23beb7ce9fd1912fc011b3c1582562
                          • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction Fuzzy Hash: 35F05E20B24B9087EE84CB1BBD081196261EB5BFD0F046130FE468BF58EE38C649C701
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                          • Instruction ID: 1a5c3ceabbb9674ab88b816016c5392cd132a216a6156abeb41612a421397731
                          • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                          • Instruction Fuzzy Hash: 8902BB32619B848ADBA0CB59E89535EB7A0F3D6794F100125FA8E87B68EF7CC544CB01
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                          • Instruction ID: fdf0353c2c9d7431a73655fa855ee1d883f357c26d152c9830ae0b22cfb9d9d6
                          • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                          • Instruction Fuzzy Hash: CF619136A29644CBEAA0CB19E95931E77E4F396784F100125F68D8BF64EF78C540CB01
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2709411289.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3effc0000_svchost.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: b3d2515fd7531a192da7560432244ddb1d5725737d85a7ce7cb71133a17b834d
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: 3E11A762710A1BD3FA549728E74D36911C06F5BBB4F48472BBB66862D6CEF6CB434202
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: 778c29c2b52a37e8828e8148e915df3a772d082812edea363ef07373fae80013
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: E4116D22F34A501BF6E5A56CDC5D3751144EB7B3B8E890634B97686ED6EF34CAC14203
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2709411289.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3effc0000_svchost.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: Tuesday$Wednesday$or copy constructor iterator'
                          • API String ID: 3215553584-4202648911
                          • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction ID: 72e7a858243a0862991be92073fd25fa4d2ae0b65c3be1701e8c213c550465a5
                          • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction Fuzzy Hash: 0861922670026043F769CB65E74C369AAA0EF83B50F554417FA0A977E4DFF4CB47822A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: 0c64597300c946a2c78553bcffee072166d80c1db9bdc91f256f0f9a0b87a364
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: EA617D32B10B448BE750DF69D84439DB7A0F356B88F044226EF495BB99EF38C655CB01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2709411289.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3effc0000_svchost.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: 7d3f4da836a6d3a3b3a2b9affbb5badf6e48be98e05b9c20b87d266e2fd35715
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: 3A51B3322002A0CBEB74CF65966835877A0FF56B84F144117EA49D7BC5CFB9E652C70A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: 6f1cb0b0e2f77e083062affd172c0089a59e910c1f2d4a4a0f9650168a2628ac
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: 7C518272A203808FEBA4CF19994835DB7A0F767B84F144125FA598BF95EF38D650CB02
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2709411289.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3effc0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction ID: 18d4462e912e04e262cb9d845cbb99dddd9bdd6a83f29b90a56fac2c5e1f1e45
                          • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction Fuzzy Hash: 3251D13270162087DB14CF15D648B283795FB42FA8F168427EA0683788EFF5CB42C70A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2709411289.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3effc0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction ID: 638603215c4bd4605fef7f0d1933761329d4d304d81e6a47645db0f5dcc0997b
                          • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction Fuzzy Hash: 35318C7130165087E714DF11E948B1937A4FB42B98F168417BE5A87788DFB9CB42C70A
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction ID: 1dea74a7b9dd16eb4baa4bb49ba0bef5543a7e9b7916fd59b1bcb17493166bde
                          • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction Fuzzy Hash: F9D1D172B24A808EE751CF79D84839C3BB1F366798F144226EE5997F99EE34C606C341
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction ID: d536798ee46fa44b5ad918a9dcf1e87bae4019f298dbc0d8180429603494c22b
                          • Opcode Fuzzy Hash: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction Fuzzy Hash: 13014C32A20A90CBDB44DF6AED0C14A67A0F79AF81F484435FA4987B29EE38C251C741
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: ConsoleErrorLastMode
                          • String ID:
                          • API String ID: 953036326-0
                          • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction ID: a4cb1103299b726bc7b01eccba19e47c4a24c67d0d3a46935793449ef8735077
                          • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction Fuzzy Hash: A491A662F206518EF7A1DF6D9C4836D2BA0F727B8CF144125EE0697E95EE34C685C702
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction ID: 64750482dc4921f28b12e3224374007b2b1ae6a2ef3d88e21d4456c50efc5c58
                          • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction Fuzzy Hash: 70112421B20F018AEF40CF64EC583A833A4F76A758F440D31FA6D86B54EF78C2948341
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction ID: fb96a1d8bf94e82a1d2f4f61f31f1e99a0b6281a65b0fdd7fc554e0c5c89d442
                          • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction Fuzzy Hash: BF719336B20B824BD7A4DE299C487AD6A94F3A7788F440035ED099BF89EE35C7458701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2709411289.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3effc0000_svchost.jbxd
                          Similarity
                          • API ID: CallTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3163161869-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: 1c071c4e189e1926709cb0ed332f7ab93af7b290c7f773ceed20fa96e7bdadd9
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: 3C617633600B948AEB20DF65D18439D7BA0FB49B88F044217EF4957B98EFB8D296C705
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction ID: 5f936f7cd74c6ad8cabcdb3786854e477f79e51e7e3fe2a465b702ceea4c6f09
                          • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction Fuzzy Hash: D351E722B24B828BE7B4CF2EA85C36E5691F3A7744F440135ED4A87F49EE39C6448742
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction ID: 4a4f14ede015f19fba4b8dc1191ceb6a241eb7a7a156b13a3e921accdb9fad5b
                          • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction Fuzzy Hash: 4041A472B24A418ADB60CF29E84839967A0F7AA794F404035FE4DC7B94EF7CC645C741
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction ID: 4dfaae02607e1d63d71d13f1f569e1bfbbce690b7281460ac2c766a79d4aa6aa
                          • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction Fuzzy Hash: 44113032614B4086EBA1CF19F84435977E5F79AB94F584220EE8D4BB59EF3CC655C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2709411289.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3effc0000_svchost.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: ierarchy Descriptor'$riptor at (
                          • API String ID: 592178966-758928094
                          • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction ID: 537a0299432303b2994cf101a968846695946c7fbee4695c8a398a611903422e
                          • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction Fuzzy Hash: 65E08661740B44D1DF02CF22E94429833A0DF59B68F889123A95C46311FF78D3EAC302
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000020.00000002.2709411289.000002A3EFFC0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3EFFC0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3effc0000_svchost.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: Locator'$riptor at (
                          • API String ID: 592178966-4215709766
                          • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction ID: 3fa43d97622781504111e28302cccdffe62b838d3364dff2f09d1e1dee9b6f76
                          • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction Fuzzy Hash: DCE08661740B44C5DF01CF21D5402987360EF59B58F889123D94C46311FF78D2E6C301
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction ID: 899d41f3a461e795506a272869949aa2b30dded974880c644d390ca07638d0fa
                          • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction Fuzzy Hash: DC116325B21B448AEA84DB5EA80C22D67A1F79BFC0F584035EE4D9BB65EE38D5419301
                          APIs
                          Memory Dump Source
                          • Source File: 00000020.00000002.2717085041.000002A3F0660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A3F0660000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_32_2_2a3f0660000_svchost.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction ID: 11941aba65ac1e048ab5c377d395697b824e5f1c455e2688e9b7b208c8c371a4
                          • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction Fuzzy Hash: B4E03935B216048BEB44CB6AD80C34A36E1EB9AB06F848024990947751FF7D8599C751

                          Execution Graph

                          Execution Coverage:0.7%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:94
                          Total number of Limit Nodes:3
                          execution_graph 14964 2c9afbb1abc 14970 2c9afbb1628 GetProcessHeap 14964->14970 14966 2c9afbb1ad2 Sleep SleepEx 14968 2c9afbb1acb 14966->14968 14968->14966 14969 2c9afbb1598 StrCmpIW StrCmpW 14968->14969 15015 2c9afbb18b4 14968->15015 14969->14968 14971 2c9afbb1648 _invalid_parameter_noinfo 14970->14971 15032 2c9afbb1268 GetProcessHeap 14971->15032 14973 2c9afbb1650 14974 2c9afbb1268 2 API calls 14973->14974 14975 2c9afbb1661 14974->14975 14976 2c9afbb1268 2 API calls 14975->14976 14977 2c9afbb166a 14976->14977 14978 2c9afbb1268 2 API calls 14977->14978 14979 2c9afbb1673 14978->14979 14980 2c9afbb168e RegOpenKeyExW 14979->14980 14981 2c9afbb18a6 14980->14981 14982 2c9afbb16c0 RegOpenKeyExW 14980->14982 14981->14968 14983 2c9afbb16e9 14982->14983 14984 2c9afbb16ff RegOpenKeyExW 14982->14984 15036 2c9afbb12bc RegQueryInfoKeyW 14983->15036 14985 2c9afbb1723 14984->14985 14986 2c9afbb173a RegOpenKeyExW 14984->14986 15047 2c9afbb104c RegQueryInfoKeyW 14985->15047 14989 2c9afbb1775 RegOpenKeyExW 14986->14989 14990 2c9afbb175e 14986->14990 14994 2c9afbb1799 14989->14994 14995 2c9afbb17b0 RegOpenKeyExW 14989->14995 14993 2c9afbb12bc 11 API calls 14990->14993 14991 2c9afbb16f5 RegCloseKey 14991->14984 14996 2c9afbb176b RegCloseKey 14993->14996 14997 2c9afbb12bc 11 API calls 14994->14997 14998 2c9afbb17d4 14995->14998 14999 2c9afbb17eb RegOpenKeyExW 14995->14999 14996->14989 15002 2c9afbb17a6 RegCloseKey 14997->15002 15003 2c9afbb12bc 11 API calls 14998->15003 15000 2c9afbb1826 RegOpenKeyExW 14999->15000 15001 2c9afbb180f 14999->15001 15005 2c9afbb1861 RegOpenKeyExW 15000->15005 15006 2c9afbb184a 15000->15006 15004 2c9afbb104c 4 API calls 15001->15004 15002->14995 15007 2c9afbb17e1 RegCloseKey 15003->15007 15008 2c9afbb181c RegCloseKey 15004->15008 15010 2c9afbb1885 15005->15010 15011 2c9afbb189c RegCloseKey 15005->15011 15009 2c9afbb104c 4 API calls 15006->15009 15007->14999 15008->15000 15012 2c9afbb1857 RegCloseKey 15009->15012 15013 2c9afbb104c 4 API calls 15010->15013 15011->14981 15012->15005 15014 2c9afbb1892 RegCloseKey 15013->15014 15014->15011 15060 2c9afbb14a4 15015->15060 15053 2c9afbc6168 15032->15053 15035 2c9afbb12ae _invalid_parameter_noinfo 15035->14973 15037 2c9afbb1327 GetProcessHeap 15036->15037 15038 2c9afbb148a Concurrency::details::SchedulerProxy::DeleteThis 15036->15038 15041 2c9afbb133e _invalid_parameter_noinfo Concurrency::details::SchedulerProxy::DeleteThis 15037->15041 15038->14991 15039 2c9afbb1352 RegEnumValueW 15039->15041 15040 2c9afbb1476 GetProcessHeap 15040->15038 15041->15039 15041->15040 15043 2c9afbb13d3 GetProcessHeap 15041->15043 15044 2c9afbb141e lstrlenW GetProcessHeap 15041->15044 15045 2c9afbb13f3 GetProcessHeap 15041->15045 15046 2c9afbb1443 StrCpyW 15041->15046 15055 2c9afbb152c 15041->15055 15043->15041 15044->15041 15045->15041 15046->15041 15048 2c9afbb11b5 RegCloseKey 15047->15048 15050 2c9afbb10bf _invalid_parameter_noinfo Concurrency::details::SchedulerProxy::DeleteThis 15047->15050 15048->14986 15049 2c9afbb10cf RegEnumValueW 15049->15050 15050->15048 15050->15049 15051 2c9afbb114e GetProcessHeap 15050->15051 15052 2c9afbb116e GetProcessHeap 15050->15052 15051->15050 15052->15050 15054 2c9afbb1283 GetProcessHeap 15053->15054 15054->15035 15056 2c9afbb1546 15055->15056 15059 2c9afbb157c 15055->15059 15057 2c9afbb1565 StrCmpW 15056->15057 15058 2c9afbb155d StrCmpIW 15056->15058 15056->15059 15057->15056 15058->15056 15059->15041 15061 2c9afbb14e1 GetProcessHeap 15060->15061 15062 2c9afbb14c1 GetProcessHeap 15060->15062 15066 2c9afbc6180 15061->15066 15063 2c9afbb14da Concurrency::details::SchedulerProxy::DeleteThis 15062->15063 15063->15061 15063->15062 15067 2c9afbb14f6 GetProcessHeap HeapFree 15066->15067 15068 2c9afb8273c 15070 2c9afb8276a 15068->15070 15069 2c9afb82858 LoadLibraryA 15069->15070 15070->15069 15071 2c9afb828d4 15070->15071 15072 2c9afbbca0c 15075 2c9afbbca1b _invalid_parameter_noinfo 15072->15075 15074 2c9afbbca55 15075->15074 15076 2c9afbbd6ac 15075->15076 15079 2c9afbbcfa0 15076->15079 15078 2c9afbbd6b5 15078->15074 15081 2c9afbbcfb5 __vcrt_FlsSetValue 15079->15081 15080 2c9afbbcfe1 FlsSetValue 15082 2c9afbbcff3 _invalid_parameter_noinfo 15080->15082 15085 2c9afbbcfd1 __CxxCallCatchBlock _invalid_parameter_noinfo Concurrency::details::SchedulerProxy::DeleteThis 15080->15085 15081->15080 15081->15085 15083 2c9afbbd020 FlsSetValue 15082->15083 15084 2c9afbbd010 FlsSetValue 15082->15084 15083->15085 15086 2c9afbbd02c FlsSetValue 15083->15086 15084->15085 15085->15078 15086->15085

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$AllocProcess
                          • String ID:
                          • API String ID: 1617791916-0
                          • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction ID: 02946ca36f3402e0facbaf146cdc26c741fd4d6ec5d6214b8e74fb746398ebee
                          • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                          • Instruction Fuzzy Hash: 14E0397660160486FB048B62D80CB4A36F2EB9DF06F049024890D07351DF7EC4DAC750

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                          • String ID:
                          • API String ID: 1683269324-0
                          • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction ID: c458215bf1c98ccd866853aa7addd53556b79060b5fbedb0ec5efbadb8ed66bb
                          • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction Fuzzy Hash: 19114073B14A4182FBA09B21F95DF5F22B4E754345F584135994E819E1EF7BC4C48711

                          Control-flow Graph

                          APIs
                            • Part of subcall function 000002C9AFBB1628: GetProcessHeap.KERNEL32 ref: 000002C9AFBB1633
                            • Part of subcall function 000002C9AFBB1628: HeapAlloc.KERNEL32 ref: 000002C9AFBB1642
                            • Part of subcall function 000002C9AFBB1628: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB16B2
                            • Part of subcall function 000002C9AFBB1628: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB16DF
                            • Part of subcall function 000002C9AFBB1628: RegCloseKey.ADVAPI32 ref: 000002C9AFBB16F9
                            • Part of subcall function 000002C9AFBB1628: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB1719
                            • Part of subcall function 000002C9AFBB1628: RegCloseKey.ADVAPI32 ref: 000002C9AFBB1734
                            • Part of subcall function 000002C9AFBB1628: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB1754
                            • Part of subcall function 000002C9AFBB1628: RegCloseKey.ADVAPI32 ref: 000002C9AFBB176F
                            • Part of subcall function 000002C9AFBB1628: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB178F
                            • Part of subcall function 000002C9AFBB1628: RegCloseKey.ADVAPI32 ref: 000002C9AFBB17AA
                            • Part of subcall function 000002C9AFBB1628: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB17CA
                          • Sleep.KERNEL32 ref: 000002C9AFBB1AD7
                          • SleepEx.KERNELBASE ref: 000002C9AFBB1ADD
                            • Part of subcall function 000002C9AFBB1628: RegCloseKey.ADVAPI32 ref: 000002C9AFBB17E5
                            • Part of subcall function 000002C9AFBB1628: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB1805
                            • Part of subcall function 000002C9AFBB1628: RegCloseKey.ADVAPI32 ref: 000002C9AFBB1820
                            • Part of subcall function 000002C9AFBB1628: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB1840
                            • Part of subcall function 000002C9AFBB1628: RegCloseKey.ADVAPI32 ref: 000002C9AFBB185B
                            • Part of subcall function 000002C9AFBB1628: RegOpenKeyExW.ADVAPI32 ref: 000002C9AFBB187B
                            • Part of subcall function 000002C9AFBB1628: RegCloseKey.ADVAPI32 ref: 000002C9AFBB1896
                            • Part of subcall function 000002C9AFBB1628: RegCloseKey.ADVAPI32 ref: 000002C9AFBB18A0
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: CloseOpen$HeapSleep$AllocProcess
                          • String ID:
                          • API String ID: 1534210851-0
                          • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction ID: 3d133a6c6fa1ba24d341f0a0208eb16f7f20b030103285e457f08171ed4ff97b
                          • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction Fuzzy Hash: 1C310E67211A4182FF64AF26DA4DBAD23B4EB84BC0F1864319E0D876F5FF26C8D1C210

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 62 2c9afbb3844-2c9afbb384f 63 2c9afbb3851-2c9afbb3864 StrCmpNIW 62->63 64 2c9afbb3869-2c9afbb3870 62->64 63->64 65 2c9afbb3866 63->65 65->64
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: dialer
                          • API String ID: 0-3528709123
                          • Opcode ID: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                          • Instruction ID: 5e1fd6351878a2edf60ad03a3be0d6f5b9d20302d487fb4c1c3225ad09be24c8
                          • Opcode Fuzzy Hash: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                          • Instruction Fuzzy Hash: A1D0A76231120586FF14DFAA8CCCF692370EB0C744F8C4034CD0801590DB1BC9DE9710

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2708939219.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afb80000_svchost.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction ID: 1b49d16d77b95f286320a700e7c5b27fe5fa868e61b97a2f1d58080ae6c7f6b4
                          • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction Fuzzy Hash: FC61D177B016908BEB54CF15D44CB2DB3A2FBA4BA4F588135DE5D07788DA39D892C780

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: AllocHeap
                          • String ID:
                          • API String ID: 4292702814-0
                          • Opcode ID: aac0828ce12dfb82e5a667a172eb8e62085a22ffbd2f9ceececb1565634b64c0
                          • Instruction ID: 727ecce194b6517732949ef698da1e08856636cdb64d2bf3e63d098a7802fa24
                          • Opcode Fuzzy Hash: aac0828ce12dfb82e5a667a172eb8e62085a22ffbd2f9ceececb1565634b64c0
                          • Instruction Fuzzy Hash: C1F0379771124585FE54E7B1A85DF6D23B04B88BA0F0856305D7E852C6DA5ED4C18660

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 390 2c9afbb2b2c-2c9afbb2ba5 call 2c9afbd2ce0 393 2c9afbb2bab-2c9afbb2bb1 390->393 394 2c9afbb2ee0-2c9afbb2f03 390->394 393->394 395 2c9afbb2bb7-2c9afbb2bba 393->395 395->394 396 2c9afbb2bc0-2c9afbb2bc3 395->396 396->394 397 2c9afbb2bc9-2c9afbb2bd9 GetModuleHandleA 396->397 398 2c9afbb2bdb-2c9afbb2beb call 2c9afbc6090 397->398 399 2c9afbb2bed 397->399 401 2c9afbb2bf0-2c9afbb2c0e 398->401 399->401 401->394 404 2c9afbb2c14-2c9afbb2c33 StrCmpNIW 401->404 404->394 405 2c9afbb2c39-2c9afbb2c3d 404->405 405->394 406 2c9afbb2c43-2c9afbb2c4d 405->406 406->394 407 2c9afbb2c53-2c9afbb2c5a 406->407 407->394 408 2c9afbb2c60-2c9afbb2c73 407->408 409 2c9afbb2c83 408->409 410 2c9afbb2c75-2c9afbb2c81 408->410 411 2c9afbb2c86-2c9afbb2c8a 409->411 410->411 412 2c9afbb2c8c-2c9afbb2c98 411->412 413 2c9afbb2c9a 411->413 414 2c9afbb2c9d-2c9afbb2ca7 412->414 413->414 415 2c9afbb2d9d-2c9afbb2da1 414->415 416 2c9afbb2cad-2c9afbb2cb0 414->416 417 2c9afbb2ed2-2c9afbb2eda 415->417 418 2c9afbb2da7-2c9afbb2daa 415->418 419 2c9afbb2cc2-2c9afbb2ccc 416->419 420 2c9afbb2cb2-2c9afbb2cbf call 2c9afbb199c 416->420 417->394 417->408 423 2c9afbb2dac-2c9afbb2db8 call 2c9afbb199c 418->423 424 2c9afbb2dbb-2c9afbb2dc5 418->424 421 2c9afbb2d00-2c9afbb2d0a 419->421 422 2c9afbb2cce-2c9afbb2cdb 419->422 420->419 427 2c9afbb2d0c-2c9afbb2d19 421->427 428 2c9afbb2d3a-2c9afbb2d3d 421->428 422->421 426 2c9afbb2cdd-2c9afbb2cea 422->426 423->424 430 2c9afbb2dc7-2c9afbb2dd4 424->430 431 2c9afbb2df5-2c9afbb2df8 424->431 435 2c9afbb2ced-2c9afbb2cf3 426->435 427->428 436 2c9afbb2d1b-2c9afbb2d28 427->436 437 2c9afbb2d4b-2c9afbb2d58 lstrlenW 428->437 438 2c9afbb2d3f-2c9afbb2d49 call 2c9afbb1bbc 428->438 430->431 440 2c9afbb2dd6-2c9afbb2de3 430->440 433 2c9afbb2e05-2c9afbb2e12 lstrlenW 431->433 434 2c9afbb2dfa-2c9afbb2e03 call 2c9afbb1bbc 431->434 444 2c9afbb2e14-2c9afbb2e1e 433->444 445 2c9afbb2e35-2c9afbb2e3f call 2c9afbb3844 433->445 434->433 452 2c9afbb2e4a-2c9afbb2e55 434->452 442 2c9afbb2d93-2c9afbb2d98 435->442 443 2c9afbb2cf9-2c9afbb2cfe 435->443 446 2c9afbb2d2b-2c9afbb2d31 436->446 448 2c9afbb2d7b-2c9afbb2d8d call 2c9afbb3844 437->448 449 2c9afbb2d5a-2c9afbb2d64 437->449 438->437 438->442 450 2c9afbb2de6-2c9afbb2dec 440->450 456 2c9afbb2e42-2c9afbb2e44 442->456 443->421 443->435 444->445 457 2c9afbb2e20-2c9afbb2e33 call 2c9afbb152c 444->457 445->456 446->442 458 2c9afbb2d33-2c9afbb2d38 446->458 448->442 448->456 449->448 451 2c9afbb2d66-2c9afbb2d79 call 2c9afbb152c 449->451 450->452 453 2c9afbb2dee-2c9afbb2df3 450->453 451->442 451->448 465 2c9afbb2e57-2c9afbb2e5b 452->465 466 2c9afbb2ecc-2c9afbb2ed0 452->466 453->431 453->450 456->417 456->452 457->445 457->452 458->428 458->446 467 2c9afbb2e63-2c9afbb2e7d call 2c9afbb85c0 465->467 468 2c9afbb2e5d-2c9afbb2e61 465->468 466->417 471 2c9afbb2e80-2c9afbb2e83 467->471 468->467 468->471 474 2c9afbb2ea6-2c9afbb2ea9 471->474 475 2c9afbb2e85-2c9afbb2ea3 call 2c9afbb85c0 471->475 474->466 477 2c9afbb2eab-2c9afbb2ec9 call 2c9afbb85c0 474->477 475->474 477->466
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                          • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                          • API String ID: 2119608203-3850299575
                          • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction ID: f40ce59f2efed65c9b010051d6776aa73714aa356de280d759f93c21df0a69b0
                          • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                          • Instruction Fuzzy Hash: 5DB18D67210A9086FBAA9F26D45CBAE63B5FB44B84F44502AEE0D53B94DF36CCC1C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction ID: d133edbc506ad9ae8d55e42da47199501f0e6beb05cb4ed51f66a82066bfc72d
                          • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                          • Instruction Fuzzy Hash: 91311A73205A808AFB609F64E848BEE6375F788744F44442ADA4D57A94EF39C589C710
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction ID: 85b0b215ee8e3942453a5d595db1f318e2a7e201c596e557a4c5a41d0126749f
                          • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                          • Instruction Fuzzy Hash: 6D315E33214B8086EB60DF29E84CBAE73B4F789794F500126EA9D47B95DF39C586CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                          • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                          • API String ID: 106492572-2879589442
                          • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction ID: 7bc5544605b8bb29d9d22844264ad75da65fd45ea84d007b71f284991407313f
                          • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                          • Instruction Fuzzy Hash: 0D71D827710A1086FB109F66E89CF9E23B5FB88B88F415121DE4E57B69DF3AC495C740

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                          • String ID: d
                          • API String ID: 2005889112-2564639436
                          • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction ID: 3d1a5935da443fba4cfa22ded9a11958e274965ae6b1c0c8bbf3cd067de71fae
                          • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                          • Instruction Fuzzy Hash: 3D511877604B848AEB54CF62E54CB5E77B2F789F99F444124DA4D07768DF39C09A8B00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentThread$AddressHandleModuleProc
                          • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                          • API String ID: 4175298099-1975688563
                          • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction ID: bd217bfbf6eb61ce800cc4c79a049b29e8618bdc513bc47cd3ed92e4f45f524d
                          • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                          • Instruction Fuzzy Hash: 7331936A60098AA0FA05EF65EC5DFDD6330F708385FC45023D86D139759F7A86DAC351

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 232 2c9afb86910-2c9afb86916 233 2c9afb86951-2c9afb8695b 232->233 234 2c9afb86918-2c9afb8691b 232->234 235 2c9afb86a78-2c9afb86a8d 233->235 236 2c9afb86945-2c9afb86984 call 2c9afb86fc0 234->236 237 2c9afb8691d-2c9afb86920 234->237 241 2c9afb86a9c-2c9afb86ab6 call 2c9afb86e54 235->241 242 2c9afb86a8f 235->242 252 2c9afb86a52 236->252 253 2c9afb8698a-2c9afb8699f call 2c9afb86e54 236->253 239 2c9afb86922-2c9afb86925 237->239 240 2c9afb86938 __scrt_dllmain_crt_thread_attach 237->240 244 2c9afb86931-2c9afb86936 call 2c9afb86f04 239->244 245 2c9afb86927-2c9afb86930 239->245 248 2c9afb8693d-2c9afb86944 240->248 255 2c9afb86ab8-2c9afb86aed call 2c9afb86f7c call 2c9afb86e1c call 2c9afb87318 call 2c9afb87130 call 2c9afb87154 call 2c9afb86fac 241->255 256 2c9afb86aef-2c9afb86b20 call 2c9afb87190 241->256 246 2c9afb86a91-2c9afb86a9b 242->246 244->248 258 2c9afb86a54-2c9afb86a69 252->258 265 2c9afb869a5-2c9afb869b6 call 2c9afb86ec4 253->265 266 2c9afb86a6a-2c9afb86a77 call 2c9afb87190 253->266 255->246 267 2c9afb86b31-2c9afb86b37 256->267 268 2c9afb86b22-2c9afb86b28 256->268 285 2c9afb86a07-2c9afb86a11 call 2c9afb87130 265->285 286 2c9afb869b8-2c9afb869dc call 2c9afb872dc call 2c9afb86e0c call 2c9afb86e38 call 2c9afb8ac0c 265->286 266->235 270 2c9afb86b39-2c9afb86b43 267->270 271 2c9afb86b7e-2c9afb86b94 call 2c9afb8268c 267->271 268->267 269 2c9afb86b2a-2c9afb86b2c 268->269 275 2c9afb86c1f-2c9afb86c2c 269->275 276 2c9afb86b45-2c9afb86b4d 270->276 277 2c9afb86b4f-2c9afb86b5d call 2c9afb95780 270->277 293 2c9afb86b96-2c9afb86b98 271->293 294 2c9afb86bcc-2c9afb86bce 271->294 282 2c9afb86b63-2c9afb86b78 call 2c9afb86910 276->282 277->282 297 2c9afb86c15-2c9afb86c1d 277->297 282->271 282->297 285->252 306 2c9afb86a13-2c9afb86a1f call 2c9afb87180 285->306 286->285 335 2c9afb869de-2c9afb869e5 __scrt_dllmain_after_initialize_c 286->335 293->294 302 2c9afb86b9a-2c9afb86bbc call 2c9afb8268c call 2c9afb86a78 293->302 295 2c9afb86bd5-2c9afb86bea call 2c9afb86910 294->295 296 2c9afb86bd0-2c9afb86bd3 294->296 295->297 316 2c9afb86bec-2c9afb86bf6 295->316 296->295 296->297 297->275 302->294 327 2c9afb86bbe-2c9afb86bc6 call 2c9afb95780 302->327 324 2c9afb86a21-2c9afb86a2b call 2c9afb87098 306->324 325 2c9afb86a45-2c9afb86a50 306->325 321 2c9afb86c01-2c9afb86c11 call 2c9afb95780 316->321 322 2c9afb86bf8-2c9afb86bff 316->322 321->297 322->297 324->325 334 2c9afb86a2d-2c9afb86a3b 324->334 325->258 327->294 334->325 335->285 336 2c9afb869e7-2c9afb86a04 call 2c9afb8abc8 335->336 336->285
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2708939219.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afb80000_svchost.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                          • API String ID: 190073905-1786718095
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: 3b0bcfbc6097c036aae0528868285f8b4af87e6efa3b75491bc5fed42e7aa859
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: EE81E3337002418AFA54AB65D88DFAD22F2EBC9B84F5480259A4D477D6EF3BCDC58780

                          Control-flow Graph

                          APIs
                          • GetLastError.KERNEL32 ref: 000002C9AFBBCE37
                          • FlsGetValue.KERNEL32(?,?,?,000002C9AFBC0A6B,?,?,?,000002C9AFBC045C,?,?,?,000002C9AFBBC84F), ref: 000002C9AFBBCE4C
                          • FlsSetValue.KERNEL32(?,?,?,000002C9AFBC0A6B,?,?,?,000002C9AFBC045C,?,?,?,000002C9AFBBC84F), ref: 000002C9AFBBCE6D
                          • FlsSetValue.KERNEL32(?,?,?,000002C9AFBC0A6B,?,?,?,000002C9AFBC045C,?,?,?,000002C9AFBBC84F), ref: 000002C9AFBBCE9A
                          • FlsSetValue.KERNEL32(?,?,?,000002C9AFBC0A6B,?,?,?,000002C9AFBC045C,?,?,?,000002C9AFBBC84F), ref: 000002C9AFBBCEAB
                          • FlsSetValue.KERNEL32(?,?,?,000002C9AFBC0A6B,?,?,?,000002C9AFBC045C,?,?,?,000002C9AFBBC84F), ref: 000002C9AFBBCEBC
                          • SetLastError.KERNEL32 ref: 000002C9AFBBCED7
                          • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000002C9AFBC0A6B,?,?,?,000002C9AFBC045C,?,?,?,000002C9AFBBC84F), ref: 000002C9AFBBCF0D
                          • FlsSetValue.KERNEL32(?,?,00000001,000002C9AFBBECCC,?,?,?,?,000002C9AFBBBF9F,?,?,?,?,?,000002C9AFBB7AB0), ref: 000002C9AFBBCF2C
                            • Part of subcall function 000002C9AFBBD6CC: HeapAlloc.KERNEL32 ref: 000002C9AFBBD721
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002C9AFBC0A6B,?,?,?,000002C9AFBC045C,?,?,?,000002C9AFBBC84F), ref: 000002C9AFBBCF54
                            • Part of subcall function 000002C9AFBBD744: HeapFree.KERNEL32 ref: 000002C9AFBBD75A
                            • Part of subcall function 000002C9AFBBD744: GetLastError.KERNEL32 ref: 000002C9AFBBD764
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002C9AFBC0A6B,?,?,?,000002C9AFBC045C,?,?,?,000002C9AFBBC84F), ref: 000002C9AFBBCF65
                          • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002C9AFBC0A6B,?,?,?,000002C9AFBC045C,?,?,?,000002C9AFBBC84F), ref: 000002C9AFBBCF76
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Value$ErrorLast$Heap$AllocFree
                          • String ID:
                          • API String ID: 570795689-0
                          • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction ID: 1e0c9809fb35d835cfe5748f91c3c6cc249f9640fd7f840ff51d24447d742410
                          • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                          • Instruction Fuzzy Hash: AB41A3A330124486FA68E771595DF6D23B29B897B0F244734A87E4A6E6DE2BD4C18601

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                          • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                          • API String ID: 2171963597-1373409510
                          • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction ID: 59c4b00715b41af638ef0cc38557a4ec5d6ec558463e506295746c32e2e5ebc4
                          • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                          • Instruction Fuzzy Hash: AF211836614A4083FB108B25F48CB6E67B1F789BA5F544215EA9D02AA8DF7DC58ACB00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 611 2c9afbba544-2c9afbba5ac call 2c9afbbb414 614 2c9afbba5b2-2c9afbba5b5 611->614 615 2c9afbbaa13-2c9afbbaa1b call 2c9afbbc748 611->615 614->615 616 2c9afbba5bb-2c9afbba5c1 614->616 618 2c9afbba5c7-2c9afbba5cb 616->618 619 2c9afbba690-2c9afbba6a2 616->619 618->619 623 2c9afbba5d1-2c9afbba5dc 618->623 621 2c9afbba963-2c9afbba967 619->621 622 2c9afbba6a8-2c9afbba6ac 619->622 626 2c9afbba969-2c9afbba970 621->626 627 2c9afbba9a0-2c9afbba9aa call 2c9afbb9634 621->627 622->621 624 2c9afbba6b2-2c9afbba6bd 622->624 623->619 625 2c9afbba5e2-2c9afbba5e7 623->625 624->621 628 2c9afbba6c3-2c9afbba6ca 624->628 625->619 629 2c9afbba5ed-2c9afbba5f7 call 2c9afbb9634 625->629 626->615 630 2c9afbba976-2c9afbba99b call 2c9afbbaa1c 626->630 627->615 637 2c9afbba9ac-2c9afbba9cb call 2c9afbb7940 627->637 633 2c9afbba894-2c9afbba8a0 628->633 634 2c9afbba6d0-2c9afbba707 call 2c9afbb9a10 628->634 629->637 645 2c9afbba5fd-2c9afbba628 call 2c9afbb9634 * 2 call 2c9afbb9d24 629->645 630->627 633->627 638 2c9afbba8a6-2c9afbba8aa 633->638 634->633 649 2c9afbba70d-2c9afbba715 634->649 642 2c9afbba8ac-2c9afbba8b8 call 2c9afbb9ce4 638->642 643 2c9afbba8ba-2c9afbba8c2 638->643 642->643 655 2c9afbba8db-2c9afbba8e3 642->655 643->627 648 2c9afbba8c8-2c9afbba8d5 call 2c9afbb98b4 643->648 679 2c9afbba648-2c9afbba652 call 2c9afbb9634 645->679 680 2c9afbba62a-2c9afbba62e 645->680 648->627 648->655 653 2c9afbba719-2c9afbba74b 649->653 657 2c9afbba751-2c9afbba75c 653->657 658 2c9afbba887-2c9afbba88e 653->658 660 2c9afbba9f6-2c9afbbaa12 call 2c9afbb9634 * 2 call 2c9afbbc6a8 655->660 661 2c9afbba8e9-2c9afbba8ed 655->661 657->658 662 2c9afbba762-2c9afbba77b 657->662 658->633 658->653 660->615 664 2c9afbba900 661->664 665 2c9afbba8ef-2c9afbba8fe call 2c9afbb9ce4 661->665 666 2c9afbba874-2c9afbba879 662->666 667 2c9afbba781-2c9afbba7c6 call 2c9afbb9cf8 * 2 662->667 672 2c9afbba903-2c9afbba90d call 2c9afbbb4ac 664->672 665->672 674 2c9afbba884 666->674 692 2c9afbba804-2c9afbba80a 667->692 693 2c9afbba7c8-2c9afbba7ee call 2c9afbb9cf8 call 2c9afbbac38 667->693 672->627 690 2c9afbba913-2c9afbba961 call 2c9afbb9944 call 2c9afbb9b50 672->690 674->658 679->619 696 2c9afbba654-2c9afbba674 call 2c9afbb9634 * 2 call 2c9afbbb4ac 679->696 680->679 684 2c9afbba630-2c9afbba63b 680->684 684->679 689 2c9afbba63d-2c9afbba642 684->689 689->615 689->679 690->627 700 2c9afbba80c-2c9afbba810 692->700 701 2c9afbba87b 692->701 711 2c9afbba815-2c9afbba872 call 2c9afbba470 693->711 712 2c9afbba7f0-2c9afbba802 693->712 717 2c9afbba676-2c9afbba680 call 2c9afbbb59c 696->717 718 2c9afbba68b 696->718 700->667 702 2c9afbba880 701->702 702->674 711->702 712->692 712->693 721 2c9afbba686-2c9afbba9ef call 2c9afbb92ac call 2c9afbbaff4 call 2c9afbb94a0 717->721 722 2c9afbba9f0-2c9afbba9f5 call 2c9afbbc6a8 717->722 718->619 721->722 722->660
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction ID: 448c7d1acf4989fd402f052fba8c8c8c1a12d963704075dae7ad1702d6c3b9c9
                          • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                          • Instruction Fuzzy Hash: C2E13773A04B808AFB609B65D88CB9D7BB8F745B98F100126EE8D57B99CB35D5D1C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 490 2c9afb89944-2c9afb899ac call 2c9afb8a814 493 2c9afb899b2-2c9afb899b5 490->493 494 2c9afb89e13-2c9afb89e1b call 2c9afb8bb48 490->494 493->494 495 2c9afb899bb-2c9afb899c1 493->495 497 2c9afb899c7-2c9afb899cb 495->497 498 2c9afb89a90-2c9afb89aa2 495->498 497->498 502 2c9afb899d1-2c9afb899dc 497->502 500 2c9afb89d63-2c9afb89d67 498->500 501 2c9afb89aa8-2c9afb89aac 498->501 505 2c9afb89d69-2c9afb89d70 500->505 506 2c9afb89da0-2c9afb89daa call 2c9afb88a34 500->506 501->500 503 2c9afb89ab2-2c9afb89abd 501->503 502->498 504 2c9afb899e2-2c9afb899e7 502->504 503->500 508 2c9afb89ac3-2c9afb89aca 503->508 504->498 509 2c9afb899ed-2c9afb899f7 call 2c9afb88a34 504->509 505->494 510 2c9afb89d76-2c9afb89d9b call 2c9afb89e1c 505->510 506->494 516 2c9afb89dac-2c9afb89dcb call 2c9afb86d40 506->516 513 2c9afb89c94-2c9afb89ca0 508->513 514 2c9afb89ad0-2c9afb89b07 call 2c9afb88e10 508->514 509->516 524 2c9afb899fd-2c9afb89a28 call 2c9afb88a34 * 2 call 2c9afb89124 509->524 510->506 513->506 517 2c9afb89ca6-2c9afb89caa 513->517 514->513 528 2c9afb89b0d-2c9afb89b15 514->528 521 2c9afb89cba-2c9afb89cc2 517->521 522 2c9afb89cac-2c9afb89cb8 call 2c9afb890e4 517->522 521->506 527 2c9afb89cc8-2c9afb89cd5 call 2c9afb88cb4 521->527 522->521 535 2c9afb89cdb-2c9afb89ce3 522->535 558 2c9afb89a48-2c9afb89a52 call 2c9afb88a34 524->558 559 2c9afb89a2a-2c9afb89a2e 524->559 527->506 527->535 532 2c9afb89b19-2c9afb89b4b 528->532 537 2c9afb89b51-2c9afb89b5c 532->537 538 2c9afb89c87-2c9afb89c8e 532->538 539 2c9afb89df6-2c9afb89e12 call 2c9afb88a34 * 2 call 2c9afb8baa8 535->539 540 2c9afb89ce9-2c9afb89ced 535->540 537->538 541 2c9afb89b62-2c9afb89b7b 537->541 538->513 538->532 539->494 543 2c9afb89cef-2c9afb89cfe call 2c9afb890e4 540->543 544 2c9afb89d00 540->544 545 2c9afb89b81-2c9afb89bc6 call 2c9afb890f8 * 2 541->545 546 2c9afb89c74-2c9afb89c79 541->546 554 2c9afb89d03-2c9afb89d0d call 2c9afb8a8ac 543->554 544->554 571 2c9afb89c04-2c9afb89c0a 545->571 572 2c9afb89bc8-2c9afb89bee call 2c9afb890f8 call 2c9afb8a038 545->572 551 2c9afb89c84 546->551 551->538 554->506 569 2c9afb89d13-2c9afb89d61 call 2c9afb88d44 call 2c9afb88f50 554->569 558->498 575 2c9afb89a54-2c9afb89a74 call 2c9afb88a34 * 2 call 2c9afb8a8ac 558->575 559->558 563 2c9afb89a30-2c9afb89a3b 559->563 563->558 568 2c9afb89a3d-2c9afb89a42 563->568 568->494 568->558 569->506 579 2c9afb89c7b 571->579 580 2c9afb89c0c-2c9afb89c10 571->580 590 2c9afb89c15-2c9afb89c72 call 2c9afb89870 572->590 591 2c9afb89bf0-2c9afb89c02 572->591 596 2c9afb89a76-2c9afb89a80 call 2c9afb8a99c 575->596 597 2c9afb89a8b 575->597 581 2c9afb89c80 579->581 580->545 581->551 590->581 591->571 591->572 600 2c9afb89a86-2c9afb89def call 2c9afb886ac call 2c9afb8a3f4 call 2c9afb888a0 596->600 601 2c9afb89df0-2c9afb89df5 call 2c9afb8baa8 596->601 597->498 600->601 601->539
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2708939219.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afb80000_svchost.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction ID: e1543482f496544ac01f3d265fa18983b7e679a16db81be37ed29f5814919603
                          • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction Fuzzy Hash: 51E16973604B808AFB609B65D48CB9D7BB4F785B98F100115EE8E57B9ACB36C4D1C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: AddressFreeLibraryProc
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3013587201-537541572
                          • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction ID: 301f57847b70330022c145fbc2a4b8a83493534866993c33952b4f2a280b91e3
                          • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                          • Instruction Fuzzy Hash: C541D223311A0095FA16DBA6A81CF5E23B1FB49BE0F5941399D0EC7795EF3AC4C68310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction ID: f2c39bd5b50fffd7ac432d25aef4ddcec333aec918135e9fc63ebff3934d6b33
                          • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction Fuzzy Hash: 21411873214B849AE760CF61E44CB9E77B1F389B99F448129DA8D07A58DF39C589CB40
                          APIs
                          • FlsGetValue.KERNEL32(?,?,?,000002C9AFBBC7DE,?,?,?,?,?,?,?,?,000002C9AFBBCF9D,?,?,00000001), ref: 000002C9AFBBD087
                          • FlsSetValue.KERNEL32(?,?,?,000002C9AFBBC7DE,?,?,?,?,?,?,?,?,000002C9AFBBCF9D,?,?,00000001), ref: 000002C9AFBBD0A6
                          • FlsSetValue.KERNEL32(?,?,?,000002C9AFBBC7DE,?,?,?,?,?,?,?,?,000002C9AFBBCF9D,?,?,00000001), ref: 000002C9AFBBD0CE
                          • FlsSetValue.KERNEL32(?,?,?,000002C9AFBBC7DE,?,?,?,?,?,?,?,?,000002C9AFBBCF9D,?,?,00000001), ref: 000002C9AFBBD0DF
                          • FlsSetValue.KERNEL32(?,?,?,000002C9AFBBC7DE,?,?,?,?,?,?,?,?,000002C9AFBBCF9D,?,?,00000001), ref: 000002C9AFBBD0F0
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Value
                          • String ID: 1%$Y%
                          • API String ID: 3702945584-1395475152
                          • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction ID: f49d3e6c2ec92abad68370475c6992c089fb5492afa3ab8c21b3b13878c83f78
                          • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                          • Instruction Fuzzy Hash: C711C42270424446FA68A776596DF6D62719B483F0F684334A83E4B7EADE2EC4C28600
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 190073905-0
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: 643e7d9664bf6d483a2f22f1908bd072748fd4b4a36835f2e68cc5f5e3c2ff4e
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: F981C2637102418AFB54AB6A985DF9D26B1EB897C0F344435EA4D477E6EB3BC8C68700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction ID: fcd3ae759f9c2431972a02713780172aaa2b766f0442892340e32bfce9334084
                          • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                          • Instruction Fuzzy Hash: 8D31C623312A40E9FE16DB52A48CF6D23B4B748BA0F5945359D2D4B795EF3AC4C9C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                          • String ID: CONOUT$
                          • API String ID: 3230265001-3130406586
                          • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction ID: bb92da9f2f9668f7b5f227acd491ce29b4c739cb6a3fe036e66b21ed50e3b565
                          • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                          • Instruction Fuzzy Hash: 26116032310B4086F7508B52E84CB1E66B0F78CFE9F444214EA5E877A4CF39C8968744
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModule
                          • String ID: wr
                          • API String ID: 1092925422-2678910430
                          • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction ID: ef878f88f891a9cc0226c17ba60389822e2f4aefb6b623b1cf9ed56202d8aa50
                          • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                          • Instruction Fuzzy Hash: D4113926704B4182FF149B22E40CB6E62B1FB88B85F490039DE8D07794EF3EC586C704
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Thread$Current$Context
                          • String ID:
                          • API String ID: 1666949209-0
                          • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                          • Instruction ID: acbe2cf2811988f5ba6ec771451debd2ae620033772eca01979c4297e866113d
                          • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                          • Instruction Fuzzy Hash: 06D17777205B8885FA70DB1AE49C75EB7B0F788B84F100126EA8D47BA9DF39C591CB41
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID: dialer
                          • API String ID: 756756679-3528709123
                          • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction ID: 3f6427f0b897d203a8ff72d7fd6559241d5c4eb05b59a6866c1d13554c4c1640
                          • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                          • Instruction Fuzzy Hash: 50319C27701B5586FA16DF16A54CB2E67B1FB58B81F088030EE4C47B65EF3AC4E18300
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Value$ErrorLast
                          • String ID:
                          • API String ID: 2506987500-0
                          • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction ID: 4c62b697f470108bf8016cd8e8b79f0d9d7ea9fe1ab87fbd884b39be9c05a4f3
                          • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                          • Instruction Fuzzy Hash: AE11932330168046FA64A771595DF6D2272AB897F0F544734E83E4BBE6DE6FC4C28700
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                          • String ID:
                          • API String ID: 517849248-0
                          • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction ID: 776edabdd31d2c5d842730da3b0799cc3ee2df483632f5256c09317c09dc20e3
                          • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                          • Instruction Fuzzy Hash: 99010522700A4486FA549B52A89CB5A63A6B788FC5F884035DE5D43765DF3EC98A8740
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                          • String ID:
                          • API String ID: 449555515-0
                          • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction ID: c0c06ac6c320f4d94ed766a2d209336057b8d35aa10f5fab456b044bee74afef
                          • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                          • Instruction Fuzzy Hash: 4C012566711B4086FB249B22E84CF1E63B1FB49B86F080429CE4D07BA5EF3EC5898700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 2395640692-629598281
                          • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                          • Instruction ID: b69ce0b1e87cbfa36c7383619914696123ecf9d697f90beebf9ef022a96452c7
                          • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                          • Instruction Fuzzy Hash: 54517533611600AEFB14DB25E84CF5D37BAF389B88F618534EA5A47788EB76D981D700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: FinalHandleNamePathlstrlen
                          • String ID: \\?\
                          • API String ID: 2719912262-4282027825
                          • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction ID: f283fdb3b92fc894e6690af3394c64b1a34685d570d531e0bad4563ff6af074a
                          • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                          • Instruction Fuzzy Hash: 43F0372331464192FB608B25E8CCB5E6771F78CB89F848021DA4D46969DB2EC6CECB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: CombinePath
                          • String ID: \\.\pipe\
                          • API String ID: 3422762182-91387939
                          • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction ID: f7ca05bdc7977dee71d5ca1fcdca8066930d71e5797bde6381781ac8edae85d8
                          • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                          • Instruction Fuzzy Hash: EEF05826604B8082FA008B1AB91CB1E6272AB8CFC0F488130EE4E07B58DF2DC4CA8700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction ID: f2a47d8069daa03cbdfb4fc500137e4405ce41ebda65f3332e0620529a28fee1
                          • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                          • Instruction Fuzzy Hash: 0FF0626231160481FF148B24E84CF5E6331EB8C7A1F544229CA6E456E4CF2EC4CA8340
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                          • Instruction ID: cd5e9ef4991b1375355821580fedef02432e755ef5f93ed8371006dc914d02aa
                          • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                          • Instruction Fuzzy Hash: CC02A537219B8486EBA0CB55E49C75EB7B0F3C5794F104026EA8E87BA8DB7DC494CB01
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                          • Instruction ID: b1e56fe467506e00194dc39c0ce9e023ccecf8e5b3013ee0fe0790cfdca5572d
                          • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                          • Instruction Fuzzy Hash: 9C619477619B44CAF664CB56E44CB1EB7B0F388794F101126EA8E47BA8DB7EC580CB01
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: 43f043c85b949e32156fdd24b1a541c876183ad398725a0a0309fc5fe978a674
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: 24117323A20B5191F6741568D45EBEF19716B7CBB8F1A0624B9BE076D6CA36CBC34210
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2708939219.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afb80000_svchost.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: 584721eeace041210264c613900405bf356980670474624f32815c5f773a9f2e
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: 4F11A537A14F5112FAA81628E4DEB7D31B96B5C374F4D8638A97F467E6CB2AC8C14200
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: ErrorLast
                          • String ID:
                          • API String ID: 1452528299-0
                          • Opcode ID: 46c896f13dff0714c7ccebb8ca9383bb675cc38bcf091c92c481f4a556b8b138
                          • Instruction ID: 5f0923b011051a372b952a564947fdf115005ff3d78fbbe4d72771c375e561f8
                          • Opcode Fuzzy Hash: 46c896f13dff0714c7ccebb8ca9383bb675cc38bcf091c92c481f4a556b8b138
                          • Instruction Fuzzy Hash: 6D1130226116814AFF54AB25AC8CF6D22B5AB48BE0F184634D96F177E9DB2AD8C1C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2708939219.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afb80000_svchost.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: Tuesday$Wednesday$or copy constructor iterator'
                          • API String ID: 3215553584-4202648911
                          • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction ID: a80c000d8ef14b9d6fe3a44cdcf1669d2b1a24a1138b778100ebe55983d3a4d3
                          • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction Fuzzy Hash: F561DF7760064086FA69EF68E58CF6E6AB1F7C5780F504525DA4E07BE5DB3AC8C2C380
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3544855599-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: 7787783f401279bfe4e8df883c0c88822366a1d2909154027994fd102b4f05f2
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: FF613437A04A848AFB209F65D48CB9D7BB4F348B88F044225EE8E17B98DB79D595C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: 31b3f26767cfbd5d33780d55b243f7a0c5bb21e67230fd46beb19b15dbfd1668
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: 93516A736002808AFB648B25D58CB9D77B8F354B85F188236DE9D87B95CB3AD4D1CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2708939219.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afb80000_svchost.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: 7b8fdedeeafb5845af0b84257af6053867f2343152da48e03d6904e7ebe51b51
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: 92514633100680DAFB749F25954CB9C7BB8F395B94F188216DA9D87A95CB3AD4E1CB80
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2708939219.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afb80000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction ID: 5d92dd77b88c1299c49392ec59f61ae634460a69dbcd5fa06ed6980f75ea2f6d
                          • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction Fuzzy Hash: B851A6336026008BFB24CB25E44CFAD37B5F394B98F548124DA1E43B88EB36C9C18B84
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2708939219.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afb80000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction ID: b5f06c17726c17de06e8691df94384e4d09eaa0d6f39528b41e7222bcd2034c0
                          • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction Fuzzy Hash: B631443321164097FB15DB12E88CB6D77B4F780B98F198114AE9E07B98DB3AC981C784
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: FileWrite$ConsoleErrorLastOutput
                          • String ID:
                          • API String ID: 2718003287-0
                          • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction ID: b1df6fcf169da0f2c23391fb39f062101cbcfe82657cda599936ba6838e77f1a
                          • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                          • Instruction Fuzzy Hash: 22D1CE73B14A808AF711CFA9D448BAD3BB2F358B98F148216CE5D97B99DA35C587C340
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$Free
                          • String ID:
                          • API String ID: 3168794593-0
                          • Opcode ID: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction ID: a2a34c977606bb5db8cb26bfa32343d6a48bbb56a8d614ebbf91cc22d333de4d
                          • Opcode Fuzzy Hash: 57ec4baa428d3a80e79e8f3b815539f76c7f0782526738c577e62bebd88a5cdf
                          • Instruction Fuzzy Hash: C3014833600A90CAE704DF66E90CA4E67B2F78DF82F055425EA4E43729DF39C092C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: ConsoleErrorLastMode
                          • String ID:
                          • API String ID: 953036326-0
                          • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction ID: d82a3a815fee0c5bf6d1b581ba1ffa9b532a3d0fc2d0fcfd032ed3bc37568c9c
                          • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                          • Instruction Fuzzy Hash: C091AD77B10A9089FB649F65988CBAF2BB0F748B88F144119DE4E67A95DB36C4C3C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction ID: f05fb5dbfbf4ee90067a77cd8bcd11faeac36253877019b48f621463aab47820
                          • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                          • Instruction Fuzzy Hash: 72111822710B018AFB009B60E8597AD33B4F719B58F441E21DA6D86BA4DB79C1D98380
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction ID: 13dfc45ee8999d7752e4719eb8d1bfecabdd7e5a4ea9021741c5b3d42762be55
                          • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                          • Instruction Fuzzy Hash: AC71C43720078185F7669E2A985CBAE67B4F38A7C4F440036DD0E53B89DE36C985C704
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2708939219.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afb80000_svchost.jbxd
                          Similarity
                          • API ID: CallTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3163161869-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: 27acea5d09c819c127276e176587bd16326fc826214980c41f4223065fe66240
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: C4614533600A848AFB24DF65D488B9D7BB0F388B88F044215EF5D17B99DB3AD195C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID: \\.\pipe\
                          • API String ID: 3081899298-91387939
                          • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction ID: 4c95c1796a1b4e1a75a41bf22f50aef86c02afe1ac56ce1888579ab8e65249d8
                          • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                          • Instruction Fuzzy Hash: 8751B13320878181F6769F29A56CBAEA7B1F389780F850135DE5D13F99DA3BC585C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: ErrorFileLastWrite
                          • String ID: U
                          • API String ID: 442123175-4171548499
                          • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction ID: 2e468e8aefd2390e0960d30601159bd550b6bdbf4601160216b1694b950bacf8
                          • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                          • Instruction Fuzzy Hash: EF418F73715A8086EB20DF25E84CBAEA7B1F798794F514022EE4D87798EB7DC582C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction ID: 51ce7f104e7bba36b85a7a272c82e181c09526865ff15b60026bb4d9741eae8e
                          • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                          • Instruction Fuzzy Hash: 1F112B33218B8086FB618B15E44875EB7E5FB88B94F584221EE8C07758DF3DC591CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2708939219.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afb80000_svchost.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: ierarchy Descriptor'$riptor at (
                          • API String ID: 592178966-758928094
                          • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction ID: bf2ad28687dfe8ea3e6816bc925912ec73efb18b2860a6cd4dafdd41f8202739
                          • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                          • Instruction Fuzzy Hash: B2E08662680B4891FF018F21E8887AC33B0DB98B64B8891229D5C07311FB38D1E9C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000021.00000002.2708939219.000002C9AFB80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFB80000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afb80000_svchost.jbxd
                          Similarity
                          • API ID: __std_exception_copy
                          • String ID: Locator'$riptor at (
                          • API String ID: 592178966-4215709766
                          • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction ID: c07c44a9c34dfa32fee402106a4bc7daecd6475f583d3be07aec4fc8fa65f362
                          • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                          • Instruction Fuzzy Hash: 3AE08662640B4880FF018F21D4846AC73B0E758B54B889122CA4C07311EB38D1E5C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000021.00000002.2709765969.000002C9AFBB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C9AFBB0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_33_2_2c9afbb0000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocFree
                          • String ID:
                          • API String ID: 756756679-0
                          • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction ID: bc5ed3c553f8fad100e9731cf1632dc5c2dcdcc26d6bce90e57f3112b7a8f725
                          • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                          • Instruction Fuzzy Hash: D5114826601B8485FA54DB66A80CB2E77B1FB89FC1F285028DE4D57B76DF3AC482C340

                          Execution Graph

                          Execution Coverage:0.8%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:81
                          Total number of Limit Nodes:4
                          execution_graph 14935 2c06f7b273c 14937 2c06f7b276a 14935->14937 14936 2c06f7b2858 LoadLibraryA 14936->14937 14937->14936 14938 2c06f7b28d4 14937->14938 14939 2c06fd41abc 14945 2c06fd41628 GetProcessHeap 14939->14945 14941 2c06fd41ad2 Sleep SleepEx 14943 2c06fd41acb 14941->14943 14943->14941 14944 2c06fd41598 StrCmpIW StrCmpW 14943->14944 14990 2c06fd418b4 14943->14990 14944->14943 14946 2c06fd41648 _invalid_parameter_noinfo 14945->14946 15007 2c06fd41268 GetProcessHeap 14946->15007 14948 2c06fd41650 14949 2c06fd41268 2 API calls 14948->14949 14950 2c06fd41661 14949->14950 14951 2c06fd41268 2 API calls 14950->14951 14952 2c06fd4166a 14951->14952 14953 2c06fd41268 2 API calls 14952->14953 14954 2c06fd41673 14953->14954 14955 2c06fd4168e RegOpenKeyExW 14954->14955 14956 2c06fd418a6 14955->14956 14957 2c06fd416c0 RegOpenKeyExW 14955->14957 14956->14943 14958 2c06fd416ff RegOpenKeyExW 14957->14958 14959 2c06fd416e9 14957->14959 14960 2c06fd41723 14958->14960 14961 2c06fd4173a RegOpenKeyExW 14958->14961 15011 2c06fd412bc RegQueryInfoKeyW 14959->15011 15022 2c06fd4104c RegQueryInfoKeyW 14960->15022 14965 2c06fd41775 RegOpenKeyExW 14961->14965 14966 2c06fd4175e 14961->14966 14963 2c06fd416f5 RegCloseKey 14963->14958 14969 2c06fd417b0 RegOpenKeyExW 14965->14969 14970 2c06fd41799 14965->14970 14968 2c06fd412bc 11 API calls 14966->14968 14971 2c06fd4176b RegCloseKey 14968->14971 14973 2c06fd417d4 14969->14973 14974 2c06fd417eb RegOpenKeyExW 14969->14974 14972 2c06fd412bc 11 API calls 14970->14972 14971->14965 14977 2c06fd417a6 RegCloseKey 14972->14977 14978 2c06fd412bc 11 API calls 14973->14978 14975 2c06fd41826 RegOpenKeyExW 14974->14975 14976 2c06fd4180f 14974->14976 14981 2c06fd41861 RegOpenKeyExW 14975->14981 14982 2c06fd4184a 14975->14982 14980 2c06fd4104c 4 API calls 14976->14980 14977->14969 14979 2c06fd417e1 RegCloseKey 14978->14979 14979->14974 14983 2c06fd4181c RegCloseKey 14980->14983 14985 2c06fd41885 14981->14985 14986 2c06fd4189c RegCloseKey 14981->14986 14984 2c06fd4104c 4 API calls 14982->14984 14983->14975 14987 2c06fd41857 RegCloseKey 14984->14987 14988 2c06fd4104c 4 API calls 14985->14988 14986->14956 14987->14981 14989 2c06fd41892 RegCloseKey 14988->14989 14989->14986 15035 2c06fd414a4 14990->15035 15028 2c06fd56168 15007->15028 15010 2c06fd412ae _invalid_parameter_noinfo 15010->14948 15012 2c06fd41327 GetProcessHeap 15011->15012 15016 2c06fd4148a Concurrency::details::SchedulerProxy::DeleteThis 15011->15016 15013 2c06fd4133e _invalid_parameter_noinfo Concurrency::details::SchedulerProxy::DeleteThis 15012->15013 15014 2c06fd41476 GetProcessHeap 15013->15014 15015 2c06fd41352 RegEnumValueW 15013->15015 15018 2c06fd413d3 GetProcessHeap 15013->15018 15019 2c06fd4141e lstrlenW GetProcessHeap 15013->15019 15020 2c06fd41443 StrCpyW 15013->15020 15021 2c06fd413f3 GetProcessHeap 15013->15021 15030 2c06fd4152c 15013->15030 15014->15016 15015->15013 15016->14963 15018->15013 15019->15013 15020->15013 15021->15013 15023 2c06fd411b5 RegCloseKey 15022->15023 15026 2c06fd410bf _invalid_parameter_noinfo Concurrency::details::SchedulerProxy::DeleteThis 15022->15026 15023->14961 15024 2c06fd410cf RegEnumValueW 15024->15026 15025 2c06fd4114e GetProcessHeap 15025->15026 15026->15023 15026->15024 15026->15025 15027 2c06fd4116e GetProcessHeap 15026->15027 15027->15026 15029 2c06fd41283 GetProcessHeap 15028->15029 15029->15010 15031 2c06fd4157c 15030->15031 15034 2c06fd41546 15030->15034 15031->15013 15032 2c06fd41565 StrCmpW 15032->15034 15033 2c06fd4155d StrCmpIW 15033->15034 15034->15031 15034->15032 15034->15033 15036 2c06fd414e1 GetProcessHeap 15035->15036 15037 2c06fd414c1 GetProcessHeap 15035->15037 15041 2c06fd56180 15036->15041 15038 2c06fd414da Concurrency::details::SchedulerProxy::DeleteThis 15037->15038 15038->15036 15038->15037 15042 2c06fd414f6 GetProcessHeap HeapFree 15041->15042

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000022.00000002.2717734299.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06fd40000_svchost.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                          • String ID: d
                          • API String ID: 3743429067-2564639436
                          • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction ID: 5b73f61b0c74de695f112d37e4006b8e7370b6798754f90282f408be911c45d4
                          • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                          • Instruction Fuzzy Hash: 22418333214B84C6FB61CF21E488B9E77A6F389B98F148115DB8A07B58DF39D459CB00

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.2717734299.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06fd40000_svchost.jbxd
                          Similarity
                          • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                          • String ID:
                          • API String ID: 1683269324-0
                          • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction ID: 5557b667f06bec5261fb59547d169d9df883b485d8ac4d7f7340c84304a1904e
                          • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                          • Instruction Fuzzy Hash: 2011C030610200C2FF60BF28F8CEF5D22DFAB55749F704124E90A82590EF7BE0789610

                          Control-flow Graph

                          APIs
                            • Part of subcall function 000002C06FD41628: GetProcessHeap.KERNEL32 ref: 000002C06FD41633
                            • Part of subcall function 000002C06FD41628: HeapAlloc.KERNEL32 ref: 000002C06FD41642
                            • Part of subcall function 000002C06FD41628: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD416B2
                            • Part of subcall function 000002C06FD41628: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD416DF
                            • Part of subcall function 000002C06FD41628: RegCloseKey.ADVAPI32 ref: 000002C06FD416F9
                            • Part of subcall function 000002C06FD41628: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD41719
                            • Part of subcall function 000002C06FD41628: RegCloseKey.ADVAPI32 ref: 000002C06FD41734
                            • Part of subcall function 000002C06FD41628: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD41754
                            • Part of subcall function 000002C06FD41628: RegCloseKey.ADVAPI32 ref: 000002C06FD4176F
                            • Part of subcall function 000002C06FD41628: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD4178F
                            • Part of subcall function 000002C06FD41628: RegCloseKey.ADVAPI32 ref: 000002C06FD417AA
                            • Part of subcall function 000002C06FD41628: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD417CA
                          • Sleep.KERNEL32 ref: 000002C06FD41AD7
                          • SleepEx.KERNELBASE ref: 000002C06FD41ADD
                            • Part of subcall function 000002C06FD41628: RegCloseKey.ADVAPI32 ref: 000002C06FD417E5
                            • Part of subcall function 000002C06FD41628: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD41805
                            • Part of subcall function 000002C06FD41628: RegCloseKey.ADVAPI32 ref: 000002C06FD41820
                            • Part of subcall function 000002C06FD41628: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD41840
                            • Part of subcall function 000002C06FD41628: RegCloseKey.ADVAPI32 ref: 000002C06FD4185B
                            • Part of subcall function 000002C06FD41628: RegOpenKeyExW.ADVAPI32 ref: 000002C06FD4187B
                            • Part of subcall function 000002C06FD41628: RegCloseKey.ADVAPI32 ref: 000002C06FD41896
                            • Part of subcall function 000002C06FD41628: RegCloseKey.ADVAPI32 ref: 000002C06FD418A0
                          Memory Dump Source
                          • Source File: 00000022.00000002.2717734299.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06fd40000_svchost.jbxd
                          Similarity
                          • API ID: CloseOpen$HeapSleep$AllocProcess
                          • String ID:
                          • API String ID: 1534210851-0
                          • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction ID: 416f17fdec569be69bdaa96ec92e87237991dca4c06b2f921ec5727e7a504340
                          • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                          • Instruction Fuzzy Hash: 6531E161210641D2FF529F26DAC9BAD23EFAB45BC4F2464219E0987BD5FF36E871C210

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 73 2c06fd43844-2c06fd4384f 74 2c06fd43851-2c06fd43864 StrCmpNIW 73->74 75 2c06fd43869-2c06fd43870 73->75 74->75 76 2c06fd43866 74->76 76->75
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000022.00000002.2717734299.000002C06FD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06FD40000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06fd40000_svchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: dialer
                          • API String ID: 0-3528709123
                          • Opcode ID: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                          • Instruction ID: eea1c37edd9a2c7a6367f319b2426d74f6525a99311fafc593295ecfd6f5889e
                          • Opcode Fuzzy Hash: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                          • Instruction Fuzzy Hash: 86D0A760311205CBFF54DFAAC8CDF6C639AEB08744FDC4020C90001150DB2BA9FDA710

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.2716251170.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06f7b0000_svchost.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction ID: c74763199557573ee21cf50daf6970a883384bf5152a0e18b4061da6f84da58c
                          • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                          • Instruction Fuzzy Hash: 2B613332B02291C7FB56CF559488B2DF3AAF755BA4F288121DE5D13788DA39D972C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 227 2c06f7b6910-2c06f7b6916 228 2c06f7b6918-2c06f7b691b 227->228 229 2c06f7b6951-2c06f7b695b 227->229 231 2c06f7b691d-2c06f7b6920 228->231 232 2c06f7b6945-2c06f7b6984 call 2c06f7b6fc0 228->232 230 2c06f7b6a78-2c06f7b6a8d 229->230 236 2c06f7b6a8f 230->236 237 2c06f7b6a9c-2c06f7b6ab6 call 2c06f7b6e54 230->237 234 2c06f7b6938 __scrt_dllmain_crt_thread_attach 231->234 235 2c06f7b6922-2c06f7b6925 231->235 250 2c06f7b698a-2c06f7b699f call 2c06f7b6e54 232->250 251 2c06f7b6a52 232->251 239 2c06f7b693d-2c06f7b6944 234->239 241 2c06f7b6931-2c06f7b6936 call 2c06f7b6f04 235->241 242 2c06f7b6927-2c06f7b6930 235->242 243 2c06f7b6a91-2c06f7b6a9b 236->243 248 2c06f7b6ab8-2c06f7b6aed call 2c06f7b6f7c call 2c06f7b6e1c call 2c06f7b7318 call 2c06f7b7130 call 2c06f7b7154 call 2c06f7b6fac 237->248 249 2c06f7b6aef-2c06f7b6b20 call 2c06f7b7190 237->249 241->239 248->243 259 2c06f7b6b22-2c06f7b6b28 249->259 260 2c06f7b6b31-2c06f7b6b37 249->260 262 2c06f7b6a6a-2c06f7b6a77 call 2c06f7b7190 250->262 263 2c06f7b69a5-2c06f7b69b6 call 2c06f7b6ec4 250->263 254 2c06f7b6a54-2c06f7b6a69 251->254 259->260 264 2c06f7b6b2a-2c06f7b6b2c 259->264 265 2c06f7b6b39-2c06f7b6b43 260->265 266 2c06f7b6b7e-2c06f7b6b94 call 2c06f7b268c 260->266 262->230 281 2c06f7b69b8-2c06f7b69dc call 2c06f7b72dc call 2c06f7b6e0c call 2c06f7b6e38 call 2c06f7bac0c 263->281 282 2c06f7b6a07-2c06f7b6a11 call 2c06f7b7130 263->282 270 2c06f7b6c1f-2c06f7b6c2c 264->270 271 2c06f7b6b4f-2c06f7b6b5d call 2c06f7c5780 265->271 272 2c06f7b6b45-2c06f7b6b4d 265->272 284 2c06f7b6bcc-2c06f7b6bce 266->284 285 2c06f7b6b96-2c06f7b6b98 266->285 278 2c06f7b6b63-2c06f7b6b78 call 2c06f7b6910 271->278 294 2c06f7b6c15-2c06f7b6c1d 271->294 272->278 278->266 278->294 281->282 330 2c06f7b69de-2c06f7b69e5 __scrt_dllmain_after_initialize_c 281->330 282->251 303 2c06f7b6a13-2c06f7b6a1f call 2c06f7b7180 282->303 292 2c06f7b6bd0-2c06f7b6bd3 284->292 293 2c06f7b6bd5-2c06f7b6bea call 2c06f7b6910 284->293 285->284 291 2c06f7b6b9a-2c06f7b6bbc call 2c06f7b268c call 2c06f7b6a78 285->291 291->284 324 2c06f7b6bbe-2c06f7b6bc6 call 2c06f7c5780 291->324 292->293 292->294 293->294 312 2c06f7b6bec-2c06f7b6bf6 293->312 294->270 314 2c06f7b6a21-2c06f7b6a2b call 2c06f7b7098 303->314 315 2c06f7b6a45-2c06f7b6a50 303->315 318 2c06f7b6bf8-2c06f7b6bff 312->318 319 2c06f7b6c01-2c06f7b6c11 call 2c06f7c5780 312->319 314->315 329 2c06f7b6a2d-2c06f7b6a3b 314->329 315->254 318->294 319->294 324->284 329->315 330->282 331 2c06f7b69e7-2c06f7b6a04 call 2c06f7babc8 330->331 331->282
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000022.00000002.2716251170.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06f7b0000_svchost.jbxd
                          Similarity
                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                          • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                          • API String ID: 190073905-1786718095
                          • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction ID: b4a5d01f42281bc93223997a5fb6c3cf1ff2202b2b11c74289c8ce0a1e91c913
                          • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                          • Instruction Fuzzy Hash: E781C461600241CAFB50AFE5ACCDF5DE2ACEB87780F7490659B0587796DB3BCB668700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 483 2c06f7b9944-2c06f7b99ac call 2c06f7ba814 486 2c06f7b9e13-2c06f7b9e1b call 2c06f7bbb48 483->486 487 2c06f7b99b2-2c06f7b99b5 483->487 487->486 488 2c06f7b99bb-2c06f7b99c1 487->488 490 2c06f7b9a90-2c06f7b9aa2 488->490 491 2c06f7b99c7-2c06f7b99cb 488->491 493 2c06f7b9aa8-2c06f7b9aac 490->493 494 2c06f7b9d63-2c06f7b9d67 490->494 491->490 495 2c06f7b99d1-2c06f7b99dc 491->495 493->494 498 2c06f7b9ab2-2c06f7b9abd 493->498 496 2c06f7b9d69-2c06f7b9d70 494->496 497 2c06f7b9da0-2c06f7b9daa call 2c06f7b8a34 494->497 495->490 499 2c06f7b99e2-2c06f7b99e7 495->499 496->486 500 2c06f7b9d76-2c06f7b9d9b call 2c06f7b9e1c 496->500 497->486 510 2c06f7b9dac-2c06f7b9dcb call 2c06f7b6d40 497->510 498->494 502 2c06f7b9ac3-2c06f7b9aca 498->502 499->490 503 2c06f7b99ed-2c06f7b99f7 call 2c06f7b8a34 499->503 500->497 506 2c06f7b9ad0-2c06f7b9b07 call 2c06f7b8e10 502->506 507 2c06f7b9c94-2c06f7b9ca0 502->507 503->510 514 2c06f7b99fd-2c06f7b9a28 call 2c06f7b8a34 * 2 call 2c06f7b9124 503->514 506->507 519 2c06f7b9b0d-2c06f7b9b15 506->519 507->497 511 2c06f7b9ca6-2c06f7b9caa 507->511 516 2c06f7b9cba-2c06f7b9cc2 511->516 517 2c06f7b9cac-2c06f7b9cb8 call 2c06f7b90e4 511->517 551 2c06f7b9a2a-2c06f7b9a2e 514->551 552 2c06f7b9a48-2c06f7b9a52 call 2c06f7b8a34 514->552 516->497 518 2c06f7b9cc8-2c06f7b9cd5 call 2c06f7b8cb4 516->518 517->516 531 2c06f7b9cdb-2c06f7b9ce3 517->531 518->497 518->531 524 2c06f7b9b19-2c06f7b9b4b 519->524 528 2c06f7b9b51-2c06f7b9b5c 524->528 529 2c06f7b9c87-2c06f7b9c8e 524->529 528->529 532 2c06f7b9b62-2c06f7b9b7b 528->532 529->507 529->524 533 2c06f7b9ce9-2c06f7b9ced 531->533 534 2c06f7b9df6-2c06f7b9e12 call 2c06f7b8a34 * 2 call 2c06f7bbaa8 531->534 536 2c06f7b9b81-2c06f7b9bc6 call 2c06f7b90f8 * 2 532->536 537 2c06f7b9c74-2c06f7b9c79 532->537 538 2c06f7b9cef-2c06f7b9cfe call 2c06f7b90e4 533->538 539 2c06f7b9d00 533->539 534->486 564 2c06f7b9bc8-2c06f7b9bee call 2c06f7b90f8 call 2c06f7ba038 536->564 565 2c06f7b9c04-2c06f7b9c0a 536->565 543 2c06f7b9c84 537->543 547 2c06f7b9d03-2c06f7b9d0d call 2c06f7ba8ac 538->547 539->547 543->529 547->497 562 2c06f7b9d13-2c06f7b9d61 call 2c06f7b8d44 call 2c06f7b8f50 547->562 551->552 556 2c06f7b9a30-2c06f7b9a3b 551->556 552->490 568 2c06f7b9a54-2c06f7b9a74 call 2c06f7b8a34 * 2 call 2c06f7ba8ac 552->568 556->552 561 2c06f7b9a3d-2c06f7b9a42 556->561 561->486 561->552 562->497 584 2c06f7b9bf0-2c06f7b9c02 564->584 585 2c06f7b9c15-2c06f7b9c72 call 2c06f7b9870 564->585 569 2c06f7b9c7b 565->569 570 2c06f7b9c0c-2c06f7b9c10 565->570 589 2c06f7b9a8b 568->589 590 2c06f7b9a76-2c06f7b9a80 call 2c06f7ba99c 568->590 575 2c06f7b9c80 569->575 570->536 575->543 584->564 584->565 585->575 589->490 593 2c06f7b9df0-2c06f7b9df5 call 2c06f7bbaa8 590->593 594 2c06f7b9a86-2c06f7b9def call 2c06f7b86ac call 2c06f7ba3f4 call 2c06f7b88a0 590->594 593->534 594->593
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000022.00000002.2716251170.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06f7b0000_svchost.jbxd
                          Similarity
                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 849930591-393685449
                          • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction ID: 35caf141b2f3d798d5cb5ab4e110afd774785aae392f99717540b21b1c225da5
                          • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                          • Instruction Fuzzy Hash: FCE1B272604B40CAFB60DFA5D4C8B9DB7B8F766798F200115EE9957B99CB35C2A1C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000022.00000002.2716251170.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06f7b0000_svchost.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction ID: 52df65138fb024a4e51a5a863b3c083e8c200634c173810125eb53a83c3b5e6b
                          • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                          • Instruction Fuzzy Hash: 6E112C32650E01CDFAE41DF8F4CFB6D90886B59370F794638AA76063D6CB2ACB604201
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000022.00000002.2716251170.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06f7b0000_svchost.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: Tuesday$Wednesday$or copy constructor iterator'
                          • API String ID: 3215553584-4202648911
                          • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction ID: 3a2c35e90514f7f626b7ffb703298c8873b3bbd6ebdf358830a21a6a4eee67b5
                          • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                          • Instruction Fuzzy Hash: 6161B83A500644C6F6699FE9E5CCFEDE6A8E747B40F748815DA0A177A4DB36CB61C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000022.00000002.2716251170.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06f7b0000_svchost.jbxd
                          Similarity
                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                          • String ID: csm$csm
                          • API String ID: 3896166516-3733052814
                          • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction ID: 3a80fb5763e54d777fbfc394f4b853dbc391fe6af0bad3f4c9a79944c3d625de
                          • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                          • Instruction Fuzzy Hash: 7C518E32104281CAFB649F95949CB5CB7A8F396B84F28411ADF9987BD5CB3AD6B1C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000022.00000002.2716251170.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06f7b0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction ID: eee125fda93c6652dd047afdae2af78c910ab50d7945a0b0c9339754d9fe974c
                          • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                          • Instruction Fuzzy Hash: 3E51E132709202CAFB15CF95E48CF5CB39DF742B98F708024EA1643788EB36DA528704
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000022.00000002.2716251170.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06f7b0000_svchost.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritable__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 3242871069-629598281
                          • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction ID: 12b57857d640d0d716391cc1e35f31a82321f17d190bcbb5cde68e292acf8282
                          • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                          • Instruction Fuzzy Hash: 69319F32209742DAFB15DF95E888F5DB7ACF741B98F258014EE5A07784DB3ACA62C704
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000022.00000002.2716251170.000002C06F7B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002C06F7B0000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_34_2_2c06f7b0000_svchost.jbxd
                          Similarity
                          • API ID: CallTranslator
                          • String ID: MOC$RCC
                          • API String ID: 3163161869-2084237596
                          • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction ID: 484794cded1398cd759f362327a470871452240848fb4352c55ea9a1594bca32
                          • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                          • Instruction Fuzzy Hash: 32616733604B84CAFB20DFA5D084B9DB7B4F765B88F244215EE5917B98DB39D2A5C700