Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6q0LW5Szsb.dll

Overview

General Information

Sample name:6q0LW5Szsb.dll
renamed because original name is a hash value
Original sample name:0728C17205BDE428AF3D9933EB367B88.dll
Analysis ID:1502150
MD5:0728c17205bde428af3d9933eb367b88
SHA1:c0b7bc01abb8352c3f4227c2af5a2510195058eb
SHA256:c24387cd9dd49c18e111bb6ef9d28e247b8bcca0dc9c54e550f2d596e9a82cb5
Tags:dllGh0stRAT
Infos:

Detection

GhostRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected GhostRat
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the clipboard data
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5232 cmdline: loaddll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 5568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3168 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 3604 cmdline: rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2260 cmdline: rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,CanUnloadNow MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6572 cmdline: rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,DarkAngle MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7024 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6572 -s 720 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 4924 cmdline: rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,GetClassObject MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6884 cmdline: rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",CanUnloadNow MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5856 cmdline: rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",DarkAngle MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 3980 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5856 -s 724 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 3368 cmdline: rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",GetClassObject MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5664 cmdline: rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",UnregisterServer MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2504 cmdline: rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",RegisterServer MD5: 889B99C52A60DD49227C5E485A016679)
  • svchost.exe (PID: 3368 cmdline: C:\Windows\SysWOW64\svchost.exe -k imgsvc MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • svchost.exe (PID: 3608 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 2008 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 6572 -ip 6572 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 6996 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5856 -ip 5856 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 1620 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3228 -ip 3228 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 1004 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1712 -ip 1712 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • svchost.exe (PID: 1904 cmdline: C:\Windows\SysWOW64\svchost.exe -k imgsvc MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
{"C2 url": "115.230.124.27"}
SourceRuleDescriptionAuthorStrings
6q0LW5Szsb.dllJoeSecurity_GhostRatYara detected GhostRatJoe Security
    6q0LW5Szsb.dllINDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDPDetects executables embedding registry key / value combination manipulating RDP / Terminal ServicesditekSHen
    • 0x1cbb8:$r1: SOFTWARE\Policies\Microsoft\Windows\Installer
    • 0x1cbe8:$k1: EnableAdminTSRemote
    • 0x1c9e0:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x1ca24:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x1ca6c:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x1cb28:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x1cb5c:$k2: TSEnabled
    • 0x1caf4:$r3: SYSTEM\CurrentControlSet\Services\TermDD
    • 0x1cac4:$r4: SYSTEM\CurrentControlSet\Services\TermService
    • 0x1cb20:$k3: Start
    • 0x1c9e0:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x1ca24:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x1ca6c:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x1cb28:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x1cab0:$k4: fDenyTSConnections
    • 0x1ca6c:$r6: SYSTEM\CurrentControlSet\Control\Terminal Server\RDPTcp
    • 0x1c9e0:$r7: SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp
    • 0x1ca24:$r8: SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp
    • 0x1caa4:$k5: PortNumber
    SourceRuleDescriptionAuthorStrings
    dump.pcapJoeSecurity_GhostRatYara detected GhostRatJoe Security
      dump.pcapgh0stunknownhttps://github.com/jackcr/
      • 0x14e:$a: 47 68 30 73 74 C8 00 00 00 50 01 00 00 78 9C
      • 0x2ed50:$a: 47 68 30 73 74 C7 00 00 00 50 01 00 00 78 9C
      • 0x37f9e:$a: 47 68 30 73 74 C8 00 00 00 50 01 00 00 78 9C
      • 0x5279c:$a: 47 68 30 73 74 C7 00 00 00 50 01 00 00 78 9C
      • 0x5a3f7:$a: 47 68 30 73 74 C9 00 00 00 50 01 00 00 78 9C
      • 0x5ac38:$a: 47 68 30 73 74 C6 00 00 00 50 01 00 00 78 9C
      • 0x5b000:$a: 47 68 30 73 74 C7 00 00 00 50 01 00 00 78 9C
      • 0x643bb:$a: 47 68 30 73 74 C7 00 00 00 50 01 00 00 78 9C
      • 0x6b819:$a: 47 68 30 73 74 C7 00 00 00 50 01 00 00 78 9C
      • 0x6bfdc:$a: 47 68 30 73 74 C6 00 00 00 50 01 00 00 78 9C
      • 0x6c26a:$a: 47 68 30 73 74 C7 00 00 00 50 01 00 00 78 9C
      • 0x6e077:$a: 47 68 30 73 74 C8 00 00 00 50 01 00 00 78 9C
      • 0x6e307:$a: 47 68 30 73 74 C6 00 00 00 50 01 00 00 78 9C
      • 0x6e595:$a: 47 68 30 73 74 C6 00 00 00 50 01 00 00 78 9C
      • 0x6e823:$a: 47 68 30 73 74 C6 00 00 00 50 01 00 00 78 9C
      SourceRuleDescriptionAuthorStrings
      C:\Program Files (x86)\Iefg\Nefghijkl.picJoeSecurity_GhostRatYara detected GhostRatJoe Security
        C:\Program Files (x86)\Iefg\Nefghijkl.picINDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDPDetects executables embedding registry key / value combination manipulating RDP / Terminal ServicesditekSHen
        • 0x1cbb8:$r1: SOFTWARE\Policies\Microsoft\Windows\Installer
        • 0x1cbe8:$k1: EnableAdminTSRemote
        • 0x1c9e0:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
        • 0x1ca24:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
        • 0x1ca6c:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
        • 0x1cb28:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
        • 0x1cb5c:$k2: TSEnabled
        • 0x1caf4:$r3: SYSTEM\CurrentControlSet\Services\TermDD
        • 0x1cac4:$r4: SYSTEM\CurrentControlSet\Services\TermService
        • 0x1cb20:$k3: Start
        • 0x1c9e0:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
        • 0x1ca24:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
        • 0x1ca6c:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
        • 0x1cb28:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
        • 0x1cab0:$k4: fDenyTSConnections
        • 0x1ca6c:$r6: SYSTEM\CurrentControlSet\Control\Terminal Server\RDPTcp
        • 0x1c9e0:$r7: SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp
        • 0x1ca24:$r8: SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp
        • 0x1caa4:$k5: PortNumber
        SourceRuleDescriptionAuthorStrings
        0000001C.00000002.2925657952.0000000003E50000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
          0000001C.00000002.2925657952.0000000003E50000.00000004.00001000.00020000.00000000.sdmpgh0stunknownhttps://github.com/jackcr/
          • 0x0:$a: 47 68 30 73 74 C6 00 00 00 50 01 00 00 78 9C
          0000001C.00000003.2821969948.0000000003E60000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
            0000001C.00000003.2821969948.0000000003E60000.00000004.00001000.00020000.00000000.sdmpgh0stunknownhttps://github.com/jackcr/
            • 0x0:$a: 47 68 30 73 74 C6 00 00 00 50 01 00 00 78 9C
            0000001C.00000003.2719359677.0000000003E00000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              7.2.rundll32.exe.10000000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                28.2.svchost.exe.10000000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                  13.2.rundll32.exe.10000000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                    7.2.rundll32.exe.10000000.0.unpackGhostDragon_Gh0stRATDetects Gh0st RAT mentioned in Cylance\' Ghost Dragon ReportFlorian Roth
                    • 0x1c95c:$x4: Http/1.1 403 Forbidden
                    • 0x1d058:$s4: Mozilla/4.0 (compatible)
                    • 0x1c95c:$s5: Http/1.1 403 Forbidden
                    28.2.svchost.exe.10000000.0.unpackGhostDragon_Gh0stRATDetects Gh0st RAT mentioned in Cylance\' Ghost Dragon ReportFlorian Roth
                    • 0x1c95c:$x4: Http/1.1 403 Forbidden
                    • 0x1d058:$s4: Mozilla/4.0 (compatible)
                    • 0x1c95c:$s5: Http/1.1 403 Forbidden
                    Click to see the 4 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: vburov: Data: Command: C:\Windows\SysWOW64\svchost.exe -k imgsvc, CommandLine: C:\Windows\SysWOW64\svchost.exe -k imgsvc, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe -k imgsvc, ProcessId: 3368, ProcessName: svchost.exe
                    Timestamp:2024-08-31T08:32:45.072145+0200
                    SID:2013214
                    Severity:1
                    Source Port:62548
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:45.072145+0200
                    SID:2016922
                    Severity:1
                    Source Port:62548
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:45.072145+0200
                    SID:2021716
                    Severity:1
                    Source Port:62548
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:20.007832+0200
                    SID:2013214
                    Severity:1
                    Source Port:62556
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:20.007832+0200
                    SID:2016922
                    Severity:1
                    Source Port:62556
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:20.007832+0200
                    SID:2021716
                    Severity:1
                    Source Port:62556
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:08.828342+0200
                    SID:2013214
                    Severity:1
                    Source Port:49737
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:08.828342+0200
                    SID:2016922
                    Severity:1
                    Source Port:49737
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:08.828342+0200
                    SID:2021716
                    Severity:1
                    Source Port:49737
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:19.104194+0200
                    SID:2013214
                    Severity:1
                    Source Port:62537
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:19.104194+0200
                    SID:2016922
                    Severity:1
                    Source Port:62537
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:19.104194+0200
                    SID:2021716
                    Severity:1
                    Source Port:62537
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:49.787185+0200
                    SID:2013214
                    Severity:1
                    Source Port:62549
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:49.787185+0200
                    SID:2016922
                    Severity:1
                    Source Port:62549
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:49.787185+0200
                    SID:2021716
                    Severity:1
                    Source Port:62549
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:29.411116+0200
                    SID:2013214
                    Severity:1
                    Source Port:62543
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:29.411116+0200
                    SID:2016922
                    Severity:1
                    Source Port:62543
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:29.411116+0200
                    SID:2021716
                    Severity:1
                    Source Port:62543
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:34:02.900555+0200
                    SID:2013214
                    Severity:1
                    Source Port:62562
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:34:02.900555+0200
                    SID:2016922
                    Severity:1
                    Source Port:62562
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:34:02.900555+0200
                    SID:2021716
                    Severity:1
                    Source Port:62562
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:42.235407+0200
                    SID:2013214
                    Severity:1
                    Source Port:62560
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:42.235407+0200
                    SID:2016922
                    Severity:1
                    Source Port:62560
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:42.235407+0200
                    SID:2021716
                    Severity:1
                    Source Port:62560
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:31:58.559842+0200
                    SID:2013214
                    Severity:1
                    Source Port:49730
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:31:58.559842+0200
                    SID:2016922
                    Severity:1
                    Source Port:49730
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:31:58.559842+0200
                    SID:2021716
                    Severity:1
                    Source Port:49730
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:52.496650+0200
                    SID:2013214
                    Severity:1
                    Source Port:62561
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:52.496650+0200
                    SID:2016922
                    Severity:1
                    Source Port:62561
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:52.496650+0200
                    SID:2021716
                    Severity:1
                    Source Port:62561
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:09.738414+0200
                    SID:2013214
                    Severity:1
                    Source Port:62555
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:09.738414+0200
                    SID:2016922
                    Severity:1
                    Source Port:62555
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:09.738414+0200
                    SID:2021716
                    Severity:1
                    Source Port:62555
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:38.498327+0200
                    SID:2013214
                    Severity:1
                    Source Port:62547
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:38.498327+0200
                    SID:2016922
                    Severity:1
                    Source Port:62547
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:38.498327+0200
                    SID:2021716
                    Severity:1
                    Source Port:62547
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:31.967008+0200
                    SID:2013214
                    Severity:1
                    Source Port:62559
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:31.967008+0200
                    SID:2016922
                    Severity:1
                    Source Port:62559
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:33:31.967008+0200
                    SID:2021716
                    Severity:1
                    Source Port:62559
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:53.200037+0200
                    SID:2013214
                    Severity:1
                    Source Port:62551
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:53.200037+0200
                    SID:2016922
                    Severity:1
                    Source Port:62551
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:53.200037+0200
                    SID:2021716
                    Severity:1
                    Source Port:62551
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:59.464269+0200
                    SID:2013214
                    Severity:1
                    Source Port:62554
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:59.464269+0200
                    SID:2016922
                    Severity:1
                    Source Port:62554
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected
                    Timestamp:2024-08-31T08:32:59.464269+0200
                    SID:2021716
                    Severity:1
                    Source Port:62554
                    Destination Port:9026
                    Protocol:TCP
                    Classtype:Malware Command and Control Activity Detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 6q0LW5Szsb.dllAvira: detected
                    Source: C:\Program Files (x86)\Iefg\Nefghijkl.picAvira: detection malicious, Label: BDS/Farfli.kj.2
                    Source: 6q0LW5Szsb.dllMalware Configuration Extractor: GhostRat {"C2 url": "115.230.124.27"}
                    Source: 6q0LW5Szsb.dllReversingLabs: Detection: 97%
                    Source: 6q0LW5Szsb.dllVirustotal: Detection: 82%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
                    Source: C:\Program Files (x86)\Iefg\Nefghijkl.picJoe Sandbox ML: detected
                    Source: 6q0LW5Szsb.dllJoe Sandbox ML: detected
                    Source: 6q0LW5Szsb.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:49730 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:49730 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:49730 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:49737 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:49737 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:49737 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62554 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62554 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62554 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62549 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62549 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62562 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62549 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62556 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62556 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62556 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62562 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62562 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62561 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62561 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62561 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62555 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62555 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62547 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62547 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62555 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62547 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62559 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62559 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62559 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62551 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62551 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62543 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62551 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62543 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62548 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62548 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62543 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62548 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62537 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62537 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62537 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.4:62560 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:62560 -> 115.230.124.27:9026
                    Source: Network trafficSuricata IDS: 2021716 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 : 192.168.2.4:62560 -> 115.230.124.27:9026
                    Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 115.230.124.27 9026Jump to behavior
                    Source: Malware configuration extractorURLs: 115.230.124.27
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 115.230.124.27:9026
                    Source: Joe Sandbox ViewASN Name: CT-HANGZHOU-IDCNo288Fu-chunRoadCN CT-HANGZHOU-IDCNo288Fu-chunRoadCN
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 115.230.124.27
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10008800 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,malloc,malloc,malloc,malloc,recv,send,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,getpeername,inet_addr,inet_addr,inet_addr,htons,send,send,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,closesocket,closesocket,closesocket,free,free,free,free,free,7_2_10008800
                    Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
                    Source: svchost.exe, svchost.exe, 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: http://www.baidu.com/ip.txt
                    Source: svchost.exe, 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: http://www.baidu.com/ip.txtB#Dark
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000DA60 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,7_2_1000DA60
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000DA60 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,7_2_1000DA60
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_1000DA60 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,28_2_1000DA60
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000DB20 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,OpenClipboard,GetClipboardData,CloseClipboard,??2@YAPAXI@Z,CloseClipboard,??3@YAXPAX@Z,7_2_1000DB20

                    System Summary

                    barindex
                    Source: 6q0LW5Szsb.dll, type: SAMPLEMatched rule: Detects executables embedding registry key / value combination manipulating RDP / Terminal Services Author: ditekSHen
                    Source: dump.pcap, type: PCAPMatched rule: gh0st Author: https://github.com/jackcr/
                    Source: 7.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
                    Source: 28.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
                    Source: 13.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
                    Source: 28.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding registry key / value combination manipulating RDP / Terminal Services Author: ditekSHen
                    Source: 13.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding registry key / value combination manipulating RDP / Terminal Services Author: ditekSHen
                    Source: 7.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding registry key / value combination manipulating RDP / Terminal Services Author: ditekSHen
                    Source: 0000001C.00000002.2925657952.0000000003E50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: gh0st Author: https://github.com/jackcr/
                    Source: 0000001C.00000003.2821969948.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: gh0st Author: https://github.com/jackcr/
                    Source: 0000001C.00000003.2719359677.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: gh0st Author: https://github.com/jackcr/
                    Source: C:\Program Files (x86)\Iefg\Nefghijkl.pic, type: DROPPEDMatched rule: Detects executables embedding registry key / value combination manipulating RDP / Terminal Services Author: ditekSHen
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10009F00 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,putchar,putchar,OpenSCManagerA,putchar,OpenServiceA,putchar,DeleteService,putchar,CloseServiceHandle,CloseServiceHandle,putchar,CloseServiceHandle,7_2_10009F00
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FC60 ExitWindowsEx,7_2_1000FC60
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_1000FC60 ExitWindowsEx,28_2_1000FC60
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100178007_2_10017800
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100184507_2_10018450
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100194907_2_10019490
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001609D7_2_1001609D
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100030E07_2_100030E0
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100141407_2_10014140
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100091607_2_10009160
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10017D807_2_10017D80
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10015E4E7_2_10015E4E
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100167207_2_10016720
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_1001780028_2_10017800
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_1001845028_2_10018450
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_1001949028_2_10019490
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_1001609D28_2_1001609D
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_100030E028_2_100030E0
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_1001414028_2_10014140
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_1000916028_2_10009160
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_10017D8028_2_10017D80
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_10015E4E28_2_10015E4E
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_1001672028_2_10016720
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 6572 -ip 6572
                    Source: 6q0LW5Szsb.dllBinary or memory string: OriginalFilenameFlash.ocx@ vs 6q0LW5Szsb.dll
                    Source: 6q0LW5Szsb.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                    Source: 6q0LW5Szsb.dll, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDP author = ditekSHen, description = Detects executables embedding registry key / value combination manipulating RDP / Terminal Services
                    Source: dump.pcap, type: PCAPMatched rule: gh0st author = https://github.com/jackcr/
                    Source: 7.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 28.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 13.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 28.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDP author = ditekSHen, description = Detects executables embedding registry key / value combination manipulating RDP / Terminal Services
                    Source: 13.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDP author = ditekSHen, description = Detects executables embedding registry key / value combination manipulating RDP / Terminal Services
                    Source: 7.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDP author = ditekSHen, description = Detects executables embedding registry key / value combination manipulating RDP / Terminal Services
                    Source: 0000001C.00000002.2925657952.0000000003E50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: gh0st author = https://github.com/jackcr/
                    Source: 0000001C.00000003.2821969948.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: gh0st author = https://github.com/jackcr/
                    Source: 0000001C.00000003.2719359677.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: gh0st author = https://github.com/jackcr/
                    Source: C:\Program Files (x86)\Iefg\Nefghijkl.pic, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDP author = ditekSHen, description = Detects executables embedding registry key / value combination manipulating RDP / Terminal Services
                    Source: classification engineClassification label: mal100.troj.evad.winDLL@43/20@0/1
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012880 LoadLibraryA,GetProcAddress,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,7_2_10012880
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_10012880 LoadLibraryA,GetProcAddress,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,28_2_10012880
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,UnlockServiceDatabase,7_2_100126F0
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,UnlockServiceDatabase,28_2_100126F0
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_1000A050 RegDeleteKeyA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,putchar,putchar,CreateToolhelp32Snapshot,putchar,putchar,Process32First,putchar,lstrcmpiA,putchar,Process32Next,putchar,FindCloseChangeNotification,putchar,28_2_1000A050
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100126F0 OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,UnlockServiceDatabase,7_2_100126F0
                    Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Program Files (x86)\Iefg\Nefghijkl.picJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:6996:64:WilError_03
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6572
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5568:120:WilError_03
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:2008:64:WilError_03
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:1620:64:WilError_03
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:1004:64:WilError_03
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5856
                    Source: C:\Windows\System32\svchost.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\2ae798a3-2a5a-4e62-9c8b-07c0138e985dJump to behavior
                    Source: 6q0LW5Szsb.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,CanUnloadNow
                    Source: 6q0LW5Szsb.dllReversingLabs: Detection: 97%
                    Source: 6q0LW5Szsb.dllVirustotal: Detection: 82%
                    Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll"
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",#1
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,CanUnloadNow
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",#1
                    Source: unknownProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe -k imgsvc
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,DarkAngle
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 6572 -ip 6572
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6572 -s 720
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,GetClassObject
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",CanUnloadNow
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",DarkAngle
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",GetClassObject
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",UnregisterServer
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",RegisterServer
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5856 -ip 5856
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5856 -s 724
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3228 -ip 3228
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1712 -ip 1712
                    Source: unknownProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe -k imgsvc
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",#1Jump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,CanUnloadNowJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,DarkAngleJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,GetClassObjectJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",CanUnloadNowJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",DarkAngleJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe -k imgsvcJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",UnregisterServerJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",RegisterServerJump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",#1Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 6572 -ip 6572Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6572 -s 720Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5856 -ip 5856Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5856 -s 724Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3228 -ip 3228Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1712 -ip 1712Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeSection loaded: msvcp60.dllJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeSection loaded: avicap32.dllJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeSection loaded: msvfw32.dllJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msvcp60.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: avicap32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msvfw32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: 6q0LW5Szsb.dllStatic file information: File size 9277952 > 1048576
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012C40 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,rand,sprintf,RegOpenKeyExA,RegQueryValueExA,_stricmp,sprintf,RegCloseKey,RegSetValueExA,RegCloseKey,7_2_10012C40
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10019890 push eax; ret 7_2_100198BE
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_10019890 push eax; ret 28_2_100198BE
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_1001C32C push eax; ret 28_2_1001C339
                    Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Program Files (x86)\Iefg\Nefghijkl.picJump to dropped file
                    Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Program Files (x86)\Iefg\Nefghijkl.picJump to dropped file
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012840 OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,7_2_10012840
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10007CB0 OpenEventLogA,ClearEventLogA,OpenEventLogA,ClearEventLogA,CloseEventLog,7_2_10007CB0
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10013930 LoadLibraryA,GetProcAddress,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,putchar,putchar,putchar,_stricmp,srand,DeleteFileA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,SetFileAttributesA,CopyFileA,7_2_10013930
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\SysWOW64\svchost.exeStalling execution: Execution stalls by calling Sleepgraph_28-5697
                    Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 482Jump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_7-5728
                    Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Program Files (x86)\Iefg\Nefghijkl.picJump to dropped file
                    Source: C:\Windows\SysWOW64\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_28-5915
                    Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 6.0 %
                    Source: C:\Windows\SysWOW64\svchost.exe TID: 4632Thread sleep count: 482 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\svchost.exe TID: 4632Thread sleep time: -48200s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_10011CB0 LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,RegCreateKeyExA,RegQueryValueExA,RegCloseKey,getsockname,GetSystemInfo,GlobalMemoryStatus,28_2_10011CB0
                    Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                    Source: Amcache.hve.10.drBinary or memory string: VMware
                    Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: svchost.exe, 0000001C.00000002.2925161438.0000000003212000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: Amcache.hve.10.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.10.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.10.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100124A0 DarkAngle,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadIconA,LoadCursorA,GetStockObject,RegisterClassA,LoadMenuA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,CreateWindowExA,strncpy,wcstombs,RegisterServiceCtrlHandlerA,7_2_100124A0
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D6E0 LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,putchar,putchar,putchar,SendMessageA,SendMessageA,putchar,BlockInput,putchar,putchar,BlockInput,putchar,7_2_1000D6E0
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10012C40 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,rand,sprintf,RegOpenKeyExA,RegQueryValueExA,_stricmp,sprintf,RegCloseKey,RegSetValueExA,RegCloseKey,7_2_10012C40

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 115.230.124.27 9026Jump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D880 putchar,mouse_event,SetCursorPos,WindowFromPoint,SetCapture,MapVirtualKeyA,keybd_event,MapVirtualKeyA,keybd_event,mouse_event,mouse_event,7_2_1000D880
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D880 putchar,mouse_event,SetCursorPos,WindowFromPoint,SetCapture,MapVirtualKeyA,keybd_event,MapVirtualKeyA,keybd_event,mouse_event,mouse_event,7_2_1000D880
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",#1Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 6572 -ip 6572Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6572 -s 720Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5856 -ip 5856Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5856 -s 724Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3228 -ip 3228Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1712 -ip 1712Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000B310 GetProcAddress,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,InitializeSecurityDescriptor,AllocateAndInitializeSid,GetLengthSid,InitializeAcl,AddAccessAllowedAce,SetSecurityDescriptorDacl,7_2_1000B310
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000B310 GetProcAddress,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,InitializeSecurityDescriptor,AllocateAndInitializeSid,GetLengthSid,InitializeAcl,AddAccessAllowedAce,SetSecurityDescriptorDacl,7_2_1000B310
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100044F0 GetProcAddress,LookupAccountNameA,IsValidSid,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,7_2_100044F0
                    Source: rundll32.exe, rundll32.exe, 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2000337667.000000001001E000.00000004.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmp, Nefghijkl.pic.3.drBinary or memory string: kxetray.exe
                    Source: rundll32.exe, rundll32.exe, 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2000337667.000000001001E000.00000004.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmp, Nefghijkl.pic.3.drBinary or memory string: KSafeTray.exe
                    Source: rundll32.exe, rundll32.exe, 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2000337667.000000001001E000.00000004.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmp, Nefghijkl.pic.3.drBinary or memory string: avp.exe
                    Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: rundll32.exe, rundll32.exe, 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2000337667.000000001001E000.00000004.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmp, Nefghijkl.pic.3.drBinary or memory string: 360tray.exe
                    Source: rundll32.exe, rundll32.exe, 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2000337667.000000001001E000.00000004.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmp, Nefghijkl.pic.3.drBinary or memory string: avgnt.exe
                    Source: rundll32.exe, rundll32.exe, 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2000337667.000000001001E000.00000004.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmp, Nefghijkl.pic.3.drBinary or memory string: RavMonD.exe
                    Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 6q0LW5Szsb.dll, type: SAMPLE
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 7.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000001C.00000002.2925657952.0000000003E50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000003.2821969948.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000003.2719359677.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: C:\Program Files (x86)\Iefg\Nefghijkl.pic, type: DROPPED

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 6q0LW5Szsb.dll, type: SAMPLE
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 7.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 28.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000001C.00000002.2925657952.0000000003E50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000003.2821969948.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000003.2719359677.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: C:\Program Files (x86)\Iefg\Nefghijkl.pic, type: DROPPED
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10008740 socket,bind,getsockname,inet_addr,7_2_10008740
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10008B80 WSAStartup,socket,htons,bind,listen,GetProcAddress,LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,accept,malloc,7_2_10008B80
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_10008740 socket,bind,getsockname,inet_addr,28_2_10008740
                    Source: C:\Windows\SysWOW64\svchost.exeCode function: 28_2_10008B80 WSAStartup,socket,htons,bind,listen,GetProcAddress,LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,accept,malloc,28_2_10008B80
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    OS Credential Dumping1
                    Account Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts12
                    Service Execution
                    12
                    Windows Service
                    1
                    Access Token Manipulation
                    1
                    Obfuscated Files or Information
                    LSASS Memory2
                    System Information Discovery
                    Remote Desktop Protocol3
                    Clipboard Data
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)12
                    Windows Service
                    1
                    DLL Side-Loading
                    Security Account Manager21
                    Security Software Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook111
                    Process Injection
                    11
                    Masquerading
                    NTDS21
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput Capture1
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
                    Virtualization/Sandbox Evasion
                    LSA Secrets2
                    Process Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Access Token Manipulation
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
                    Process Injection
                    DCSync1
                    System Owner/User Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    Rundll32
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Indicator Removal
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1502150 Sample: 6q0LW5Szsb.dll Startdate: 31/08/2024 Architecture: WINDOWS Score: 100 46 Suricata IDS alerts for network traffic 2->46 48 Found malware configuration 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 8 other signatures 2->52 7 loaddll32.exe 4 2->7         started        9 svchost.exe 2->9         started        13 svchost.exe 2->13         started        15 svchost.exe 6 26 2->15         started        process3 dnsIp4 17 rundll32.exe 3 5 7->17         started        20 rundll32.exe 3 7->20         started        22 rundll32.exe 3 7->22         started        32 7 other processes 7->32 44 115.230.124.27, 49730, 49737, 62537 CT-HANGZHOU-IDCNo288Fu-chunRoadCN China 9->44 54 System process connects to network (likely due to code injection or exploit) 9->54 56 Found stalling execution ending in API Sleep call 13->56 24 WerFault.exe 2 15->24         started        26 WerFault.exe 2 15->26         started        28 WerFault.exe 2 15->28         started        30 WerFault.exe 2 15->30         started        signatures5 process6 file7 40 C:\Program Files (x86)\Iefg40efghijkl.pic, PE32 17->40 dropped 42 C:\...42efghijkl.pic:Zone.Identifier, ASCII 17->42 dropped 34 WerFault.exe 22 16 20->34         started        36 WerFault.exe 16 22->36         started        38 rundll32.exe 2 5 32->38         started        process8

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    6q0LW5Szsb.dll97%ReversingLabsWin32.Backdoor.Farfli
                    6q0LW5Szsb.dll82%VirustotalBrowse
                    6q0LW5Szsb.dll100%AviraBDS/Farfli.kj.2
                    6q0LW5Szsb.dll100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Program Files (x86)\Iefg\Nefghijkl.pic100%AviraBDS/Farfli.kj.2
                    C:\Program Files (x86)\Iefg\Nefghijkl.pic100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    115.230.124.270%Avira URL Cloudsafe
                    http://www.baidu.com/ip.txtB#Dark0%Avira URL Cloudsafe
                    http://www.baidu.com/ip.txt0%Avira URL Cloudsafe
                    http://www.baidu.com/ip.txt2%VirustotalBrowse
                    http://www.baidu.com/ip.txtB#Dark0%VirustotalBrowse
                    115.230.124.272%VirustotalBrowse
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    115.230.124.27true
                    • 2%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://upx.sf.netAmcache.hve.10.drfalse
                    • URL Reputation: safe
                    unknown
                    http://www.baidu.com/ip.txtB#Darksvchost.exe, 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.baidu.com/ip.txtsvchost.exe, svchost.exe, 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpfalse
                    • 2%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    115.230.124.27
                    unknownChina
                    58461CT-HANGZHOU-IDCNo288Fu-chunRoadCNtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1502150
                    Start date and time:2024-08-31 08:31:06 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 2s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:29
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:6q0LW5Szsb.dll
                    renamed because original name is a hash value
                    Original Sample Name:0728C17205BDE428AF3D9933EB367B88.dll
                    Detection:MAL
                    Classification:mal100.troj.evad.winDLL@43/20@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 41
                    • Number of non-executed functions: 342
                    Cookbook Comments:
                    • Found application associated with file extension: .dll
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 20.189.173.21, 52.168.117.173, 20.42.65.92
                    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    TimeTypeDescription
                    02:32:05API Interceptor1x Sleep call for process: loaddll32.exe modified
                    02:32:29API Interceptor2x Sleep call for process: WerFault.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    115.230.124.27yZELpbwSoL.dllGet hashmaliciousGhostRatBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CT-HANGZHOU-IDCNo288Fu-chunRoadCNyZELpbwSoL.dllGet hashmaliciousGhostRatBrowse
                      • 115.230.124.27
                      bkofkll.exeGet hashmaliciousGhostRat, MimikatzBrowse
                      • 123.99.198.201
                      sora.spc.elfGet hashmaliciousMiraiBrowse
                      • 125.124.181.194
                      https://rtgrents.helplook.com/docs/RTGRENTS?preview=1Get hashmaliciousUnknownBrowse
                      • 122.225.212.209
                      https://rtgrents.helplook.com/docs/RTGRENTS?preview=1Get hashmaliciousHTMLPhisherBrowse
                      • 122.225.212.209
                      https://57365oo.cc/Get hashmaliciousPhisherBrowse
                      • 122.225.212.209
                      sora.sh4.elfGet hashmaliciousUnknownBrowse
                      • 115.220.65.222
                      xWTju4vS5WGet hashmaliciousMiraiBrowse
                      • 183.131.5.73
                      FJRGHua6cx.exeGet hashmaliciousUnknownBrowse
                      • 124.248.65.242
                      SecuriteInfo.com.Linux.Siggen.9999.5890.3625.elfGet hashmaliciousMiraiBrowse
                      • 125.124.133.231
                      No context
                      No context
                      Process:C:\Windows\SysWOW64\rundll32.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):16384
                      Entropy (8bit):3.12931539265142
                      Encrypted:false
                      SSDEEP:96:aUDtnBfntQIruSU3z++G4jXKIK7nKHKVKn5K6NKZK7fQKVKn5K6NKZKDB7KlKKKo:aUDLFlrY3zxU++bjVecaXb
                      MD5:4DF397A8BC405ADB4DC1BD5514160DD6
                      SHA1:6D85E8227DE7C795A60B78C8C007036A55718022
                      SHA-256:38FC241B43F8ED6FF7F49428893B9C254C6C7DA0D395A16FB78E4CB771A26342
                      SHA-512:B110EAF85869914FD2106F2A7DEFC5DB301F5E291F3B7824B16ED32992243314FB3F20614820F39D374641CD41F01376D12CE22D8C94F712FE38473DD30068BC
                      Malicious:false
                      Preview:regf........c\o.o................... ....0........................................................................T..b...,........T..b...,............T..b...,......rmtm...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\rundll32.exe
                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                      Category:modified
                      Size (bytes):15366656
                      Entropy (8bit):7.982893184217124
                      Encrypted:false
                      SSDEEP:24576:awBxInMvAeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeH:pY
                      MD5:E1A622FCFF75ED2222E3FCB91DE0EBF4
                      SHA1:B473CBCCD5253A41C5E5F560B946D4A9101C4D1A
                      SHA-256:9DF0D8877F242B1333FC6616EED4245288015300D0F97DF8A12C42C3785BC389
                      SHA-512:2AF015D4F7C20ED740D9F1C5F7BF33EE9B39AEF6889F0D57BAB0F4B50BB97138BE7F4A80ACD8F339DB5E8BD29E9AAA7C0D261FD08C2CC55858F59A1B343EA702
                      Malicious:true
                      Yara Hits:
                      • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: C:\Program Files (x86)\Iefg\Nefghijkl.pic, Author: Joe Security
                      • Rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDP, Description: Detects executables embedding registry key / value combination manipulating RDP / Terminal Services, Source: C:\Program Files (x86)\Iefg\Nefghijkl.pic, Author: ditekSHen
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Rep.Rep.Rep.)y|.Vep.=z{.Sep..y~.Qep.=zz.Vep.=zt.Vep..zz.^ep.Req..ep..j-.]ep..z{.Jep..cv.Sep..zt.Sep.RichRep.................PE..L....J.N...........!.........................................................P......................................`................ .......................0.......................................................................................text............................... ..`.rdata...+.......,..................@..@.data....:..........................@....rsrc........ ......................@..@.reloc.. ....0......................@..B........................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\rundll32.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Preview:[ZoneTransfer]....ZoneId=0
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.9061045976973231
                      Encrypted:false
                      SSDEEP:192:LLpi3Oc90BU/wjeTKkQzuiFFZ24IO8dci:piec+BU/wjeozuiFFY4IO8dci
                      MD5:3AC753B1A823D96DE5A5B57848D4604B
                      SHA1:D73B3BAE4F3C4B87E8E7C06DB4ECBC7A63B0CFF6
                      SHA-256:BA61396806DF8BA907B769ACE61ADBB8574093C33D6EF25B05E12A31DF47FEF0
                      SHA-512:4F9B53056E04A0FC47A8E40BC2B91ACC34973DC94469714071E36D2F9B9C3C5E8853921A230CE93B939F41C204E4E60FA3277E4C12D3B4851AE9C01A06801FCF
                      Malicious:false
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.5.5.9.5.2.6.3.0.1.6.2.4.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.5.5.9.5.2.6.7.0.7.8.7.7.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.a.c.0.5.9.6.8.-.a.9.d.1.-.4.7.4.9.-.8.2.9.7.-.c.b.6.5.1.d.e.4.8.5.6.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.f.f.9.f.f.a.c.-.a.f.3.f.-.4.7.3.2.-.a.d.9.a.-.c.6.b.9.7.0.b.c.a.4.4.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.e.0.-.0.0.0.1.-.0.0.1.4.-.d.5.f.2.-.5.7.7.f.6.f.f.b.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.9060330173383339
                      Encrypted:false
                      SSDEEP:192:EuihOe90BU/wjeTKkQzuiFFZ24IO8dci:Ri4e+BU/wjeozuiFFY4IO8dci
                      MD5:7DD308BF97378354F727CDC294C7FBAB
                      SHA1:13982E7657F80CE70379CA95A32FA8D1BF28D8F0
                      SHA-256:B78C564BE9930294ADF0B35BDBCF1E5C03B418C8FFE6D02524E2E6C7C6823D1F
                      SHA-512:C5C567A3B9DF3171065840F50CEBD1FEDFCC439AD26B9C7B89EA8B53542B54EB6BDF50E5F68396199164AC86BEBEEB5767E4E15C9934918E5CA7D362D61AE8D0
                      Malicious:false
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.9.5.5.9.5.2.0.0.6.5.4.5.3.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.9.5.5.9.5.2.0.4.7.1.7.0.6.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.6.1.d.6.f.7.6.-.a.a.3.b.-.4.1.3.0.-.b.b.c.c.-.e.f.0.2.a.7.e.6.5.1.9.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.a.2.a.a.8.c.9.-.f.6.3.9.-.4.8.1.4.-.8.2.a.2.-.f.1.9.f.f.d.5.e.e.e.b.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.a.c.-.0.0.0.1.-.0.0.1.4.-.5.3.9.1.-.b.a.7.b.6.f.f.b.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):79266
                      Entropy (8bit):3.0988078399124723
                      Encrypted:false
                      SSDEEP:768:sDOID3+gZSsv6UHSZIyIdgpQWGQQ+EjE/QdTTdk6VlI:sNugZSTUaQgOWGQzEjE/eTTdk6VlI
                      MD5:EFEE57153CD78D2D3AD19567638F8093
                      SHA1:9EA0BDB9E8FFBE6DD4902426B36C72598726396B
                      SHA-256:E764C8EF26825276D3EE49A2A7BFA00D27B1BD127C02D9D958B5E6B97F746456
                      SHA-512:5F065FB48C010802B0B07615B9960BC7BFB7C04BAC114B6951D85B82E12CB564441D23712B26CA250F2C38ECAE5B0F4DECEF47494F02E68D3A258F8374137B00
                      Malicious:false
                      Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):13340
                      Entropy (8bit):2.686085685414526
                      Encrypted:false
                      SSDEEP:96:TiZYWKabFicgKl1oY7YyHWePHSiQYEZlJ7tHimzIKlFwNQm6raJl9MVFEID63:2ZDKvckcNpqJXnaJl9MVFzD63
                      MD5:46C702A31D6AFF12F2CE3EBE8D0B5452
                      SHA1:EC66A2B4832578936490B8217089176176D081BF
                      SHA-256:7C7FA4E448674E443CCF346E29E033E6FA01F0883C01DD35333525D8612D1419
                      SHA-512:9AA19321F5E1A0EC32C85F5CB17B1052BCFDF53B8BB82F3782E0F5B124FFE9AF2A7BE6CDCD35D150C9CF6AFA5227781F268EBEFF6AA7DB2A81ABABDDCF4A1659
                      Malicious:false
                      Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):79292
                      Entropy (8bit):3.0989769950875456
                      Encrypted:false
                      SSDEEP:1536:HcKriw+Z0TAUbQSDZVGBFM0X7nBTTdk6V6:HcKriw+Z0TAUbQSDZVGBFM0X7nFTdk60
                      MD5:FDBF601363E9849D2FFAFFE54B0D024A
                      SHA1:3B59D8F3C58ABEDEDD895B5F9755539D87269E29
                      SHA-256:266D021C78B3B8C89BBD5F0084F16788196B866DA4DACE94B8093922584FD44C
                      SHA-512:13698528E3AC4212D5A474B0F2FBFD6FBE76035B7C9F4D21A04E4B65DE304D0D0A4A7B8C5E746F158C5089F74A800310CD456509600AB81D0A80091DEB3C274B
                      Malicious:false
                      Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):13340
                      Entropy (8bit):2.6856573196626523
                      Encrypted:false
                      SSDEEP:96:TiZYWzvM7We9YtOY+WyHSXYEZ/SwtHimIUlZwMDkZaxlDM0F5Im63:2ZDz3CiOQSkwaxlDM0Fmm63
                      MD5:C19383BB5B6FC60BB6A02A5BC1EA31E9
                      SHA1:EE617B45C96B4AB7AE4589C5C52774FCD7FC083E
                      SHA-256:19A69EA7D8FDE9AA4B1B9ACE346A68A5095D2BF9285E606D05DAC2562849C8ED
                      SHA-512:1A4113254835CCF8C7F81CD6C72309E35C0EF9E4D62827F6AEEABAA10B602F5DD14F8D44E9AD509E6AF6FC296226D643D794FBC7FB3D1345068D1997979500A1
                      Malicious:false
                      Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Sat Aug 31 06:32:00 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):44674
                      Entropy (8bit):2.0073961573164962
                      Encrypted:false
                      SSDEEP:192:+EIwU4gSEZyO5H4LCkDF7x9WQIzoRFWv3I:1TUIEz5H6Cuxx9WQIzoe
                      MD5:D3D87A662A76ABFD34F54512C10FC360
                      SHA1:36AECDD464203243BCF7BF1D867828B76369969A
                      SHA-256:1F6771EB9FEBD6469627CD3984388B95E213F4DDAC132FD11D58A6E390BBB32C
                      SHA-512:4B263251DF73A7649261855BEF63E2A500498D2265E4FED647EA22D78FC776D48B8D5570C23BDE99F1BD5297A9A98EC974BF71E158907796143318CCDA82553E
                      Malicious:false
                      Preview:MDMP..a..... .........f.........................................+..........T.......8...........T...........................X...........D...............................................................................eJ..............GenuineIntel............T.............f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8266
                      Entropy (8bit):3.6910885328366456
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJTN6IKw6Yct6GgmfTrcprT89brysflZm:R6lXJ56IKw6Y26GgmfTr9rxfy
                      MD5:54FCBD72B30DAA39CFD31FEBE19A9BC2
                      SHA1:C30BF1E4DB59AFF4995B4F2BB722E03A4C07E6D0
                      SHA-256:2DFC183378CF17746F1E36A5C1DEBE8BF2482C9C52E2BACFC8248931AFF44C63
                      SHA-512:EA363AE08A6AD6B335F7FA9E3D6322C4CE62590A2BECD9AA6866CBEC581B2003ACCB14967A6F35C0FE3EC575748E1A70D4DA78C88606A3E85CC9F4A95362EB69
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.7.2.<./.P.i.
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):82904
                      Entropy (8bit):3.095290380930575
                      Encrypted:false
                      SSDEEP:768:ntqsFvSaQICTQaDYIAkEh8r0X1d/iTdBQvzZKe72QnYb3HCVgg:ntqiyTQaDhQ8yXgd2vz0e7PYbXCVgg
                      MD5:44F033BC8BD8B5B9BE65CE8EC6A6C484
                      SHA1:47C48105C48E4F3111E4717AE69EDF45EDB44E6E
                      SHA-256:0644FCB0DEE84391E7D8DE2B90166F168DF85453C1D6E5D102623F9D77657A59
                      SHA-512:706B2364B31B0341E9E28EBBC3BEA9F3DD6332FF204EA1BC450153D5D527C25D6DFEBFA78B37C1D596A3E337F9887254B77509D1CADEF4B986D4649A98E285D1
                      Malicious:false
                      Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4654
                      Entropy (8bit):4.460332275322351
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsV6Jg77aI9Q7WpW8VYkSYm8M4JCdPqFV+q8/A+WGScStd:uIjfVII7CK7VFbJ9xJ3td
                      MD5:BA25393DBE866B612C9D036981681BDA
                      SHA1:692518F6A968629322917CA3BE2AF210C208351A
                      SHA-256:410330BEEE29227D1563E5E92054605F25A75AA9ADF31D90750866682755100A
                      SHA-512:CC60BBE3E13EE1306BB9B2E8C44841F929009AD2BE42AB3856BB75016698A8BA3C57EAD79599D64BC2289EA1CB6A14AA57B0E31A2CA639FBB1998F19F9E825FB
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="479374" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):13340
                      Entropy (8bit):2.6857920331064995
                      Encrypted:false
                      SSDEEP:96:TiZYWv+MbVskd2YpYHNWUHpmYEZZMtEi14glowF2IEiAaHlJMGFUIm63:2ZDv+K2OY7CsnMaHlJMGFDm63
                      MD5:9A8036D6482E71B88B784C375BBF4996
                      SHA1:71FA38DE1BB4BC8F5CE3306F5C5DC6A5C28FCCE7
                      SHA-256:A3ED0C0ACE50F4FBD16246B630542567BA552E5E7C1453CEA54FF7A55318A2DE
                      SHA-512:A5A1E935544386D9E3BA45C457EBEE98E740E7974BFCDDC053038472B688FD8739AC843DB51642BA845BBB7A58E658488F00AA59D389E0B6D8BFC9868292E815
                      Malicious:false
                      Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Sat Aug 31 06:32:06 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):43902
                      Entropy (8bit):2.0469730234586154
                      Encrypted:false
                      SSDEEP:192:8sRwUygSE1qHoO5H4LCIJkwbtTetZ9C9wLTgAYYlDJ:byUWE1+v5H6CytCtZ9C9UUaJ
                      MD5:E4741C276A224BF90DD9347764271FB2
                      SHA1:1A88D7CFC916487FFDD27D96A489BF954F034AA4
                      SHA-256:9AA5215E0486CDDA42096D1A54A076A36067FB3CDD06F7D452680325C328190A
                      SHA-512:8CEFF0F8DF2C47E323E7B112A19705A193A52032003594E96EC0895422E5BF2C5304B8216C1085396F39A246285AA9D0BE43A01842C0D61F4827DCDE6A037B43
                      Malicious:false
                      Preview:MDMP..a..... .........f.........................................+..........T.......8...........T...........................X...........D...............................................................................eJ..............GenuineIntel............T.............f.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8264
                      Entropy (8bit):3.693116197302792
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJzD6I3W6Yci6r2gmfTrcprO89bdWsf1v/m:R6lXJX6I3W6Yp6r2gmfTr+d1f4
                      MD5:8C36D903C6BE1AA438164A5CC01ADD7B
                      SHA1:190D72301D3FF2FF561C7E30CC264F0222DD2D14
                      SHA-256:2417475FC78069BB36EFD0E9717ECB2FDE3F2A86EAD22ADF7048953E188AEBBF
                      SHA-512:F5EAB4ABC9D6E9EF71A4AC6F215AA40920F8E4D396496DDF0B94D9BEA92143C5737A87161CC0C9C629131F96B02A31BEDBDBEDFD9E06EF167465DB60BB29168D
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.8.5.6.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4654
                      Entropy (8bit):4.461398494496469
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsV6Jg77aI9Q7WpW8VYkdYm8M4JCdPqFs+q8/A4kGScSnd:uIjfVII7CK7VF8JkwkJ3nd
                      MD5:551A067B1F61BB8F95D29A1E701E5C02
                      SHA1:326AFB4054F4DE232AB685BD976347AF65528F21
                      SHA-256:18149EB636925E66CE803BBECAC8D08D045CEA58ED717D66F1B88F7ECEF9A2B9
                      SHA-512:EE4D4AD375A68BC5B3DE24E99B856DDDD34F8157E3E7D95B6F1A3942C54AA416F32BAB2BCF58F125ACD5A616FBC6507D369C445B128FF7F740A94E8DCCE106B1
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="479374" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):82916
                      Entropy (8bit):3.095364091504676
                      Encrypted:false
                      SSDEEP:768:rNokveWLEbUIfqdQ4AkEA870K1dtiTdBa48vKZc47UQnYb3HCL5q:rN5pLKUIfqbh8PXqdBaJvKy47RYbXCtq
                      MD5:E0B471E17F466EA56DA46401D5DDDD24
                      SHA1:ED28784D939DF1687F250A6B833BD3AFA4E9DA45
                      SHA-256:80DEE2F5815A4F7720653378F93436ECA25072CF553A519A3DBEDCF6AFC41922
                      SHA-512:4F999752B57118F98DF0D81E19EB5784C47E1312DAE6ACDEC1C72F7E24A740F6BE0DB35DB0D4D1B475C7C94B2CD2477A6CC4ABFF16799E37D954456DEBAFE89D
                      Malicious:false
                      Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):13340
                      Entropy (8bit):2.6856132870318707
                      Encrypted:false
                      SSDEEP:96:TiZYWaTgT3GYHY3rWbHDYEZqt0tEiIq4ClQvw/tMc3ahlHMMF7IF63:2ZD9Ggq+FahlHMMF0F63
                      MD5:746DD7909CBA1E1E34EE21C7F68FBC4E
                      SHA1:C937431EC1221352039D91E8BF50C2F551FBF348
                      SHA-256:9059075CFA815F0A8ACE182924A46252FD106E22FE54A87A93C67DF3431E7F79
                      SHA-512:23F7677E847DAA514D1EFD30A3ABC5B7C36B47D0A5074C2142A4546E93ECDDD2E57628188C0A9D8B37EB23AA9E8937352BDF30EF3FAF0B0BD9F58CF212F25008
                      Malicious:false
                      Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.469661465775917
                      Encrypted:false
                      SSDEEP:6144:AIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uNOdwBCswSbn:FXD94zWlLZMM6YFHM+n
                      MD5:F3C3F74D20B2C94EC4DF66D9F00E3A6F
                      SHA1:EF0DE8C04C9F6447D5997CBD914AC87DF8DC027A
                      SHA-256:0DD11AC05DF3204E18BF391997B4512BABD31B7BC3DB877426486B58CEDB19B8
                      SHA-512:59B197A772AB0A589D6BE65E55C2C30EDBF95A43E41A09E759DEF632F4460ED406D4D44F770B7AF8F6204FE17A03AA5F6C1FCD6E9F6158974F5D80AE9D386111
                      Malicious:false
                      Preview:regf8...8....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmV..{o................................................................................................................................................................................................................................................................................................................................................P.O........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                      Entropy (8bit):7.974436863909568
                      TrID:
                      • Win32 Dynamic Link Library (generic) (1002004/3) 98.32%
                      • Windows Screen Saver (13104/52) 1.29%
                      • Generic Win/DOS Executable (2004/3) 0.20%
                      • DOS Executable Generic (2002/1) 0.20%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:6q0LW5Szsb.dll
                      File size:9'277'952 bytes
                      MD5:0728c17205bde428af3d9933eb367b88
                      SHA1:c0b7bc01abb8352c3f4227c2af5a2510195058eb
                      SHA256:c24387cd9dd49c18e111bb6ef9d28e247b8bcca0dc9c54e550f2d596e9a82cb5
                      SHA512:dfc7fe789ee3f404a878b6be42f36ae2ead35f6eafa9e5d848002a6e964572b4307daaeea5ca86abb35eb4416119753ba273dd8a52ed49cb1063af69c30ca509
                      SSDEEP:24576:awBxInMvAeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee/:pw
                      TLSH:5896CF8AEFCA403A5C888A5E6D955E7D30E04C33EDD7564F83BAC192E53893ED2C9C15
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Rep.Rep.Rep.)y|.Vep.=z{.Sep..y~.Qep.=zz.Vep.=zt.Vep..zz.^ep.Req..ep..j-.]ep..z{.Jep..cv.Sep..zt.Sep.RichRep................
                      Icon Hash:7ae282899bbab082
                      Entrypoint:0x100199ba
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x10000000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                      DLL Characteristics:
                      Time Stamp:0x4ED44AC8 [Tue Nov 29 03:00:24 2011 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:03d93b4f8804305bc99ec1a9ad570642
                      Instruction
                      push ebp
                      mov ebp, esp
                      push ebx
                      mov ebx, dword ptr [ebp+08h]
                      push esi
                      mov esi, dword ptr [ebp+0Ch]
                      push edi
                      mov edi, dword ptr [ebp+10h]
                      test esi, esi
                      jne 00007F3EACC8FB5Bh
                      cmp dword ptr [10021A98h], 00000000h
                      jmp 00007F3EACC8FB78h
                      cmp esi, 01h
                      je 00007F3EACC8FB57h
                      cmp esi, 02h
                      jne 00007F3EACC8FB74h
                      mov eax, dword ptr [10021AA8h]
                      test eax, eax
                      je 00007F3EACC8FB5Bh
                      push edi
                      push esi
                      push ebx
                      call eax
                      test eax, eax
                      je 00007F3EACC8FB5Eh
                      push edi
                      push esi
                      push ebx
                      call 00007F3EACC8FA6Ah
                      test eax, eax
                      jne 00007F3EACC8FB56h
                      xor eax, eax
                      jmp 00007F3EACC8FBA0h
                      push edi
                      push esi
                      push ebx
                      call 00007F3EACC89A7Bh
                      cmp esi, 01h
                      mov dword ptr [ebp+0Ch], eax
                      jne 00007F3EACC8FB5Eh
                      test eax, eax
                      jne 00007F3EACC8FB89h
                      push edi
                      push eax
                      push ebx
                      call 00007F3EACC8FA46h
                      test esi, esi
                      je 00007F3EACC8FB57h
                      cmp esi, 03h
                      jne 00007F3EACC8FB78h
                      push edi
                      push esi
                      push ebx
                      call 00007F3EACC8FA35h
                      test eax, eax
                      jne 00007F3EACC8FB55h
                      and dword ptr [ebp+0Ch], eax
                      cmp dword ptr [ebp+0Ch], 00000000h
                      je 00007F3EACC8FB63h
                      mov eax, dword ptr [10021AA8h]
                      test eax, eax
                      je 00007F3EACC8FB5Ah
                      push edi
                      push esi
                      push ebx
                      call eax
                      mov dword ptr [ebp+0Ch], eax
                      mov eax, dword ptr [ebp+0Ch]
                      pop edi
                      pop esi
                      pop ebx
                      pop ebp
                      retn 000Ch
                      int3
                      jmp dword ptr [1001B11Ch]
                      jmp dword ptr [1001B118h]
                      jmp dword ptr [1001B114h]
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      jmp dword ptr [1001B26Ch]
                      jmp dword ptr [1001B2B0h]
                      jmp dword ptr [1001B2B4h]
                      Programming Language:
                      • [ C ] VS98 (6.0) build 8168
                      • [C++] VS98 (6.0) build 8168
                      • [EXP] VC++ 6.0 SP5 build 8804
                      • [LNK] VS98 (6.0) imp/exp build 8168
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x1da600xa9.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x1caf80xc8.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x7a8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x230000x181c.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x1b0000x2bc.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x190b00x19200f3c6b8b7e6ea17f2219b2a929986d8c3False0.4990865982587065data6.5919885591410905IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x1b0000x2b090x2c00f5dae12ff1c3ec04ec8d2b43f68f417aFalse0.3515625data5.056505942594322IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x1e0000x3aac0x2e00692d0eba4c2e863cf8633fda024ae263False0.33203125data4.700923804804761IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x220000x7a80x800e8e44ccdf6f04d981af78adce055ce0fFalse0.43115234375data4.099246128377401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x230000x1c200x1e009bfe4feca1ac74e0cb4034cf464bbbb8False0.6720052083333333data6.039125545458622IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_VERSION0x222b80x4ecdataChineseChina0.42142857142857143
                      RT_MANIFEST0x220a00x215XML 1.0 document, ASCII text, with very long lines (533), with no line terminatorsChineseChina0.575984990619137
                      DLLImport
                      KERNEL32.dllSleep, LoadLibraryA, CloseHandle, GetProcAddress
                      USER32.dllDispatchMessageA, TranslateMessage, GetMessageA, wsprintfA, CharNextA, ExitWindowsEx, GetWindowTextA, MessageBoxA, LoadCursorA, BlockInput, SendMessageA, keybd_event, MapVirtualKeyA, SetCapture, WindowFromPoint, SetCursorPos, mouse_event, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, GetClipboardData, GetSystemMetrics, SetRect, GetDC, GetDesktopWindow, ReleaseDC, DestroyCursor, GetCursorInfo, GetCursorPos, GetWindowThreadProcessId, LoadIconA, RegisterClassA, LoadMenuA, CreateWindowExA, CloseWindow, IsWindow, PostMessageA, OpenDesktopA, GetThreadDesktop, GetUserObjectInformationA, OpenInputDesktop, SetThreadDesktop, CloseDesktop, IsWindowVisible
                      GDI32.dllGetStockObject
                      ADVAPI32.dllOpenProcessToken, RegCloseKey, RegQueryValueExA, RegOpenKeyExA, IsValidSid, LookupAccountNameA, LsaClose, LookupPrivilegeValueA, AdjustTokenPrivileges, StartServiceA, CreateServiceA, LockServiceDatabase, ChangeServiceConfig2A, UnlockServiceDatabase, RegisterServiceCtrlHandlerA, SetServiceStatus, RegOpenKeyA, LsaRetrievePrivateData, GetTokenInformation, LookupAccountSidA, RegSaveKeyA, RegRestoreKeyA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegQueryInfoKeyA, RegEnumKeyExA, InitializeSecurityDescriptor, AllocateAndInitializeSid, GetLengthSid, InitializeAcl, AddAccessAllowedAce, SetSecurityDescriptorDacl, FreeSid, OpenSCManagerA, OpenServiceA, DeleteService, CloseServiceHandle, OpenEventLogA, ClearEventLogA, CloseEventLog, RegCreateKeyExA, RegSetValueExA, LsaFreeMemory, LsaOpenPolicy
                      SHELL32.dllSHGetSpecialFolderPathA
                      MSVCRT.dll_strrev, _stricmp, malloc, _strnicmp, _adjust_fdiv, _initterm, ??1type_info@@UAE@XZ, calloc, srand, _access, wcstombs, _beginthreadex, _errno, strncmp, strrchr, atoi, _except_handler3, free, _strcmpi, strchr, strncpy, sprintf, rand, _CxxThrowException, strstr, _ftol, ceil, putchar, memmove, __CxxFrameHandler, puts, ??3@YAXPAX@Z, ??2@YAPAXI@Z
                      WS2_32.dllhtonl, inet_ntoa, ntohs, getsockname, bind, getpeername, accept, listen, recvfrom, __WSAFDIsSet, WSASocketA, sendto, connect, inet_addr, send, closesocket, select, recv, socket, htons, setsockopt, WSAStartup, WSACleanup, WSAIoctl, gethostbyname
                      MSVCP60.dll?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ, ?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB, ??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ, ?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z, ?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB, ?_Xran@std@@YAXXZ, ?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z, ?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z, ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z, ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
                      WTSAPI32.dllWTSFreeMemory, WTSQuerySessionInformationA
                      NameOrdinalAddress
                      CanUnloadNow10x10012480
                      DarkAngle20x100124a0
                      GetClassObject30x10012480
                      RegisterServer40x10012480
                      UnregisterServer50x10012480
                      Language of compilation systemCountry where language is spokenMap
                      ChineseChina
                      TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                      2024-08-31T08:32:45.072145+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625489026192.168.2.4115.230.124.27
                      2024-08-31T08:32:45.072145+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625489026192.168.2.4115.230.124.27
                      2024-08-31T08:32:45.072145+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625489026192.168.2.4115.230.124.27
                      2024-08-31T08:33:20.007832+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625569026192.168.2.4115.230.124.27
                      2024-08-31T08:33:20.007832+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625569026192.168.2.4115.230.124.27
                      2024-08-31T08:33:20.007832+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625569026192.168.2.4115.230.124.27
                      2024-08-31T08:32:08.828342+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1497379026192.168.2.4115.230.124.27
                      2024-08-31T08:32:08.828342+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1497379026192.168.2.4115.230.124.27
                      2024-08-31T08:32:08.828342+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021497379026192.168.2.4115.230.124.27
                      2024-08-31T08:32:19.104194+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625379026192.168.2.4115.230.124.27
                      2024-08-31T08:32:19.104194+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625379026192.168.2.4115.230.124.27
                      2024-08-31T08:32:19.104194+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625379026192.168.2.4115.230.124.27
                      2024-08-31T08:32:49.787185+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625499026192.168.2.4115.230.124.27
                      2024-08-31T08:32:49.787185+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625499026192.168.2.4115.230.124.27
                      2024-08-31T08:32:49.787185+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625499026192.168.2.4115.230.124.27
                      2024-08-31T08:32:29.411116+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625439026192.168.2.4115.230.124.27
                      2024-08-31T08:32:29.411116+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625439026192.168.2.4115.230.124.27
                      2024-08-31T08:32:29.411116+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625439026192.168.2.4115.230.124.27
                      2024-08-31T08:34:02.900555+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625629026192.168.2.4115.230.124.27
                      2024-08-31T08:34:02.900555+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625629026192.168.2.4115.230.124.27
                      2024-08-31T08:34:02.900555+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625629026192.168.2.4115.230.124.27
                      2024-08-31T08:33:42.235407+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625609026192.168.2.4115.230.124.27
                      2024-08-31T08:33:42.235407+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625609026192.168.2.4115.230.124.27
                      2024-08-31T08:33:42.235407+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625609026192.168.2.4115.230.124.27
                      2024-08-31T08:31:58.559842+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1497309026192.168.2.4115.230.124.27
                      2024-08-31T08:31:58.559842+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1497309026192.168.2.4115.230.124.27
                      2024-08-31T08:31:58.559842+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021497309026192.168.2.4115.230.124.27
                      2024-08-31T08:33:52.496650+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625619026192.168.2.4115.230.124.27
                      2024-08-31T08:33:52.496650+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625619026192.168.2.4115.230.124.27
                      2024-08-31T08:33:52.496650+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625619026192.168.2.4115.230.124.27
                      2024-08-31T08:33:09.738414+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625559026192.168.2.4115.230.124.27
                      2024-08-31T08:33:09.738414+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625559026192.168.2.4115.230.124.27
                      2024-08-31T08:33:09.738414+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625559026192.168.2.4115.230.124.27
                      2024-08-31T08:32:38.498327+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625479026192.168.2.4115.230.124.27
                      2024-08-31T08:32:38.498327+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625479026192.168.2.4115.230.124.27
                      2024-08-31T08:32:38.498327+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625479026192.168.2.4115.230.124.27
                      2024-08-31T08:33:31.967008+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625599026192.168.2.4115.230.124.27
                      2024-08-31T08:33:31.967008+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625599026192.168.2.4115.230.124.27
                      2024-08-31T08:33:31.967008+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625599026192.168.2.4115.230.124.27
                      2024-08-31T08:32:53.200037+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625519026192.168.2.4115.230.124.27
                      2024-08-31T08:32:53.200037+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625519026192.168.2.4115.230.124.27
                      2024-08-31T08:32:53.200037+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625519026192.168.2.4115.230.124.27
                      2024-08-31T08:32:59.464269+0200TCP2013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1625549026192.168.2.4115.230.124.27
                      2024-08-31T08:32:59.464269+0200TCP2016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1625549026192.168.2.4115.230.124.27
                      2024-08-31T08:32:59.464269+0200TCP2021716ET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 1021625549026192.168.2.4115.230.124.27
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 31, 2024 08:31:58.446017027 CEST497309026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:31:58.451004982 CEST902649730115.230.124.27192.168.2.4
                      Aug 31, 2024 08:31:58.451164961 CEST497309026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:31:58.559842110 CEST497309026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:31:58.564675093 CEST902649730115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:08.728307009 CEST497309026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:08.730112076 CEST497379026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:08.735259056 CEST902649737115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:08.735354900 CEST497379026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:08.828341961 CEST497379026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:08.833318949 CEST902649737115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:18.992126942 CEST497379026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:18.995527983 CEST625379026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:19.000343084 CEST902662537115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:19.000442028 CEST625379026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:19.104193926 CEST625379026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:19.109023094 CEST902662537115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:29.275684118 CEST625379026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:29.278136969 CEST625439026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:29.282993078 CEST902662543115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:29.283082962 CEST625439026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:29.411115885 CEST625439026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:29.416141033 CEST902662543115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:38.384582043 CEST625439026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:38.385621071 CEST625479026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:38.392349005 CEST902662547115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:38.392426968 CEST625479026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:38.498327017 CEST625479026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:38.503278971 CEST902662547115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:44.947073936 CEST625479026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:44.947798014 CEST625489026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:44.952723026 CEST902662548115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:44.952933073 CEST625489026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:45.072144985 CEST625489026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:45.077054024 CEST902662548115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:49.681328058 CEST625489026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:49.682040930 CEST625499026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:49.686867952 CEST902662549115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:49.686959028 CEST625499026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:49.787184954 CEST625499026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:49.791985035 CEST902662549115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:53.087587118 CEST625499026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:53.088541985 CEST625519026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:53.093374014 CEST902662551115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:53.093447924 CEST625519026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:53.200037003 CEST625519026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:53.205288887 CEST902662551115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:55.572134972 CEST625519026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:59.333962917 CEST625549026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:59.338913918 CEST902662554115.230.124.27192.168.2.4
                      Aug 31, 2024 08:32:59.340864897 CEST625549026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:59.464268923 CEST625549026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:32:59.469427109 CEST902662554115.230.124.27192.168.2.4
                      Aug 31, 2024 08:33:09.619055033 CEST625549026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:09.619885921 CEST625559026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:09.624703884 CEST902662555115.230.124.27192.168.2.4
                      Aug 31, 2024 08:33:09.624793053 CEST625559026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:09.738414049 CEST625559026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:09.744549036 CEST902662555115.230.124.27192.168.2.4
                      Aug 31, 2024 08:33:19.884638071 CEST625559026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:19.885271072 CEST625569026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:19.890074968 CEST902662556115.230.124.27192.168.2.4
                      Aug 31, 2024 08:33:19.890166998 CEST625569026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:20.007832050 CEST625569026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:20.012653112 CEST902662556115.230.124.27192.168.2.4
                      Aug 31, 2024 08:33:30.165817022 CEST625569026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:30.166377068 CEST625579026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:30.171231031 CEST902662557115.230.124.27192.168.2.4
                      Aug 31, 2024 08:33:30.171287060 CEST625579026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:31.813101053 CEST625599026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:31.817900896 CEST902662559115.230.124.27192.168.2.4
                      Aug 31, 2024 08:33:31.818111897 CEST625599026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:31.967008114 CEST625599026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:31.971771955 CEST902662559115.230.124.27192.168.2.4
                      Aug 31, 2024 08:33:42.119246960 CEST625599026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:42.120461941 CEST625609026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:42.125739098 CEST902662560115.230.124.27192.168.2.4
                      Aug 31, 2024 08:33:42.125808954 CEST625609026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:42.235407114 CEST625609026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:42.240287066 CEST902662560115.230.124.27192.168.2.4
                      Aug 31, 2024 08:33:52.384608984 CEST625609026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:52.385755062 CEST625619026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:52.390634060 CEST902662561115.230.124.27192.168.2.4
                      Aug 31, 2024 08:33:52.390710115 CEST625619026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:52.496649981 CEST625619026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:33:52.501449108 CEST902662561115.230.124.27192.168.2.4
                      Aug 31, 2024 08:34:02.650228024 CEST625619026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:34:02.651130915 CEST625629026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:34:02.655955076 CEST902662562115.230.124.27192.168.2.4
                      Aug 31, 2024 08:34:02.656023026 CEST625629026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:34:02.900554895 CEST625629026192.168.2.4115.230.124.27
                      Aug 31, 2024 08:34:02.905407906 CEST902662562115.230.124.27192.168.2.4
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 31, 2024 08:32:15.579358101 CEST53514271.1.1.1192.168.2.4

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:02:31:56
                      Start date:31/08/2024
                      Path:C:\Windows\System32\loaddll32.exe
                      Wow64 process (32bit):true
                      Commandline:loaddll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll"
                      Imagebase:0x960000
                      File size:126'464 bytes
                      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:1
                      Start time:02:31:56
                      Start date:31/08/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:02:31:56
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",#1
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:02:31:56
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,CanUnloadNow
                      Imagebase:0x6f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:02:31:56
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",#1
                      Imagebase:0x6f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:5
                      Start time:02:31:56
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\svchost.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\svchost.exe -k imgsvc
                      Imagebase:0xa50000
                      File size:46'504 bytes
                      MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:7
                      Start time:02:31:59
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,DarkAngle
                      Imagebase:0x6f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:8
                      Start time:02:31:59
                      Start date:31/08/2024
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                      Imagebase:0x7ff6eef20000
                      File size:55'320 bytes
                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:9
                      Start time:02:31:59
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 6572 -ip 6572
                      Imagebase:0x890000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:10
                      Start time:02:31:59
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6572 -s 720
                      Imagebase:0x890000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:11
                      Start time:02:32:02
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\6q0LW5Szsb.dll,GetClassObject
                      Imagebase:0x6f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:12
                      Start time:02:32:05
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",CanUnloadNow
                      Imagebase:0x6f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:13
                      Start time:02:32:05
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",DarkAngle
                      Imagebase:0x6f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:14
                      Start time:02:32:05
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",GetClassObject
                      Imagebase:0x6f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:15
                      Start time:02:32:05
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",UnregisterServer
                      Imagebase:0x6f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:16
                      Start time:02:32:05
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\6q0LW5Szsb.dll",RegisterServer
                      Imagebase:0x6f0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:17
                      Start time:02:32:05
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5856 -ip 5856
                      Imagebase:0x890000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:18
                      Start time:02:32:06
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5856 -s 724
                      Imagebase:0x890000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:22
                      Start time:02:32:54
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3228 -ip 3228
                      Imagebase:0x890000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:26
                      Start time:02:33:29
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1712 -ip 1712
                      Imagebase:0x890000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:28
                      Start time:02:33:30
                      Start date:31/08/2024
                      Path:C:\Windows\SysWOW64\svchost.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\svchost.exe -k imgsvc
                      Imagebase:0xa50000
                      File size:46'504 bytes
                      MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 0000001C.00000002.2925657952.0000000003E50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: gh0st, Description: unknown, Source: 0000001C.00000002.2925657952.0000000003E50000.00000004.00001000.00020000.00000000.sdmp, Author: https://github.com/jackcr/
                      • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 0000001C.00000003.2821969948.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: gh0st, Description: unknown, Source: 0000001C.00000003.2821969948.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, Author: https://github.com/jackcr/
                      • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 0000001C.00000003.2719359677.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: gh0st, Description: unknown, Source: 0000001C.00000003.2719359677.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, Author: https://github.com/jackcr/
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:3.7%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:18.4%
                        Total number of Nodes:304
                        Total number of Limit Nodes:5
                        execution_graph 5532 10010c90 5533 10010ca0 LoadLibraryA 5532->5533 5534 100124a0 15 API calls 5540 100123d0 SetServiceStatus 5534->5540 5536 100125eb 5541 100123d0 SetServiceStatus 5536->5541 5538 100125f6 5542 100120d0 5538->5542 5540->5536 5541->5538 5566 10019890 5542->5566 5546 10012163 wsprintfA 5548 1001217f 5546->5548 5583 10002220 5548->5583 5550 100121fe rand 5558 10012188 5550->5558 5555 100122ef LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5556 10012321 LoadLibraryA GetProcAddress 5555->5556 5556->5558 5557 1001237d 5559 10002ab0 14 API calls 5557->5559 5558->5550 5558->5555 5558->5557 5561 100096b0 6 API calls 5558->5561 5593 10002ab0 9 API calls 5558->5593 5597 100024f0 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5558->5597 5613 10011cb0 8 API calls 5558->5613 5627 10009590 5558->5627 5560 10012386 5559->5560 5631 100096b0 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5560->5631 5561->5558 5567 100120ef 10 API calls 5566->5567 5568 10011ee0 5567->5568 5569 10011efb 5568->5569 5570 100120b8 5569->5570 5571 10011f0c LoadLibraryA GetProcAddress 5569->5571 5570->5546 5572 10011f5a 5571->5572 5573 10011f77 GetProcAddress 5572->5573 5574 10011f6e 5572->5574 5575 10011fb4 5573->5575 5574->5546 5576 10011fd1 GetProcAddress 5575->5576 5577 10011fc8 5575->5577 5578 10012024 GetProcAddress LoadLibraryA GetProcAddress 5576->5578 5577->5546 5579 1001204a strstr 5578->5579 5581 10012072 strncpy atoi 5579->5581 5582 1001206b 5579->5582 5581->5570 5582->5546 5650 10001c80 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5583->5650 5586 10001c80 4 API calls 5587 1000225b 5586->5587 5588 10001c80 4 API calls 5587->5588 5589 10002267 5588->5589 5590 10001c80 4 API calls 5589->5590 5591 10002273 LoadLibraryA GetProcAddress WSAStartup putchar 5590->5591 5592 1000234c putchar 5591->5592 5592->5558 5594 10002b45 putchar 5593->5594 5595 10002b57 putchar closesocket putchar 5594->5595 5596 10002b7b putchar 5595->5596 5596->5558 5598 10002ab0 14 API calls 5597->5598 5599 10002534 puts 5598->5599 5600 1000254d puts socket Sleep 5599->5600 5601 10002583 5600->5601 5602 1000258e putchar gethostbyname putchar 5600->5602 5601->5558 5603 100025b4 5602->5603 5604 100025bf puts htons Sleep 5602->5604 5603->5558 5605 100025ee LoadLibraryA GetProcAddress 5604->5605 5607 1000262f 5605->5607 5606 10002634 5606->5558 5607->5606 5608 10002642 putchar setsockopt 5607->5608 5609 100026e0 5608->5609 5610 1000266f putchar WSAIoctl putchar 5608->5610 5652 1000ff60 6 API calls 5609->5652 5610->5609 5614 10011d33 5613->5614 5655 10011bd0 5614->5655 5616 10011d38 RegCreateKeyExA RegQueryValueExA 5617 10011df2 5616->5617 5618 10011de5 RegCloseKey 5616->5618 5619 10011e03 getsockname 5617->5619 5618->5619 5620 10011e64 5619->5620 5685 100119c0 RegOpenKeyA RegQueryValueExA RegCloseKey 5620->5685 5622 10011e76 5686 10011a50 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5622->5686 5626 10011ecb 5626->5558 5758 1000bae0 LoadLibraryA GetProcAddress 5627->5758 5629 100095ba 6 API calls 5630 10009611 5629->5630 5630->5558 5634 1000971c 5631->5634 5760 1000bbe0 LoadLibraryA GetProcAddress 5634->5760 5635 100023c0 6 API calls 5636 10002446 puts 5635->5636 5637 10002464 puts 5636->5637 5638 1000245d 5636->5638 5640 10002477 putchar 5637->5640 5639 10002ab0 14 API calls 5638->5639 5639->5637 5641 1000248b puts WSACleanup 5640->5641 5762 10001d30 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5641->5762 5644 10001d30 4 API calls 5645 100024b5 5644->5645 5646 10001d30 4 API calls 5645->5646 5647 100024c2 5646->5647 5648 10001d30 4 API calls 5647->5648 5649 100024ce 5648->5649 5649->5538 5651 10001cfb 5650->5651 5651->5586 5653 1001004a _beginthreadex 5652->5653 5654 100026fc 5653->5654 5654->5558 5718 10011af0 10 API calls 5655->5718 5658 10011be1 5658->5616 5659 10011af0 10 API calls 5660 10011bf1 5659->5660 5661 10011c10 5660->5661 5662 10011bf8 5660->5662 5664 10011af0 10 API calls 5661->5664 5663 10011af0 10 API calls 5662->5663 5665 10011c02 5663->5665 5666 10011c1a 5664->5666 5665->5616 5667 10011c21 5666->5667 5668 10011af0 10 API calls 5666->5668 5667->5616 5669 10011c31 5668->5669 5670 10011c50 5669->5670 5671 10011c38 5669->5671 5673 10011af0 10 API calls 5670->5673 5672 10011af0 10 API calls 5671->5672 5675 10011c42 5672->5675 5674 10011c5a 5673->5674 5676 10011c61 5674->5676 5677 10011af0 10 API calls 5674->5677 5675->5616 5676->5616 5678 10011c71 5677->5678 5679 10011c78 5678->5679 5680 10011af0 10 API calls 5678->5680 5679->5616 5681 10011c88 5680->5681 5682 10011ca6 5681->5682 5683 10011af0 10 API calls 5681->5683 5682->5616 5684 10011c99 5683->5684 5684->5616 5685->5622 5687 10011ab8 5686->5687 5688 10002ba0 5687->5688 5720 100021b0 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5688->5720 5691 10002bc3 _ftol ??2@YAPAXI 5694 10002c01 5691->5694 5695 10002bf7 5691->5695 5692 10002cf4 5693 10001d90 14 API calls 5692->5693 5696 10002d04 5693->5696 5699 10002c33 5694->5699 5700 10002c1d ??3@YAXPAX 5694->5700 5695->5626 5697 100021b0 17 API calls 5696->5697 5698 10002d0e 5697->5698 5701 10001d90 14 API calls 5698->5701 5724 10001d90 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5699->5724 5700->5626 5709 10002cc8 5701->5709 5704 10001d90 14 API calls 5705 10002c5c 5704->5705 5706 10001d90 14 API calls 5705->5706 5707 10002c6a 5706->5707 5708 10001d90 14 API calls 5707->5708 5710 10002c77 ??3@YAXPAX ??2@YAPAXI 5708->5710 5728 10002d20 LoadLibraryA GetProcAddress 5709->5728 5713 100021b0 17 API calls 5710->5713 5714 10002cae 5713->5714 5715 10001d90 14 API calls 5714->5715 5716 10002cbb 5715->5716 5716->5709 5717 10002cbf ??3@YAXPAX 5716->5717 5717->5709 5719 10011b6e 5718->5719 5719->5658 5719->5659 5721 100021e8 5720->5721 5735 10002070 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress puts 5721->5735 5723 100021fa 5723->5691 5723->5692 5725 10001dcd 5724->5725 5748 10001f50 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5725->5748 5727 10001de2 5727->5704 5729 10002d64 5728->5729 5734 10002dd8 5728->5734 5731 10002cea 5729->5731 5732 10002d72 puts send Sleep 5729->5732 5733 10002db4 Sleep 5729->5733 5729->5734 5730 10002de4 send 5730->5731 5730->5734 5731->5626 5732->5729 5733->5729 5734->5730 5734->5731 5736 100020c0 5735->5736 5737 100020d4 Sleep ceil _ftol puts 5736->5737 5738 100020c8 5736->5738 5739 10002119 5737->5739 5738->5723 5740 10002129 putchar 5739->5740 5741 1000211d 5739->5741 5742 10002142 putchar 5740->5742 5741->5723 5746 10001f40 5742->5746 5745 1000218d 5745->5723 5747 10001f47 putchar putchar 5746->5747 5747->5745 5749 10001f90 5748->5749 5750 10001fa4 ceil _ftol putchar 5749->5750 5751 10001f98 5749->5751 5752 10001fe9 5750->5752 5751->5727 5753 10002000 putchar 5752->5753 5754 10001ff3 5752->5754 5755 10001f40 5753->5755 5754->5727 5756 1000200e putchar putchar 5755->5756 5757 1000203d 5756->5757 5757->5727 5759 1000bb9d 5758->5759 5759->5629 5761 1000974d 5760->5761 5761->5635 5763 10001d6f 5762->5763 5763->5644 5764 100199ba 5765 100199cd 5764->5765 5768 100199d6 5764->5768 5773 100199fe 5765->5773 5774 10013930 5765->5774 5768->5765 5768->5773 5801 1001990f 5768->5801 5769 10019a0a 5770 10019a1e 5769->5770 5772 1001990f 3 API calls 5769->5772 5769->5773 5771 1001990f 3 API calls 5770->5771 5770->5773 5771->5773 5772->5770 5775 10013be5 5774->5775 5776 10013948 12 API calls 5774->5776 5775->5769 5808 10013570 5776->5808 5779 10013a75 putchar 5780 10013aa9 _stricmp 5779->5780 5781 10013ae6 5780->5781 5784 10013b09 5780->5784 5859 1000b060 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5781->5859 5783 10013afb 5783->5769 5810 10009dd0 6 API calls 5784->5810 5786 10013b20 5813 10012640 LoadLibraryA GetProcAddress 5786->5813 5791 10013b79 5822 100129d0 6 API calls 5791->5822 5793 10013b81 5834 10012c40 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5793->5834 5795 10013b86 6 API calls 5853 100131e0 11 API calls 5795->5853 5799 10013be0 5876 10012780 6 API calls 5799->5876 5802 10019917 5801->5802 5803 1001994d 5802->5803 5804 10019977 5802->5804 5805 10019938 malloc 5802->5805 5803->5765 5804->5803 5807 100199a4 free 5804->5807 5805->5803 5806 10019951 _initterm 5805->5806 5806->5803 5807->5803 5809 100138f1 putchar 5808->5809 5809->5779 5811 10009ed4 DeleteFileA 5810->5811 5811->5786 5814 10012690 5813->5814 5816 100126d7 srand DeleteFileA 5813->5816 5815 1001269d strncpy _access 5814->5815 5814->5816 5815->5814 5817 100126f0 OpenSCManagerA 5816->5817 5818 10012709 5817->5818 5819 1001270b CreateServiceA 5817->5819 5818->5791 5820 10012742 5819->5820 5821 10012744 LockServiceDatabase ChangeServiceConfig2A UnlockServiceDatabase 5819->5821 5820->5791 5821->5791 5823 10012ab9 DeleteFileA 5822->5823 5877 100128f0 5823->5877 5825 10012b0f rand sprintf 5882 10012950 5825->5882 5827 10012b50 DeleteFileA sprintf RegCreateKeyExA 5828 10012bc2 RegSetValueExA 5827->5828 5829 10012be4 RegSetValueExA RegCloseKey 5828->5829 5830 100128f0 8 API calls 5829->5830 5831 10012c13 5830->5831 5832 10012950 8 API calls 5831->5832 5833 10012c26 DeleteFileA 5832->5833 5833->5793 5835 10012ca4 5834->5835 5836 100128f0 8 API calls 5835->5836 5837 10012d06 rand sprintf 5836->5837 5838 10012950 8 API calls 5837->5838 5839 10012d4a RegOpenKeyExA 5838->5839 5840 10012d71 RegQueryValueExA 5839->5840 5841 10012f12 5839->5841 5842 10012dd5 5840->5842 5843 10012e79 5840->5843 5841->5795 5845 10012e34 sprintf 5842->5845 5847 10012dfa _stricmp 5842->5847 5844 10012eb5 RegSetValueExA RegCloseKey 5843->5844 5848 10012eeb 5844->5848 5845->5844 5847->5842 5849 10012e63 RegCloseKey 5847->5849 5850 100128f0 8 API calls 5848->5850 5849->5795 5851 10012efd 5850->5851 5852 10012950 8 API calls 5851->5852 5852->5841 5854 1001337b rand 5853->5854 5856 10013410 5853->5856 5854->5856 5857 100133bc 5854->5857 5875 10012840 OpenSCManagerA OpenServiceA StartServiceA CloseServiceHandle CloseServiceHandle 5856->5875 5857->5856 5858 100133d2 rand 5857->5858 5858->5857 5858->5858 5860 1000b0c3 5859->5860 5861 1000b0b7 LoadLibraryA 5859->5861 5893 1000b310 7 API calls 5860->5893 5861->5860 5864 1000b130 putchar 5865 1000b1c1 putchar 5864->5865 5866 1000b155 5864->5866 5868 1000b1d9 putchar 5865->5868 5867 1000b16e LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5866->5867 5874 1000b1a5 5866->5874 5867->5874 5869 1000b260 5868->5869 5870 1000b20d 5868->5870 5872 1000b297 5869->5872 5873 1000b264 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5869->5873 5871 1000b211 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5870->5871 5870->5874 5871->5874 5872->5783 5873->5872 5874->5783 5875->5799 5876->5775 5889 10012880 LoadLibraryA GetProcAddress 5877->5889 5880 10012922 RegSaveKeyA RegCloseKey 5880->5825 5881 1001291e 5881->5825 5883 10012880 5 API calls 5882->5883 5884 10012965 RegCreateKeyExA 5883->5884 5885 10012993 5884->5885 5886 10012999 RegRestoreKeyA 5884->5886 5885->5827 5887 100129b5 RegCloseKey 5886->5887 5888 100129af 5886->5888 5887->5827 5888->5827 5890 100128a3 OpenProcessToken 5889->5890 5891 100128e8 RegOpenKeyExA 5890->5891 5892 100128ae LookupPrivilegeValueA AdjustTokenPrivileges 5890->5892 5891->5880 5891->5881 5892->5891 5894 1000b3a8 AllocateAndInitializeSid 5893->5894 5902 1000b41f 5893->5902 5896 1000b3c4 GetLengthSid 5894->5896 5894->5902 5897 1000b3dc 5896->5897 5898 1000b3e9 InitializeAcl 5897->5898 5897->5902 5900 1000b3f7 AddAccessAllowedAce 5898->5900 5898->5902 5901 1000b40d SetSecurityDescriptorDacl 5900->5901 5900->5902 5901->5902 5903 1000b45e 5902->5903 5904 1000b465 FreeSid 5903->5904 5905 1000b0f5 putchar 5903->5905 5904->5905 5905->5864

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043,?,?,?), ref: 100139CA
                        • GetProcAddress.KERNEL32(00000000), ref: 100139D1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 100139F4
                        • GetProcAddress.KERNEL32(00000000), ref: 100139FD
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetModuleFileNameA), ref: 10013A0C
                        • GetProcAddress.KERNEL32(00000000), ref: 10013A0F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ExpandEnvironmentStringsA), ref: 10013A1D
                        • GetProcAddress.KERNEL32(00000000), ref: 10013A20
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 10013A2F
                        • GetProcAddress.KERNEL32(00000000), ref: 10013A32
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent), ref: 10013A41
                        • GetProcAddress.KERNEL32(00000000), ref: 10013A44
                        • putchar.MSVCRT ref: 10013A60
                        • putchar.MSVCRT ref: 10013A77
                        • _stricmp.MSVCRT(1002185C,C:\Program Files (x86)\Iefg\Nefghijkl.pic), ref: 10013AD9
                        • srand.MSVCRT ref: 10013B31
                        • DeleteFileA.KERNELBASE(C:\Program Files (x86)\Iefg\Nefghijkl.pic), ref: 10013B3F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetFileAttributesA), ref: 10013B96
                        • GetProcAddress.KERNEL32(00000000), ref: 10013B9F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CopyFileA), ref: 10013BAD
                        • GetProcAddress.KERNEL32(00000000), ref: 10013BB0
                        • SetFileAttributesA.KERNELBASE(C:\Program Files (x86)\Iefg\Nefghijkl.pic,00001000), ref: 10013BBE
                        • CopyFileA.KERNEL32(1002185C,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000), ref: 10013BCC
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateFileMappingA,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000,00000000,?,?,?,?,?,?,?,00000000,10019D88,000000FF), ref: 1000B08E
                          • Part of subcall function 1000B060: GetProcAddress.KERNEL32(00000000), ref: 1000B097
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(KERNEL32.dll,MapViewOfFile,?,?,?,?,?,?,?,00000000,10019D88,000000FF,?,10013AFB), ref: 1000B0A6
                          • Part of subcall function 1000B060: GetProcAddress.KERNEL32(00000000), ref: 1000B0A9
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(user32.dll,?,?,?,?,?,?,?,00000000,10019D88,000000FF,?,10013AFB), ref: 1000B0BC
                          • Part of subcall function 1000B060: putchar.MSVCRT ref: 1000B107
                          • Part of subcall function 1000B060: putchar.MSVCRT ref: 1000B147
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B17E
                          • Part of subcall function 1000B060: GetProcAddress.KERNEL32(00000000), ref: 1000B187
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: LibraryLoad$AddressProc$putchar$File$AttributesCopyDelete_stricmpsrand
                        • String ID: %SystemRoot%\System32\svchost.exe -k imgsvc$.$2$3$A$C$C:\Program Files (x86)\Iefg\Nefghijkl.pic$CopyFileA$Defghi Klmnopqr Tuv$DeleteFileA$E$ExpandEnvironmentStringsA$GetModuleFileNameA$GetTickCount$Glable__Wait$KERNEL32.dll$SetEvent$SetFileAttributesA$a$d$k$n$n$r$r$v
                        • API String ID: 2857096668-3655875015
                        • Opcode ID: 6a04d4f16884ee80b3e521182a11346bd3e4b94cfd7b2b84332c968a17cd9129
                        • Instruction ID: 4f160d8f796e639261b17b9a2e8e3a52c1c3899edaf954e4292ac0ec274278a5
                        • Opcode Fuzzy Hash: 6a04d4f16884ee80b3e521182a11346bd3e4b94cfd7b2b84332c968a17cd9129
                        • Instruction Fuzzy Hash: F571F871C00288ABEB01EBF48C49BDF7F65EF25310F044095F645AB252DBB5DA84CBA1

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetWindowsDirectoryA,?,%SystemRoot%\System32\svchost.exe -k imgsvc,?,00000000), ref: 10012C5A
                        • GetProcAddress.KERNEL32(00000000), ref: 10012C63
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA,?,00000000), ref: 10012C71
                        • GetProcAddress.KERNEL32(00000000), ref: 10012C74
                          • Part of subcall function 100128F0: RegOpenKeyExA.KERNELBASE(80000002,10012B0F,00000000,000F003F,00000000,00000000), ref: 10012914
                        • rand.MSVCRT ref: 10012D1B
                        • sprintf.MSVCRT ref: 10012D32
                          • Part of subcall function 10012950: RegCreateKeyExA.KERNELBASE(80000002,?,00000000,00000000,00000000,000F003F,00000000,?,?,SeRestorePrivilege,00000000,00000000), ref: 10012989
                        • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,000F003F,?,?,?,?,?,?,?,00000000), ref: 10012D63
                        • RegQueryValueExA.KERNELBASE(?,imgsvc,00000000,00000007,?,?), ref: 10012DC7
                        • _stricmp.MSVCRT(?,Defghi Klmnopqr Tuv), ref: 10012E00
                        • sprintf.MSVCRT ref: 10012E58
                        • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000000), ref: 10012E68
                        • RegSetValueExA.ADVAPI32(?,imgsvc,00000000,00000007,?), ref: 10012ECC
                        • RegCloseKey.ADVAPI32(?), ref: 10012ED7
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressCloseLibraryLoadOpenProcValuesprintf$CreateQuery_stricmprand
                        • String ID: %SystemRoot%\System32\svchost.exe -k imgsvc$Defghi Klmnopqr Tuv$DeleteFileA$GetWindowsDirectoryA$KERNEL32.dll$Net-Temp.ini$SOFTWARE\%d$SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost$imgsvc
                        • API String ID: 2902347649-1402337471
                        • Opcode ID: df8fa34393e07bcb81fc3157e8526984354098efb7a937787631a095da1de716
                        • Instruction ID: 843dde04a7dc20ce44473425e03c3e070b7d9fe7c5225e61fbf22f28b5134668
                        • Opcode Fuzzy Hash: df8fa34393e07bcb81fc3157e8526984354098efb7a937787631a095da1de716
                        • Instruction Fuzzy Hash: A571E076608345ABE724CA74CC44BAB77E5FBC8350F404A2DF659972C0DBB8E9098762

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 100124B7
                        • GetProcAddress.KERNEL32(00000000), ref: 100124C0
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 100124CE
                        • GetProcAddress.KERNEL32(00000000), ref: 100124D1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 100124DF
                        • GetProcAddress.KERNEL32(00000000), ref: 100124E2
                        • LoadIconA.USER32 ref: 1001251C
                        • LoadCursorA.USER32(?,00007F8B), ref: 10012531
                        • GetStockObject.GDI32(00000002), ref: 1001253D
                        • RegisterClassA.USER32 ref: 1001255C
                        • LoadMenuA.USER32(?,00000066), ref: 1001256C
                        • CreateWindowExA.USER32(00000000,WIN32 Application,My Win32 Applaction,00CF0000,?,?,?,?,00000000,00000000), ref: 10012598
                        • strncpy.MSVCRT ref: 100125AF
                        • wcstombs.MSVCRT ref: 100125C2
                        • RegisterServiceCtrlHandlerA.ADVAPI32(10021994,10012430), ref: 100125D5
                          • Part of subcall function 100123D0: SetServiceStatus.ADVAPI32 ref: 10012417
                          • Part of subcall function 100120D0: LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,00000000,00000000,00000000,00000000,1001A0A6,000000FF,1001262C,00000000,00000000), ref: 10012103
                          • Part of subcall function 100120D0: GetProcAddress.KERNEL32(00000000), ref: 1001210C
                          • Part of subcall function 100120D0: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 1001211C
                          • Part of subcall function 100120D0: GetProcAddress.KERNEL32(00000000), ref: 1001211F
                          • Part of subcall function 100120D0: LoadLibraryA.KERNEL32(KERNEL32.dll,OpenEventA), ref: 1001212F
                          • Part of subcall function 100120D0: GetProcAddress.KERNEL32(00000000), ref: 10012132
                          • Part of subcall function 100120D0: LoadLibraryA.KERNEL32(KERNEL32.dll,SetErrorMode), ref: 10012144
                          • Part of subcall function 100120D0: GetProcAddress.KERNEL32(00000000), ref: 10012147
                          • Part of subcall function 100120D0: LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 10012155
                          • Part of subcall function 100120D0: GetProcAddress.KERNEL32(00000000), ref: 10012158
                          • Part of subcall function 100120D0: wsprintfA.USER32 ref: 10012172
                          • Part of subcall function 100120D0: rand.MSVCRT ref: 100121FE
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Load$AddressLibraryProc$RegisterService$ClassCreateCtrlCursorHandlerIconMenuObjectStatusStockWindowrandstrncpywcstombswsprintf
                        • String ID: CloseHandle$CreateThread$KERNEL32.dll$My Win32 Applaction$Sleep$WIN32 Application$f
                        • API String ID: 1337363002-3859385539
                        • Opcode ID: 01d6aa7b0e9c9adc5f2245e3cb1baa4392faf9fb211db9fc1d42855f5a29e4f2
                        • Instruction ID: 560bf95f47575eba756a5b58744a31685d7a1122a40e360d2fc0a2dd57ca84c5
                        • Opcode Fuzzy Hash: 01d6aa7b0e9c9adc5f2245e3cb1baa4392faf9fb211db9fc1d42855f5a29e4f2
                        • Instruction Fuzzy Hash: C44195B4A44354BBF310DBA48C89F5F7AA8EB98B04F204419F744BB1D0D7F4E4808B65

                        Control-flow Graph

                        APIs
                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,10013B79,?), ref: 100126FA
                        • CreateServiceA.ADVAPI32(00000000,Defghi Klmnopqr Tuv,Defghi Klmnopqr Tuvwxyab Defg,000F01FF,00000110,00000002,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 10012733
                        Strings
                        • Defghi Klmnopqr Tuvwxyab Defg, xrefs: 10012728
                        • Defghi Klmnopqr Tuv, xrefs: 1001272D
                        • %SystemRoot%\System32\svchost.exe -k imgsvc, xrefs: 1001274A
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: CreateManagerOpenService
                        • String ID: %SystemRoot%\System32\svchost.exe -k imgsvc$Defghi Klmnopqr Tuv$Defghi Klmnopqr Tuvwxyab Defg
                        • API String ID: 2847155433-1674046866
                        • Opcode ID: 408004e29d756af054d596597ba4a6f10a30462b1db8ee5df71916fe3a3cd9f1
                        • Instruction ID: 00c32f24480fc92c701013c1cae3101ad844515917da4fae02355e615b95faac
                        • Opcode Fuzzy Hash: 408004e29d756af054d596597ba4a6f10a30462b1db8ee5df71916fe3a3cd9f1
                        • Instruction Fuzzy Hash: 1C0131B9641321BBF315DB608CC9FA737E8EB58B51F20811DF70A9A1D0DFB4D8819A14

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcess,SeBackupPrivilege,00000000,10012B0F,?,00000000), ref: 1001288D
                        • GetProcAddress.KERNEL32(00000000), ref: 10012894
                        • OpenProcessToken.ADVAPI32(00000000), ref: 100128A4
                        • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 100128BA
                        • AdjustTokenPrivileges.KERNELBASE ref: 100128E2
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Token$AddressAdjustLibraryLoadLookupOpenPrivilegePrivilegesProcProcessValue
                        • String ID: GetCurrentProcess$KERNEL32.dll
                        • API String ID: 3744282454-4253925734
                        • Opcode ID: 12e01aaf87c452ccac56fbd1ae4905b6a3ad3d734119d3f8a2be3a10543e5fe5
                        • Instruction ID: 399f003900c3477681107aebc0dedee38224b1348bc231ad5db4fd7a3fc13127
                        • Opcode Fuzzy Hash: 12e01aaf87c452ccac56fbd1ae4905b6a3ad3d734119d3f8a2be3a10543e5fe5
                        • Instruction Fuzzy Hash: 0CF01DB4504701BFF200EB94CC4EF6B7BA8FB88745F40C54CF6559A1A1EBB0E5488B66

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,00000000,00000000,74DEF550), ref: 100131FC
                        • GetProcAddress.KERNEL32(00000000), ref: 10013205
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetFileAttributesA), ref: 10013214
                        • GetProcAddress.KERNEL32(00000000), ref: 10013217
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetFilePointer), ref: 10013226
                        • GetProcAddress.KERNEL32(00000000), ref: 10013229
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 100132AC
                        • GetProcAddress.KERNEL32(00000000), ref: 100132B3
                        • LoadLibraryA.KERNEL32(0000006B,00000057), ref: 1001333D
                        • GetProcAddress.KERNEL32(00000000), ref: 10013344
                        • CreateFileA.KERNELBASE(10013BD8,40000000,00000002,00000000,00000004,00000080,00000000), ref: 1001336D
                        • rand.MSVCRT ref: 100133A5
                        • rand.MSVCRT ref: 100133D2
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$rand$CreateFile
                        • String ID: .$.$2$2$3$3$A$C$CloseHandle$F$F$KERNEL32.dll$SetFileAttributesA$SetFilePointer$W$a$d$d$i$k$k$l$l$n$n$r$r$r$r$t$t
                        • API String ID: 1557718252-1450536158
                        • Opcode ID: fcb331f0d57d39ce57a5e03f5e326d309c8603a9e7d80ba35128e688db30a1a5
                        • Instruction ID: e4958f366cd472ed21702a7bfc4c057534074140b614f248dc7e9797ebaf45da
                        • Opcode Fuzzy Hash: fcb331f0d57d39ce57a5e03f5e326d309c8603a9e7d80ba35128e688db30a1a5
                        • Instruction Fuzzy Hash: 74718361D042C8EEEB12DBF8CC487DEBF75AF26204F144199E680BB282C7B94A45C775

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,?,%SystemRoot%\System32\svchost.exe -k imgsvc,00000000), ref: 100129EC
                        • GetProcAddress.KERNEL32(00000000), ref: 100129F5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetWindowsDirectoryA), ref: 10012A04
                        • GetProcAddress.KERNEL32(00000000), ref: 10012A07
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 10012A16
                        • GetProcAddress.KERNEL32(00000000), ref: 10012A19
                        • DeleteFileA.KERNELBASE(00000000), ref: 10012AFA
                          • Part of subcall function 100128F0: RegOpenKeyExA.KERNELBASE(80000002,10012B0F,00000000,000F003F,00000000,00000000), ref: 10012914
                        • rand.MSVCRT ref: 10012B22
                        • sprintf.MSVCRT ref: 10012B3E
                          • Part of subcall function 10012950: RegCreateKeyExA.KERNELBASE(80000002,?,00000000,00000000,00000000,000F003F,00000000,?,?,SeRestorePrivilege,00000000,00000000), ref: 10012989
                        • DeleteFileA.KERNELBASE(00000000), ref: 10012B5A
                        • sprintf.MSVCRT ref: 10012B85
                        • RegCreateKeyExA.KERNELBASE(80000002,00000000,00000000,00000000,00000000,000F003F,00000000,10013B81,?), ref: 10012BB2
                        • RegSetValueExA.KERNELBASE(10013B81,ServiceDll,00000000,00000002,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000), ref: 10012BDB
                        • RegSetValueExA.KERNELBASE(10013B81,ServiceMain,00000000,00000001,DarkAngle,00000000), ref: 10012BF7
                        • RegCloseKey.ADVAPI32(10013B81), ref: 10012BFD
                          • Part of subcall function 100128F0: RegSaveKeyA.ADVAPI32(00000000,?,00000000), ref: 1001292E
                          • Part of subcall function 100128F0: RegCloseKey.ADVAPI32 ref: 10012939
                          • Part of subcall function 10012950: RegRestoreKeyA.KERNELBASE(?,?,00000008,?,?,SeRestorePrivilege,00000000,00000000), ref: 100129A5
                        • DeleteFileA.KERNELBASE(00000000), ref: 10012C30
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressDeleteFileLibraryLoadProc$CloseCreateValuesprintf$OpenRestoreSaverand
                        • String ID: %SystemRoot%\System32\svchost.exe -k imgsvc$%s\Parameters$C:\Program Files (x86)\Iefg\Nefghijkl.pic$DarkAngle$Defghi Klmnopqr Tuv$DeleteFileA$GetWindowsDirectoryA$KERNEL32.dll$Net-Temp.ini$SOFTWARE\%d$SYSTEM\CurrentControlSet\Services\$ServiceDll$ServiceMain$lstrlenA
                        • API String ID: 3555960746-1579056387
                        • Opcode ID: 5e2dcec9016884e4dd9fdb390e7b0370be652425965f823c056d42ea74019157
                        • Instruction ID: e00e8cb64f4c6072ab9c1a23f5d654da855fec7f3f6e2340159532770a766d6a
                        • Opcode Fuzzy Hash: 5e2dcec9016884e4dd9fdb390e7b0370be652425965f823c056d42ea74019157
                        • Instruction Fuzzy Hash: 2F61087290411CABEB24D6B4CC84FEEB779FB98310F504599F619E72C1DAB49F448B90

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000047,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000,00000000), ref: 10009E7F
                        • GetProcAddress.KERNEL32(00000000), ref: 10009E88
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 10009E97
                        • GetProcAddress.KERNEL32(00000000), ref: 10009E9A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 10009EA9
                        • GetProcAddress.KERNEL32(00000000), ref: 10009EAC
                        • DeleteFileA.KERNELBASE(?), ref: 10009EEA
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$DeleteFile
                        • String ID: .$2$3$A$C:\Program Files (x86)\Iefg\Nefghijkl.pic$D$DeleteFileA$G$KERNEL32.dll$S$\syslog.dat$c$d$i$k$lstrcatA$m$n$o$r$s
                        • API String ID: 1246902878-3715464787
                        • Opcode ID: fa8a19f212d2fcd1c4d1634fd57d9ae3dd0214f5043d9a2d77bdf9856f59861e
                        • Instruction ID: 4ad72c690fa17962c3dcba22dc931db9df0c44411c51ac2556327c57442147e5
                        • Opcode Fuzzy Hash: fa8a19f212d2fcd1c4d1634fd57d9ae3dd0214f5043d9a2d77bdf9856f59861e
                        • Instruction Fuzzy Hash: 1A412C62C092CDDDEF02DAF898486EEBF759F36214F084089D584B7242C6B94749C7B6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 99 10012640-1001268e LoadLibraryA GetProcAddress 100 10012690-10012691 99->100 101 100126d8-100126e1 99->101 102 10012697-1001269b 100->102 103 100126c6-100126d5 102->103 104 1001269d-100126b9 strncpy _access 102->104 103->102 105 100126d7 103->105 104->103 106 100126bb-100126c1 104->106 105->101 106->103
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateDirectoryA,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000,00000000), ref: 10012653
                        • GetProcAddress.KERNEL32(00000000), ref: 1001265A
                        • strncpy.MSVCRT ref: 100126A4
                        • _access.MSVCRT ref: 100126AD
                        Strings
                        • KERNEL32.dll, xrefs: 1001264E
                        • C:\Program Files (x86)\Iefg\Nefghijkl.pic, xrefs: 10012648
                        • CreateDirectoryA, xrefs: 10012649
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc_accessstrncpy
                        • String ID: C:\Program Files (x86)\Iefg\Nefghijkl.pic$CreateDirectoryA$KERNEL32.dll
                        • API String ID: 2439819275-932344124
                        • Opcode ID: bd9f4dd86b21963415de69861360becd9f22f8caa79ac4150bdd9c3c65826599
                        • Instruction ID: 9ecce95db63e18048a6869a008e3f82084b796811035b761db618d25f4687eea
                        • Opcode Fuzzy Hash: bd9f4dd86b21963415de69861360becd9f22f8caa79ac4150bdd9c3c65826599
                        • Instruction Fuzzy Hash: FB1125724043546BD364DA74CC88BAB7BD4EB88361F014B2DF7A2921D0CF79D88486A5

                        Control-flow Graph

                        APIs
                          • Part of subcall function 10012880: LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcess,SeBackupPrivilege,00000000,10012B0F,?,00000000), ref: 1001288D
                          • Part of subcall function 10012880: GetProcAddress.KERNEL32(00000000), ref: 10012894
                          • Part of subcall function 10012880: OpenProcessToken.ADVAPI32(00000000), ref: 100128A4
                          • Part of subcall function 10012880: LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 100128BA
                          • Part of subcall function 10012880: AdjustTokenPrivileges.KERNELBASE ref: 100128E2
                        • RegCreateKeyExA.KERNELBASE(80000002,?,00000000,00000000,00000000,000F003F,00000000,?,?,SeRestorePrivilege,00000000,00000000), ref: 10012989
                        • RegRestoreKeyA.KERNELBASE(?,?,00000008,?,?,SeRestorePrivilege,00000000,00000000), ref: 100129A5
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Token$AddressAdjustCreateLibraryLoadLookupOpenPrivilegePrivilegesProcProcessRestoreValue
                        • String ID: SeRestorePrivilege
                        • API String ID: 2429928042-1684392131
                        • Opcode ID: 097e06e332430977430d9a460b39217e3c597f3917cbf94135a069d7c89771bc
                        • Instruction ID: b4c7a59b284b538a44cb7b6238b6d835cb3a570a7bb80d5eba4fcf3e4dfdd8cd
                        • Opcode Fuzzy Hash: 097e06e332430977430d9a460b39217e3c597f3917cbf94135a069d7c89771bc
                        • Instruction Fuzzy Hash: 80F062B93443017BF710DB20DC46F7B73E8EB84B05F54882CFA489A280E674E858C762

                        Control-flow Graph

                        APIs
                          • Part of subcall function 10012880: LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcess,SeBackupPrivilege,00000000,10012B0F,?,00000000), ref: 1001288D
                          • Part of subcall function 10012880: GetProcAddress.KERNEL32(00000000), ref: 10012894
                          • Part of subcall function 10012880: OpenProcessToken.ADVAPI32(00000000), ref: 100128A4
                          • Part of subcall function 10012880: LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 100128BA
                          • Part of subcall function 10012880: AdjustTokenPrivileges.KERNELBASE ref: 100128E2
                        • RegOpenKeyExA.KERNELBASE(80000002,10012B0F,00000000,000F003F,00000000,00000000), ref: 10012914
                        • RegSaveKeyA.ADVAPI32(00000000,?,00000000), ref: 1001292E
                        • RegCloseKey.ADVAPI32 ref: 10012939
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: OpenToken$AddressAdjustCloseLibraryLoadLookupPrivilegePrivilegesProcProcessSaveValue
                        • String ID: SeBackupPrivilege
                        • API String ID: 2372920917-2429070247
                        • Opcode ID: 3df8689c6ac1e2b386c68f0f0d01f5e065a9ec451b2765de15d8a0098039fddc
                        • Instruction ID: 43d226543e6eeb859091b46bbcf5307d07454dd089c114a20b0d5770e2fe7636
                        • Opcode Fuzzy Hash: 3df8689c6ac1e2b386c68f0f0d01f5e065a9ec451b2765de15d8a0098039fddc
                        • Instruction Fuzzy Hash: F4F0EDB5214200BFF319DB60CC89F3B73A8EB88741F24881CF656C6691DB70E854CA66

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 123 1001990f-10019915 124 10019925-10019936 123->124 125 10019917-1001991d 123->125 128 10019977-10019979 124->128 129 10019938-1001994b malloc 124->129 126 1001994d-1001994f 125->126 127 1001991f 125->127 130 100199b7 126->130 127->124 131 100199b4-100199b6 128->131 132 1001997b-10019982 128->132 129->126 133 10019951-10019975 _initterm 129->133 131->130 132->131 134 10019984-1001998b 132->134 133->131 135 1001998e-10019990 134->135 136 10019992-10019996 135->136 137 100199a4-100199b3 free 135->137 138 10019998-1001999a 136->138 139 1001999f-100199a2 136->139 137->131 138->139 139->135
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: _inittermfreemalloc
                        • String ID:
                        • API String ID: 1678931842-0
                        • Opcode ID: 4826aa41c0d135ad612f102df0f8f2cfc280b3fa8cbd932fabf20ab1eb05881b
                        • Instruction ID: 80d6cc89804a1d343dceb3900cf50205ab3ae4d686d74f7b3d5aa89d170c6700
                        • Opcode Fuzzy Hash: 4826aa41c0d135ad612f102df0f8f2cfc280b3fa8cbd932fabf20ab1eb05881b
                        • Instruction Fuzzy Hash: 0A117C3AA062229FE714CB68DDD5BAA37F4EF14795B25001DF806CE560DB31E8C1DB42

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 141 10010c90-10010cb0 LoadLibraryA
                        APIs
                        • LoadLibraryA.KERNELBASE(AVICAP32.dll), ref: 10010CA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: AVICAP32.dll
                        • API String ID: 1029625771-3627695671
                        • Opcode ID: d3be5105ee97969a8b5013d22dedfdb0f6739b726ea0359097dd6c455374c091
                        • Instruction ID: 483190d4d815d7a8ed97327acb824650f34f9ee32a8b68e2df347c7a92b9d506
                        • Opcode Fuzzy Hash: d3be5105ee97969a8b5013d22dedfdb0f6739b726ea0359097dd6c455374c091
                        • Instruction Fuzzy Hash: 9FB0127C100054CAE211CB218D8404C3DE0E7583017204180FA4186160DB3080405E48
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection), ref: 10008817
                        • GetProcAddress.KERNEL32(00000000), ref: 10008820
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection), ref: 1000882E
                        • GetProcAddress.KERNEL32(00000000), ref: 10008831
                        • malloc.MSVCRT ref: 10008861
                        • malloc.MSVCRT ref: 1000886E
                        • malloc.MSVCRT ref: 10008879
                        • recv.WS2_32 ref: 100088E2
                        • send.WS2_32 ref: 10008972
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,?,?,?,?,00005000,00000000), ref: 100089A4
                        • GetProcAddress.KERNEL32(00000000), ref: 100089A7
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread,?,?,?,?,?,?,?,00005000,00000000), ref: 100089BA
                        • GetProcAddress.KERNEL32(00000000), ref: 100089BD
                        • getpeername.WS2_32(?,?,?), ref: 100089CE
                        • inet_addr.WS2_32(?), ref: 100089DF
                        • inet_addr.WS2_32(00000000), ref: 100089F5
                        • htons.WS2_32(?), ref: 10008A00
                        • send.WS2_32(00000000), ref: 10008A42
                          • Part of subcall function 100085C0: htons.WS2_32 ref: 100085E3
                          • Part of subcall function 100085C0: inet_addr.WS2_32(?), ref: 100085F9
                          • Part of subcall function 100085C0: inet_addr.WS2_32(?), ref: 10008617
                          • Part of subcall function 100085C0: socket.WS2_32(00000002,00000001,00000006), ref: 10008623
                          • Part of subcall function 100085C0: setsockopt.WS2_32 ref: 1000864E
                          • Part of subcall function 100085C0: connect.WS2_32(?,?,00000010), ref: 1000865E
                          • Part of subcall function 100085C0: closesocket.WS2_32 ref: 1000866C
                        • send.WS2_32(-0000005B,?,00000008,00000000), ref: 10008AE8
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 10008B0E
                        • GetProcAddress.KERNEL32(00000000), ref: 10008B11
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 10008B1F
                        • GetProcAddress.KERNEL32(00000000), ref: 10008B22
                          • Part of subcall function 100083B0: gethostbyname.WS2_32(?), ref: 100083B5
                        • closesocket.WS2_32 ref: 10008B49
                        • closesocket.WS2_32(?), ref: 10008B4F
                        • free.MSVCRT(?), ref: 10008B58
                        • free.MSVCRT(?), ref: 10008B5F
                        • free.MSVCRT(?), ref: 10008B66
                        • free.MSVCRT(?), ref: 10008B6D
                          • Part of subcall function 10007EE0: LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 10007EFA
                          • Part of subcall function 10007EE0: GetProcAddress.KERNEL32(00000000), ref: 10007F03
                          • Part of subcall function 10007EE0: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 10007F13
                          • Part of subcall function 10007EE0: GetProcAddress.KERNEL32(00000000), ref: 10007F16
                          • Part of subcall function 10007EE0: LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection), ref: 10007F26
                          • Part of subcall function 10007EE0: GetProcAddress.KERNEL32(00000000), ref: 10007F29
                          • Part of subcall function 10007EE0: LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection), ref: 10007F37
                          • Part of subcall function 10007EE0: GetProcAddress.KERNEL32(00000000), ref: 10007F3A
                          • Part of subcall function 10007EE0: send.WS2_32(?,HTTP/1.0 200 OK,?,00000000), ref: 1000800B
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$freeinet_addrsend$closesocketmalloc$htons$connectgethostbynamegetpeernamerecvsetsockoptsocket
                        • String ID: CreateThread$EnterCriticalSection$KERNEL32.dll$LeaveCriticalSection$WaitForSingleObject$[
                        • API String ID: 2190144742-4023625534
                        • Opcode ID: fa257dd73039a14c97b553c7013e5d380b94430b2c7dbbb0dc0c0730267c3c11
                        • Instruction ID: 71d1ebbffbc4392aa6c1a54c1b7c41268db957bde06741065b4df84323e1aa41
                        • Opcode Fuzzy Hash: fa257dd73039a14c97b553c7013e5d380b94430b2c7dbbb0dc0c0730267c3c11
                        • Instruction Fuzzy Hash: 0EA1BDB0508740ABE340DB64CC85F6BBBE9FF88794F10491DF68593281DBB4ED458BA2
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: _errno$closesocketrecvsend$AddressLibraryLoadProcselect
                        • String ID: KERNEL32.dll$Sleep
                        • API String ID: 1399858170-534790634
                        • Opcode ID: 6425c14dfe906df5a6800cda3c848b47a740d38c2c1dbaa7dc22988aec0f8ee8
                        • Instruction ID: 536e2d17fff19771818ef1dbeab40d2e2893c603724d4b4ffa0eee882a97db77
                        • Opcode Fuzzy Hash: 6425c14dfe906df5a6800cda3c848b47a740d38c2c1dbaa7dc22988aec0f8ee8
                        • Instruction Fuzzy Hash: 67B124326047469BE725DF64C8546AFB3E6FFC8780F41092CF94697284EB74EA05CB92
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 1000D6F9
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D6FC
                        • LoadLibraryA.KERNEL32(USER32.dll), ref: 1000D70A
                        • GetProcAddress.KERNEL32(?,SystemParametersInfoA), ref: 1000D732
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 1000D741
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D748
                        • putchar.MSVCRT ref: 1000D7AA
                        • putchar.MSVCRT ref: 1000D7BC
                        • SendMessageA.USER32(0000FFFF,00000112,0000F170,00000002), ref: 1000D7D2
                        • SendMessageA.USER32(0000FFFF,00000112,0000F170,000000FF), ref: 1000D806
                          • Part of subcall function 1000D1B0: LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,10019F21,000000FF,1000D365,?,?,?,?,?,?,10019F30,000000FF), ref: 1000D1D3
                          • Part of subcall function 1000D1B0: GetProcAddress.KERNEL32(00000000), ref: 1000D1DA
                          • Part of subcall function 1000D1B0: CloseHandle.KERNEL32(?,?,?,10019F21,000000FF,1000D365,?,?,?,?,?,?,10019F30,000000FF), ref: 1000D1F0
                          • Part of subcall function 1000D1B0: ??2@YAPAXI@Z.MSVCRT ref: 1000D214
                        • putchar.MSVCRT ref: 1000D815
                        • BlockInput.USER32(?), ref: 1000D820
                        • putchar.MSVCRT ref: 1000D827
                          • Part of subcall function 1000DC00: GetSystemMetrics.USER32(00000000), ref: 1000DC17
                          • Part of subcall function 1000DC00: GetSystemMetrics.USER32(00000001), ref: 1000DC20
                        • putchar.MSVCRT ref: 1000D857
                        • BlockInput.USER32(00000000), ref: 1000D85E
                        • putchar.MSVCRT ref: 1000D865
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$BlockInputMessageMetricsSendSystem$??2@CloseHandle
                        • String ID: FreeLibrary$KERNEL32.dll$Sleep$SystemParametersInfoA$USER32.dll
                        • API String ID: 156896458-2574534853
                        • Opcode ID: 6ad4caa4a72ea1d6fa06f2a6f772722edae5b10b5efbb9bca433753bfea0674e
                        • Instruction ID: 9b8b6079bdd9514dce4b362ff33d1f8dcbca8275ca3db87eaf026189e79874b8
                        • Opcode Fuzzy Hash: 6ad4caa4a72ea1d6fa06f2a6f772722edae5b10b5efbb9bca433753bfea0674e
                        • Instruction Fuzzy Hash: 44410F75A4030477FB00FBB44C97BAE3B19DF05790F1040B6FA46AB2C6DEB0E94586A1
                        APIs
                        • WSAStartup.WS2_32(00000202,?), ref: 10008B91
                        • socket.WS2_32(00000002,00000001,00000006), ref: 10008BA5
                        • htons.WS2_32 ref: 10008BDC
                        • bind.WS2_32(00000000,?,00000010), ref: 10008BF7
                        • listen.WS2_32(00000000,00000032), ref: 10008C0C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 10008C3A
                        • GetProcAddress.KERNEL32(00000000), ref: 10008C3D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10008C4D
                        • GetProcAddress.KERNEL32(00000000), ref: 10008C50
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 10008C60
                        • GetProcAddress.KERNEL32(00000000), ref: 10008C63
                        • accept.WS2_32(?,00000000,00000000), ref: 10008C70
                        • malloc.MSVCRT ref: 10008C7A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$Startupacceptbindhtonslistenmallocsocket
                        • String ID: CloseHandle$CreateThread$KERNEL32.dll$Sleep
                        • API String ID: 1509308642-2798766653
                        • Opcode ID: 15e2145d41a7add9d71eee42f20d10d4938fa1070dc30a732e1c175cd3c734a6
                        • Instruction ID: 4125dde44bd3390e512ed2e381dfb989099af83267bc925b9e993e18bda46321
                        • Opcode Fuzzy Hash: 15e2145d41a7add9d71eee42f20d10d4938fa1070dc30a732e1c175cd3c734a6
                        • Instruction Fuzzy Hash: 1B319070508755ABF310EFB48C49F5F7AA8FF88794F018919FA98D61D0E7B0CA448B66
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalAlloc), ref: 1000DA77
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DA80
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalLock), ref: 1000DA8E
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DA91
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalUnlock), ref: 1000DA9F
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DAA2
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalFree), ref: 1000DAB2
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DAB5
                        • OpenClipboard.USER32(00000000), ref: 1000DABD
                        • EmptyClipboard.USER32 ref: 1000DAC7
                        • SetClipboardData.USER32(00000001,00000000), ref: 1000DB00
                        • CloseClipboard.USER32 ref: 1000DB0B
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressClipboardLibraryLoadProc$CloseDataEmptyOpen
                        • String ID: GlobalAlloc$GlobalFree$GlobalLock$GlobalUnlock$KERNEL32.dll
                        • API String ID: 2000847274-4090894824
                        • Opcode ID: 3ff70bc2301f1554a66030d495e1fbbecccf5e42fa3a4837cd27f3c46f3aae26
                        • Instruction ID: c9a865e8cd7b53e8cd4289a10b273ef3ddf4e211ea81a58aee16677e223bf4c8
                        • Opcode Fuzzy Hash: 3ff70bc2301f1554a66030d495e1fbbecccf5e42fa3a4837cd27f3c46f3aae26
                        • Instruction Fuzzy Hash: DD115E71A003596BDA10FBF54C9DE5F7E98EB98391F420825FA0597241CBB4DC45CBE1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap,74DEF550,00000000,00000000), ref: 1000B343
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B34C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapAlloc), ref: 1000B35B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B35E
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapFree), ref: 1000B36D
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B370
                        • InitializeSecurityDescriptor.ADVAPI32(?,00000001), ref: 1000B39E
                        • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 1000B3BA
                        • GetLengthSid.ADVAPI32(?), ref: 1000B3C8
                        • InitializeAcl.ADVAPI32(00000000,-00000010,00000002), ref: 1000B3ED
                        • AddAccessAllowedAce.ADVAPI32(00000000,00000002,10000000,?), ref: 1000B403
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000), ref: 1000B415
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressInitializeLibraryLoadProc$DescriptorSecurity$AccessAllocateAllowedDaclLength
                        • String ID: GetProcessHeap$HeapAlloc$HeapFree$KERNEL32.dll
                        • API String ID: 3780998791-586349836
                        • Opcode ID: 2b66ffaed301d19206916c030586f629f48294263b9af774fc6458f294147ea6
                        • Instruction ID: 716716d67412bd084fb9c280a64a993127ef777e090402050d58248913f24711
                        • Opcode Fuzzy Hash: 2b66ffaed301d19206916c030586f629f48294263b9af774fc6458f294147ea6
                        • Instruction Fuzzy Hash: CE416F72D00658ABEB10DFE5DC88BEEBBB8FB48790F41812AF510A7241D7759940CB60
                        APIs
                        • LoadLibraryA.KERNEL32(-0000002C,-0000001C), ref: 10009F8E
                        • GetProcAddress.KERNEL32(00000000), ref: 10009F97
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10009FA6
                        • GetProcAddress.KERNEL32(00000000), ref: 10009FA9
                          • Part of subcall function 10009DD0: LoadLibraryA.KERNEL32(0000006B,00000047,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000,00000000), ref: 10009E7F
                          • Part of subcall function 10009DD0: GetProcAddress.KERNEL32(00000000), ref: 10009E88
                          • Part of subcall function 10009DD0: LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 10009E97
                          • Part of subcall function 10009DD0: GetProcAddress.KERNEL32(00000000), ref: 10009E9A
                          • Part of subcall function 10009DD0: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 10009EA9
                          • Part of subcall function 10009DD0: GetProcAddress.KERNEL32(00000000), ref: 10009EAC
                        • putchar.MSVCRT ref: 10009FBB
                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 10009FC9
                        • putchar.MSVCRT ref: 10009FD3
                        • OpenServiceA.ADVAPI32(00000000,10021994,00010000), ref: 10009FE3
                        • putchar.MSVCRT ref: 10009FED
                        • DeleteService.ADVAPI32(00000000), ref: 10009FF3
                        • putchar.MSVCRT ref: 10009FFB
                        • CloseServiceHandle.ADVAPI32(00000000), ref: 1000A007
                        • putchar.MSVCRT ref: 1000A00B
                        • CloseServiceHandle.ADVAPI32(00000000), ref: 1000A011
                          • Part of subcall function 100123D0: SetServiceStatus.ADVAPI32 ref: 10012417
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcServiceputchar$CloseHandleOpen$DeleteManagerStatus
                        • String ID: KERNEL32.dll$Sleep
                        • API String ID: 544756903-534790634
                        • Opcode ID: 2a729e18e16e4b2cf60ccc7317e82a5b4ee8861af1ca6a7b7ac013fc98a0c81e
                        • Instruction ID: 0262be125ec33654a992c1e2cfbf4862875b767276f555c09b7a97a68a00b18b
                        • Opcode Fuzzy Hash: 2a729e18e16e4b2cf60ccc7317e82a5b4ee8861af1ca6a7b7ac013fc98a0c81e
                        • Instruction Fuzzy Hash: 3F419251D04388A9EB02D7F88C49BDFBF745F26708F080095E2847B282D6FA5748C7B6
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalSize,?), ref: 1000DB3B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DB44
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalLock), ref: 1000DB52
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DB55
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalUnlock), ref: 1000DB63
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DB66
                        • OpenClipboard.USER32(00000000), ref: 1000DB6E
                        • GetClipboardData.USER32(00000001), ref: 1000DB7A
                        • CloseClipboard.USER32 ref: 1000DB8A
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000DBA4
                        • CloseClipboard.USER32 ref: 1000DBCF
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000DBE1
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Clipboard$AddressLibraryLoadProc$Close$??2@??3@DataOpen
                        • String ID: GlobalLock$GlobalSize$GlobalUnlock$KERNEL32.dll
                        • API String ID: 2000242716-1635939564
                        • Opcode ID: 2469a16e857213a7a9021555622aba351584a6e765ed68a6edf5fdd561724a3e
                        • Instruction ID: 2c40b5e421004fdc6d255f506f72f375f8688b869bf4a442a4c8cfd91467e81f
                        • Opcode Fuzzy Hash: 2469a16e857213a7a9021555622aba351584a6e765ed68a6edf5fdd561724a3e
                        • Instruction Fuzzy Hash: 8411E4359002586BD700FBB59C49E9F7F98EF88390F410825FE058B201DBB9E949CBE1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 100030F9
                        • GetProcAddress.KERNEL32(00000000), ref: 10003102
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 10003112
                        • GetProcAddress.KERNEL32(00000000), ref: 10003115
                        • LoadLibraryA.KERNEL32(kernel32.dll,CreateThread), ref: 10003123
                        • GetProcAddress.KERNEL32(00000000), ref: 10003126
                          • Part of subcall function 10002E90: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,00000F9F,?,00000000,00000001,000000FF,?,759A3A20), ref: 10002EA6
                          • Part of subcall function 10002E90: GetProcAddress.KERNEL32(00000000), ref: 10002EAF
                          • Part of subcall function 10002E90: LoadLibraryA.KERNEL32(KERNEL32.dll,GetLocalTime,?,759A3A20), ref: 10002EBD
                          • Part of subcall function 10002E90: GetProcAddress.KERNEL32(00000000), ref: 10002EC0
                          • Part of subcall function 10002E90: rand.MSVCRT ref: 10002EDB
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$rand
                        • String ID: CloseHandle$CreateThread$KERNEL32.dll$Sleep$d$kernel32.dll
                        • API String ID: 237380613-3775327080
                        • Opcode ID: 4ae96b5764063fe0fd30d144a8f4fd4bbf111a2133cf967454821b8ec0adf22c
                        • Instruction ID: 2c3cc2a0dc10f2036430107a63b00fdf6efc69e616e14cc6763cf80ca043e02f
                        • Opcode Fuzzy Hash: 4ae96b5764063fe0fd30d144a8f4fd4bbf111a2133cf967454821b8ec0adf22c
                        • Instruction Fuzzy Hash: 98B1173094464166F721EF648C85FDBB7ADDBC57C1F158439FE08AB189EBB09882C365
                        APIs
                        • LookupAccountNameA.ADVAPI32(00000000,?,?,?,?,?,?), ref: 10004532
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AccountLookupName
                        • String ID: ConvertSidToStringSidA$FreeLibrary$KERNEL32.dll$L$_RasDefaultCredentials#0$advapi32.dll
                        • API String ID: 1484870144-1900776057
                        • Opcode ID: f4436920d8739c802f0b0165078cfe62e793e6c88f8d7dd36c7eb4dd5dc74a5d
                        • Instruction ID: 63d1c341f1a6a9e55507f5f3d5112503c43b0a296a8d903421dce52d3c7f6920
                        • Opcode Fuzzy Hash: f4436920d8739c802f0b0165078cfe62e793e6c88f8d7dd36c7eb4dd5dc74a5d
                        • Instruction Fuzzy Hash: AB31D5B3E00109AFEB00DAF8DC499FEBB78EB45216F1141A5FA18D2100F6709A414B90
                        APIs
                          • Part of subcall function 10010410: LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentThreadId,00007F86,00000002,?,0000000F), ref: 1001042A
                          • Part of subcall function 10010410: GetProcAddress.KERNEL32(00000000), ref: 10010433
                          • Part of subcall function 10010410: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA,?,0000000F), ref: 10010441
                          • Part of subcall function 10010410: GetProcAddress.KERNEL32(00000000), ref: 10010444
                          • Part of subcall function 10010410: GetThreadDesktop.USER32(00000000), ref: 10010453
                          • Part of subcall function 10010410: GetUserObjectInformationA.USER32(00000000,00000002,?,00000100,?), ref: 1001047A
                          • Part of subcall function 10010410: OpenInputDesktop.USER32(00000000,00000000,02000000), ref: 10010489
                          • Part of subcall function 10010410: GetUserObjectInformationA.USER32(00000000,00000002,?,00000100,?), ref: 100104B6
                          • Part of subcall function 10010410: SetThreadDesktop.USER32(00000000), ref: 100104D0
                          • Part of subcall function 10010410: CloseDesktop.USER32(00000000), ref: 100104E8
                          • Part of subcall function 10010410: CloseDesktop.USER32(00000000), ref: 100104EB
                        • SetCursorPos.USER32(?,?,?,?,759A3A20,?,1000D3DC,?,?,00000000), ref: 1000D8E8
                        • WindowFromPoint.USER32(?,?,?,?,759A3A20,?,1000D3DC,?,?,00000000), ref: 1000D8F0
                        • SetCapture.USER32(00000000,?,?,759A3A20,?,1000D3DC,?,?,00000000), ref: 1000D8F7
                        • MapVirtualKeyA.USER32(?,00000000), ref: 1000D936
                        • keybd_event.USER32(?,00000000), ref: 1000D940
                        • MapVirtualKeyA.USER32(?,00000000), ref: 1000D954
                        • keybd_event.USER32(00000000,00000000), ref: 1000D95E
                        • mouse_event.USER32(00000008,00000000,00000000,00000000,00000000), ref: 1000DA1A
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Desktop$AddressCloseInformationLibraryLoadObjectProcThreadUserVirtualkeybd_event$CaptureCursorFromInputOpenPointWindowmouse_event
                        • String ID:
                        • API String ID: 3772272885-0
                        • Opcode ID: f31e4980b49609c19f8d259eeab3a1ea214579d002136fe734e92ed7db10b075
                        • Instruction ID: 695d3e637a6625c8d95e1edfa3f51b4f769b28b513739f17560300035964d10d
                        • Opcode Fuzzy Hash: f31e4980b49609c19f8d259eeab3a1ea214579d002136fe734e92ed7db10b075
                        • Instruction Fuzzy Hash: 6E4137357C8714BAF270EA148C8BF0E6665EB46F91F318116B741BE1C9C6E0B840866E
                        APIs
                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,00000000,10013BE0), ref: 1001284B
                        • OpenServiceA.ADVAPI32(00000000,Defghi Klmnopqr Tuv,000F003F), ref: 1001285E
                        • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 1001286B
                        • CloseServiceHandle.ADVAPI32(00000000), ref: 10012878
                        • CloseServiceHandle.ADVAPI32(00000000), ref: 1001287B
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Service$CloseHandleOpen$ManagerStart
                        • String ID: Defghi Klmnopqr Tuv
                        • API String ID: 1485051382-1553144822
                        • Opcode ID: 07d0b6ac0352781bcf5aedf1783fa255a29000363869a2130161e43ca6bfe717
                        • Instruction ID: 7c8c28317631a892ccae3cb9f3ad782f9acbea9ad03f54a2e51300a147e659e8
                        • Opcode Fuzzy Hash: 07d0b6ac0352781bcf5aedf1783fa255a29000363869a2130161e43ca6bfe717
                        • Instruction Fuzzy Hash: EFE08C31B4063076F23213205C4AF7F2A28DB89BA1F014011FB08AB191CBB4A80286A4
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: bindsocket
                        • String ID:
                        • API String ID: 3370621091-0
                        • Opcode ID: d28e690bdc8995af4fabef8027ee3d2d544ab97fc7e8e45e03914b4ec68bb13a
                        • Instruction ID: d4360f446b917810da476e3f6c71a0b085145997d18cc9d9d8610bddb3e71e98
                        • Opcode Fuzzy Hash: d28e690bdc8995af4fabef8027ee3d2d544ab97fc7e8e45e03914b4ec68bb13a
                        • Instruction Fuzzy Hash: 5F115BB45183119FE310DF34C8456EABBE4FF88358F104A1DF8A887290E3B5CA498786
                        APIs
                        • OpenEventLogA.ADVAPI32(00000000,00000000), ref: 10007CEC
                        • ClearEventLogA.ADVAPI32(00000000,00000000), ref: 10007CF7
                        • CloseEventLog.ADVAPI32(00000000), ref: 10007CFA
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Event$ClearCloseOpen
                        • String ID:
                        • API String ID: 1391105993-0
                        • Opcode ID: c8afc56110dd994f6ff4c4734ac5378e0b78bcf5eeb4072a54122cd077cc3d0b
                        • Instruction ID: 06b062639a110f58ed29294ee31d584de853a6ec7bde239c03a7ad79dcacc76d
                        • Opcode Fuzzy Hash: c8afc56110dd994f6ff4c4734ac5378e0b78bcf5eeb4072a54122cd077cc3d0b
                        • Instruction Fuzzy Hash: FAF090729057969BE301DF19CC80B5FB7E8FF89790F800819F95897201D375EA488BE6
                        APIs
                          • Part of subcall function 10012880: LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcess,SeBackupPrivilege,00000000,10012B0F,?,00000000), ref: 1001288D
                          • Part of subcall function 10012880: GetProcAddress.KERNEL32(00000000), ref: 10012894
                          • Part of subcall function 10012880: OpenProcessToken.ADVAPI32(00000000), ref: 100128A4
                          • Part of subcall function 10012880: LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 100128BA
                          • Part of subcall function 10012880: AdjustTokenPrivileges.KERNELBASE ref: 100128E2
                        • ExitWindowsEx.USER32(?,00000000), ref: 1000FC74
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Token$AddressAdjustExitLibraryLoadLookupOpenPrivilegePrivilegesProcProcessValueWindows
                        • String ID: SeShutdownPrivilege
                        • API String ID: 3486065554-3733053543
                        • Opcode ID: d29426ac21ccbf943f2681ff852f25768a9844f2817af6d28e7b733b2c678845
                        • Instruction ID: cbf899481f97910c45cb271d2e27911eb5c2bab2f9267109b4f558aa023dfea1
                        • Opcode Fuzzy Hash: d29426ac21ccbf943f2681ff852f25768a9844f2817af6d28e7b733b2c678845
                        • Instruction Fuzzy Hash: E0C04CB964224166E508D7A49C4AB4E2794DF40215F544414F2065E151CF70F4F14696
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0d84038d72caf36951c6516e1e0e5918cec0db22baef301d42896c469ee17af7
                        • Instruction ID: 117220d2012d4bc768d084c5d665ca088f1dff2429244483f8636a97343cfec1
                        • Opcode Fuzzy Hash: 0d84038d72caf36951c6516e1e0e5918cec0db22baef301d42896c469ee17af7
                        • Instruction Fuzzy Hash: A7125DB16047018FCB18CF18C89061ABBE6EFC8345F19896DE8898F345E771ED85CB92
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b11c8727f0c496123dc0552e79f30946247db19b8e0afa6f08d2d971995b05b6
                        • Instruction ID: 4187a8b04745b0ab28ef7ede7d094a956c8934476da4544b8478441ba4182e22
                        • Opcode Fuzzy Hash: b11c8727f0c496123dc0552e79f30946247db19b8e0afa6f08d2d971995b05b6
                        • Instruction Fuzzy Hash: A1125DB16047018FCB18CF18C89061ABBE6EFC8345F19896DE8898F345E771ED85CB92
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4ab196346d0f053a56384bae9ea37f3e937421f452ae0922e95657428d371cad
                        • Instruction ID: 849199beda9fe094a49890b0357de00291be1f14056441a12e8ebe570b9b3b5b
                        • Opcode Fuzzy Hash: 4ab196346d0f053a56384bae9ea37f3e937421f452ae0922e95657428d371cad
                        • Instruction Fuzzy Hash: 95125AB46087028FC748CF29D594A2ABBE1FF88344F158A6DE49ACB751D730EA84CF55
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d4bfdb248b3fb90f8076a3fe4a1e75f7bd1b50aa5aafde52d762773f77742459
                        • Instruction ID: 19c8c9074de5aa69a72cb5a3fcf7e8e11b5c1ec9fb89d87ae78a42d7808ac813
                        • Opcode Fuzzy Hash: d4bfdb248b3fb90f8076a3fe4a1e75f7bd1b50aa5aafde52d762773f77742459
                        • Instruction Fuzzy Hash: E7F157725092818FC309CF18D5989E27BF2FFA8754B1F42F9D4499B362D7329881CB91
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7694162bbfb81049d34c3ec2b9e13a2cddc93bd40030f040e3135020b371e923
                        • Instruction ID: 7e00266b4d6c9f4ed740236fd39e643466e7fc1ca2aa4a4d2ad145e973699d2c
                        • Opcode Fuzzy Hash: 7694162bbfb81049d34c3ec2b9e13a2cddc93bd40030f040e3135020b371e923
                        • Instruction Fuzzy Hash: B3E1C5B5600A018FD364CF19D490A16FBF2FF89350B26C96ED59ACB761DB31E886CB50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 890127fe03c1bd481bdefa867e35c355958bead73a8a285b27216c8af7807d6b
                        • Instruction ID: d45cd007c19494e92443cb717c3a92bb8156b5a9d5720aa7591a7596a54818a8
                        • Opcode Fuzzy Hash: 890127fe03c1bd481bdefa867e35c355958bead73a8a285b27216c8af7807d6b
                        • Instruction Fuzzy Hash: 3CD1D27560C3928FCB18CF2CD4A015ABBE1EB89310F198A6DE9DA97742C730EC55CB95
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 34fc56108cac03c9342ac3ccbf2986361fbeb5314c93a934623e58a53aee11db
                        • Instruction ID: 0aeeec72e7b8eccba9cc468352bc859199a1a2a68b478950591a78e87907b8f7
                        • Opcode Fuzzy Hash: 34fc56108cac03c9342ac3ccbf2986361fbeb5314c93a934623e58a53aee11db
                        • Instruction Fuzzy Hash: E2D16A756082518FC319CF28E9D88E67BE1FFA8740B0E42F8D9499B323D7329985CB55
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0b4f27dd10139f30faea009d98bf7d04ad43b169fe1efa635cf320682f8d45aa
                        • Instruction ID: c65a7e21cce1bce0c7be3485d4773abb4e917ff3527ca89969779d05b94a938e
                        • Opcode Fuzzy Hash: 0b4f27dd10139f30faea009d98bf7d04ad43b169fe1efa635cf320682f8d45aa
                        • Instruction Fuzzy Hash: 8731633374958203F71DCA2F8CA12BAEBD34FC911872ED57E99C58B356ECB984578144

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043,?,?,?), ref: 1000B90D
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B914
                        • LoadLibraryA.KERNEL32(0000006B,00000047,?,?,?), ref: 1000B9CA
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B9D3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileSize,?,?,?), ref: 1000B9E1
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B9E4
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA,?,?,?), ref: 1000B9F3
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B9F6
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,?,?,?), ref: 1000BA05
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BA08
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ReadFile,?,?,?), ref: 1000BA5F
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BA62
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000BA84
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000BABB
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@??3@
                        • String ID: .$.$2$2$3$3$A$A$C$CloseHandle$D$F$G$GetFileSize$KERNEL32.dll$ReadFile$S$\syslog.dat$a$c$d$d$i$i$k$k$l$lstrcatA$m$n$n$o$r$r$r$s$t
                        • API String ID: 2249131349-359626717
                        • Opcode ID: 4733201cbe0f2bbfe68d5d8c59d910bc1d2cf76b7517bcd444ba0c7cb14f1294
                        • Instruction ID: c3753f9be564234374bb9c7df3f3830cc0d6c354f57712a3cfc289ca5a5c4f37
                        • Opcode Fuzzy Hash: 4733201cbe0f2bbfe68d5d8c59d910bc1d2cf76b7517bcd444ba0c7cb14f1294
                        • Instruction Fuzzy Hash: A181B561D082CCDEEB12DBF89C487DEBFB59F26304F180099E584BB242D6B94649C776
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 1001072A
                        • GetProcAddress.KERNEL32(00000000), ref: 10010731
                        • LoadLibraryA.KERNEL32(0000006B,00000057), ref: 100107C1
                        • GetProcAddress.KERNEL32(00000000), ref: 100107C4
                        • LoadLibraryA.KERNEL32(WININET.dll), ref: 100107E5
                        • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 10010807
                        • GetProcAddress.KERNEL32(?,InternetOpenUrlA), ref: 1001085A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: .$.$2$2$3$3$A$C$CloseHandle$F$F$FreeLibrary$InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$KERNEL32.dll$Mozilla/4.0 (compatible)$W$WININET.dll$a$d$d$i$k$k$l$l$n$n$r$r$r$r$t$t
                        • API String ID: 2238633743-2195871832
                        • Opcode ID: fb7490f8328fd0eeafc5ad8e0a84fc214b2166a01aa151e33077b620e08e9f29
                        • Instruction ID: 064ae0b22e2dc2fc89c4f03eb4b3a95ce2c70a5a763ee6d1ff4b7896122789de
                        • Opcode Fuzzy Hash: fb7490f8328fd0eeafc5ad8e0a84fc214b2166a01aa151e33077b620e08e9f29
                        • Instruction Fuzzy Hash: 05B1D2B2D00288EEEB02DBF4D848BEDBF75EF26314F144195E584EB242D7B88A45C765
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1000F90C
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F915
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalReAlloc), ref: 1000F924
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F927
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000F936
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F939
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize), ref: 1000F948
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F94B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot), ref: 1000F95A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F95D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First), ref: 1000F96B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F96E
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next), ref: 1000F97D
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F980
                        • putchar.MSVCRT ref: 1000F9BB
                          • Part of subcall function 10012880: LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcess,SeBackupPrivilege,00000000,10012B0F,?,00000000), ref: 1001288D
                          • Part of subcall function 10012880: GetProcAddress.KERNEL32(00000000), ref: 10012894
                          • Part of subcall function 10012880: OpenProcessToken.ADVAPI32(00000000), ref: 100128A4
                          • Part of subcall function 10012880: LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 100128BA
                          • Part of subcall function 10012880: AdjustTokenPrivileges.KERNELBASE ref: 100128E2
                        • putchar.MSVCRT ref: 1000F9C9
                        • putchar.MSVCRT ref: 1000F9DB
                        • LoadLibraryA.KERNEL32(PSAPI.dll), ref: 1000FA14
                        • putchar.MSVCRT ref: 1000FA2F
                        • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 1000FA41
                        • putchar.MSVCRT ref: 1000FA56
                        • putchar.MSVCRT ref: 1000FA6B
                        • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 1000FA7D
                        • putchar.MSVCRT ref: 1000FA98
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,OpenProcess), ref: 1000FAC3
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FAC6
                        • putchar.MSVCRT ref: 1000FAD0
                        • putchar.MSVCRT ref: 1000FAE9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000FB18
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$putchar$Token$AdjustLookupOpenPrivilegePrivilegesProcessValue
                        • String ID: CloseHandle$CreateToolhelp32Snapshot$EnumProcessModules$GetModuleFileNameExA$KERNEL32.dll$LocalAlloc$LocalReAlloc$LocalSize$OpenProcess$PSAPI.dll$Process32First$Process32Next$SeDebugPrivilege$lstrlenA
                        • API String ID: 1282036386-4294572421
                        • Opcode ID: 068ed740d02c226bf235d4334da4d22a11befcd8c803ff75e0a926c38fff2103
                        • Instruction ID: ed7dc757445082031164c41d5dad267c06107d1a5756ef0b0c6a9ce41469ecf1
                        • Opcode Fuzzy Hash: 068ed740d02c226bf235d4334da4d22a11befcd8c803ff75e0a926c38fff2103
                        • Instruction Fuzzy Hash: 6FA17FB1D00219ABEB11EBF4CC49AEFBBB9FF88344F114465E605AB240DB74DA448B91
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1000A659
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A662
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileSize), ref: 1000A671
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A674
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetFilePointer), ref: 1000A683
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A686
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 1000A709
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A710
                        • LoadLibraryA.KERNEL32(0000006B,00000057), ref: 1000A79A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A7A1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000A800
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A807
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000A824
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000A888
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@??3@
                        • String ID: .$.$2$2$3$3$A$C$CloseHandle$F$F$GetFileSize$KERNEL32.dll$SetFilePointer$W$a$d$d$i$k$k$l$l$lstrlenA$n$n$r$r$r$r$t$t
                        • API String ID: 2249131349-203027907
                        • Opcode ID: dab8b113ad70751e6eae44383678542ae7b1d57ddab95ac8afc5088dab92d69f
                        • Instruction ID: fe699898880f01a8b36b717f387e2983543c0f7d2eada66655982565652e3611
                        • Opcode Fuzzy Hash: dab8b113ad70751e6eae44383678542ae7b1d57ddab95ac8afc5088dab92d69f
                        • Instruction Fuzzy Hash: AD816262C042C8EEEB12DBF8D848BDDBF75EF26204F184189E584BB242D7B98645C775
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10001222
                        • GetProcAddress.KERNEL32(00000000), ref: 1000122B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,TerminateThread), ref: 1000123A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000123D
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 1000124C
                        • GetProcAddress.KERNEL32(00000000), ref: 1000124F
                        • puts.MSVCRT ref: 10001263
                        • GetProcAddress.KERNEL32(00000000,waveInReset), ref: 10001277
                        • Sleep.KERNEL32(00000000), ref: 1000128C
                        • puts.MSVCRT ref: 100012A1
                        • GetProcAddress.KERNEL32(00000000,waveInStop), ref: 100012B6
                        • Sleep.KERNEL32(00000000), ref: 100012CB
                        • puts.MSVCRT ref: 100012E0
                        • GetProcAddress.KERNEL32(00000000,waveInClose), ref: 100012F5
                        • Sleep.KERNEL32(00000000), ref: 1000130A
                        • puts.MSVCRT ref: 1000131F
                        • GetProcAddress.KERNEL32(00000000,waveInUnprepareHeader), ref: 10001333
                        • Sleep.KERNEL32(00000000), ref: 10001348
                        • puts.MSVCRT ref: 1000135D
                        • GetProcAddress.KERNEL32(00000000,waveOutReset), ref: 10001372
                        • Sleep.KERNEL32(00000000), ref: 10001387
                        • puts.MSVCRT ref: 1000139C
                        • GetProcAddress.KERNEL32(00000000,waveOutClose), ref: 100013B1
                        • Sleep.KERNEL32(00000000), ref: 100013C6
                        • puts.MSVCRT ref: 100013DB
                        • GetProcAddress.KERNEL32(00000000,waveOutUnprepareHeader), ref: 100013EF
                        • Sleep.KERNEL32(00000000), ref: 10001404
                        • ??3@YAXPAX@Z.MSVCRT ref: 10001487
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000148F
                        • ??3@YAXPAX@Z.MSVCRT ref: 10001498
                        • ??3@YAXPAX@Z.MSVCRT ref: 100014A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$Sleepputs$??3@$LibraryLoad
                        • String ID: CloseHandle$FreeLibrary$KERNEL32.dll$TerminateThread$kernel32.dll$waveInClose$waveInReset$waveInStop$waveInUnprepareHeader$waveOutClose$waveOutReset$waveOutUnprepareHeader
                        • API String ID: 1917019950-2982369931
                        • Opcode ID: 2dce0038590a55a4bda78d1a9dc3e1e9df238cbd6436296f17952de03bbe60e5
                        • Instruction ID: 26c20586eb7f091ceae6726055cc1af642dfef8f9a2f5fd2405fdc4243d67d6e
                        • Opcode Fuzzy Hash: 2dce0038590a55a4bda78d1a9dc3e1e9df238cbd6436296f17952de03bbe60e5
                        • Instruction Fuzzy Hash: 8581D1B2800609AFE711EBB4CC8CAAE7B7AFF4D325B154604FA42D7215DB74E9818B50
                        APIs
                        • LoadLibraryA.KERNEL32(user32.dll), ref: 1000AACA
                        • GetProcAddress.KERNEL32(?,ImmGetContext), ref: 1000AAF4
                        • GetProcAddress.KERNEL32(?,ImmGetCompositionStringA), ref: 1000AB1D
                        • GetProcAddress.KERNEL32(?,00000049), ref: 1000AB8A
                        • GetProcAddress.KERNEL32(?,00000043), ref: 1000ABEE
                        • GetProcAddress.KERNEL32(?,00000047), ref: 1000AC78
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 1000AC95
                        • GetProcAddress.KERNEL32(00000000), ref: 1000AC9C
                        • putchar.MSVCRT ref: 1000ADBD
                          • Part of subcall function 1000A8A0: GetProcAddress.KERNEL32(?,GetActiveWindow), ref: 1000A904
                          • Part of subcall function 1000A8A0: GetProcAddress.KERNEL32(?,GetWindowTextA), ref: 1000A93D
                          • Part of subcall function 1000A8A0: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 1000A960
                          • Part of subcall function 1000A8A0: GetProcAddress.KERNEL32(00000000), ref: 1000A969
                          • Part of subcall function 1000A8A0: LoadLibraryA.KERNEL32(KERNEL32.dll,GetLocalTime), ref: 1000A98A
                          • Part of subcall function 1000A8A0: GetProcAddress.KERNEL32(00000000), ref: 1000A98D
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad$putchar
                        • String ID: A$C$C$E$G$H$I$ImmGetCompositionStringA$ImmGetContext$K$KERNEL32.dll$N$N$R$T$[$a$a$a$e$k$l$lstrcatA$m$n$o$s$t$user32.dll$x$x$y
                        • API String ID: 4073541567-400313278
                        • Opcode ID: d8f000c34229ee0795fb54f437139a4d4c6ea5dfa880a379e5fefd71b1a0383e
                        • Instruction ID: 9329f6329972e31b170709e223eb3470df1ceecf52300e58e40714d78a339caa
                        • Opcode Fuzzy Hash: d8f000c34229ee0795fb54f437139a4d4c6ea5dfa880a379e5fefd71b1a0383e
                        • Instruction Fuzzy Hash: 0DB1D371C04288DFEB01CBB8D888BDEBFB1EF26315F188159E545AB342D7B88945CB65
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000499C
                        • GetProcAddress.KERNEL32(00000000), ref: 100049A5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetPrivateProfileSectionNamesA), ref: 100049B5
                        • GetProcAddress.KERNEL32(00000000), ref: 100049B8
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 100049C8
                        • GetProcAddress.KERNEL32(00000000), ref: 100049CB
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 100049D9
                        • GetProcAddress.KERNEL32(00000000), ref: 100049DC
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetWindowsDirectoryA), ref: 100049EC
                        • GetProcAddress.KERNEL32(00000000), ref: 100049EF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpA), ref: 100049FF
                        • GetProcAddress.KERNEL32(00000000), ref: 10004A02
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetPrivateProfileStringA), ref: 10004A12
                        • GetProcAddress.KERNEL32(00000000), ref: 10004A15
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetVersionExA), ref: 10004A25
                        • GetProcAddress.KERNEL32(00000000), ref: 10004A28
                        • strchr.MSVCRT ref: 10004A4C
                        • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000023,00000000), ref: 10004A86
                        • wsprintfA.USER32 ref: 10004AA6
                        • ??2@YAPAXI@Z.MSVCRT ref: 10004AF4
                        • ??3@YAXPAX@Z.MSVCRT ref: 10004CAD
                        • ??3@YAXPAX@Z.MSVCRT ref: 10004CB3
                        • ??3@YAXPAX@Z.MSVCRT ref: 10004CB9
                        • ??3@YAXPAX@Z.MSVCRT ref: 10004CF3
                          • Part of subcall function 100048A0: wsprintfA.USER32 ref: 1000490C
                          • Part of subcall function 100048A0: LsaFreeMemory.ADVAPI32(?), ref: 1000493A
                          • Part of subcall function 100048A0: LsaFreeMemory.ADVAPI32(?), ref: 10004964
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??3@$FreeMemorywsprintf$??2@FolderPathSpecialstrchr
                        • String ID: %s\%s$Device$DialParamsUID$Documents and Settings\$GetPrivateProfileSectionNamesA$GetPrivateProfileStringA$GetVersionExA$GetWindowsDirectoryA$KERNEL32.dll$Microsoft\Network\Connections\pbk\rasphone.pbk$PhoneNumber$\Application Data\Microsoft\Network\Connections\pbk\rasphone.pbk$lstrcatA$lstrcmpA$lstrcpyA$lstrlenA
                        • API String ID: 2638624708-985675920
                        • Opcode ID: beace84667f98d00e8a91dfd5db565bbfa341decb6f359f0c3c61f455fbb9585
                        • Instruction ID: 20e6396873381d7c0e0433becb7a9987db1ab73e03b2a8fddb770d20359ecc82
                        • Opcode Fuzzy Hash: beace84667f98d00e8a91dfd5db565bbfa341decb6f359f0c3c61f455fbb9585
                        • Instruction Fuzzy Hash: 64917CB1504385AFE720DB64CC84F9FB7E9EFC8344F01492DB68997240DB74E9458B66
                        APIs
                          • Part of subcall function 1000BAE0: LoadLibraryA.KERNEL32(0000006B,00000043,74DEF550,?,02062143), ref: 1000BB74
                          • Part of subcall function 1000BAE0: GetProcAddress.KERNEL32(00000000), ref: 1000BB7B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,?), ref: 1000EC3A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000EC43
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetStartupInfoA), ref: 1000EC52
                        • GetProcAddress.KERNEL32(00000000), ref: 1000EC55
                        • LoadLibraryA.KERNEL32(0000006B,00000047), ref: 1000ECF6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000ECFD
                        • LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1000ED15
                        • GetProcAddress.KERNEL32(?,CreatePipe), ref: 1000EDB7
                        • putchar.MSVCRT ref: 1000EE5A
                        • putchar.MSVCRT ref: 1000EE6B
                        • putchar.MSVCRT ref: 1000EE9C
                        • putchar.MSVCRT ref: 1000EEB2
                        • putchar.MSVCRT ref: 1000EEE6
                        • GetProcAddress.KERNEL32(?,CreateProcessA), ref: 1000EEF6
                        • putchar.MSVCRT ref: 1000EF32
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProcputchar$LibraryLoad
                        • String ID: .$2$3$A$CloseHandle$CreatePipe$CreateProcessA$D$D$G$GetStartupInfoA$KERNEL32.dll$Kernel32.dll$S$\cmd.exe$c$d$i$k$m$n$o$r$s
                        • API String ID: 1002352977-1435807317
                        • Opcode ID: 004a8128b56c0a7b52f536146c59eb240084d3426222fa010a4b01d9e2f4754e
                        • Instruction ID: 6b6c853a8edd7db5b04c1d145f315ee90d9778b60e687b4d3239c5aa7e7c3961
                        • Opcode Fuzzy Hash: 004a8128b56c0a7b52f536146c59eb240084d3426222fa010a4b01d9e2f4754e
                        • Instruction Fuzzy Hash: 33D19C71D003989FEB11CFA8CC84BDEBBB5EF19300F14416AE505AB385DBB4AA44CB65
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000052), ref: 10005D51
                        • GetProcAddress.KERNEL32(00000000), ref: 10005D58
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindFirstFileA), ref: 10005D7B
                        • GetProcAddress.KERNEL32(00000000), ref: 10005D84
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindNextFileA), ref: 10005D93
                        • GetProcAddress.KERNEL32(00000000), ref: 10005D96
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindClose), ref: 10005DA5
                        • GetProcAddress.KERNEL32(00000000), ref: 10005DA8
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 10005DB7
                        • GetProcAddress.KERNEL32(00000000), ref: 10005DBA
                        • wsprintfA.USER32 ref: 10005E0E
                        • wsprintfA.USER32 ref: 10005E5C
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$wsprintf
                        • String ID: %s\$%s\$%s\%s$.$.$.$2$3$A$D$DeleteFileA$FindClose$FindFirstFileA$FindNextFileA$KERNEL32.dll$R$c$d$i$k$m$n$r$t$v$y
                        • API String ID: 2290142023-2069858983
                        • Opcode ID: 7029d3975995faa2dcd8a658e12b7de61dfae0326ac39237c9215672ac86e5ad
                        • Instruction ID: e421bdb628c906eaad545b3452baa4c9121083f3eafd901147b42c9b123696e0
                        • Opcode Fuzzy Hash: 7029d3975995faa2dcd8a658e12b7de61dfae0326ac39237c9215672ac86e5ad
                        • Instruction Fuzzy Hash: 0561A471C042C8AEEB11DBF8DC48AEEBF79EF26214F044589E544A7242D7B94B44C775
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 10006A5C
                        • GetProcAddress.KERNEL32(00000000), ref: 10006A65
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetFilePointer), ref: 10006A74
                        • GetProcAddress.KERNEL32(00000000), ref: 10006A77
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 10006AFA
                        • GetProcAddress.KERNEL32(00000000), ref: 10006B01
                        • LoadLibraryA.KERNEL32(0000006B,00000057), ref: 10006B8B
                        • GetProcAddress.KERNEL32(00000000), ref: 10006B92
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .$.$2$2$3$3$A$C$CloseHandle$F$F$KERNEL32.dll$SetFilePointer$W$a$d$d$i$k$k$l$l$n$n$p$r$r$r$r$t$t
                        • API String ID: 2574300362-369838978
                        • Opcode ID: 416ee21cdec2a33fad3c0efd519d7c9f1643e93d97ac3961679d5668f6e05687
                        • Instruction ID: 1e4161e908d3f57539f6daf96cfd781ace7ba9dabb0536a5f1e30b0409eac641
                        • Opcode Fuzzy Hash: 416ee21cdec2a33fad3c0efd519d7c9f1643e93d97ac3961679d5668f6e05687
                        • Instruction Fuzzy Hash: 76614F71C082C8EEEB12CBE8D848BDDBF75AF26304F184189E5846B382C3B95609C775
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000047,74DEF550,74DF0BD0,00000001), ref: 1000B5A6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B5AD
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 1000B5D0
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B5D9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 1000B5E7
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B5EA
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateFileMappingA,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000,00000000,?,?,?,?,?,?,?,00000000,10019D88,000000FF), ref: 1000B08E
                          • Part of subcall function 1000B060: GetProcAddress.KERNEL32(00000000), ref: 1000B097
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(KERNEL32.dll,MapViewOfFile,?,?,?,?,?,?,?,00000000,10019D88,000000FF,?,10013AFB), ref: 1000B0A6
                          • Part of subcall function 1000B060: GetProcAddress.KERNEL32(00000000), ref: 1000B0A9
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(user32.dll,?,?,?,?,?,?,?,00000000,10019D88,000000FF,?,10013AFB), ref: 1000B0BC
                          • Part of subcall function 1000B060: putchar.MSVCRT ref: 1000B107
                          • Part of subcall function 1000B060: putchar.MSVCRT ref: 1000B147
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B17E
                          • Part of subcall function 1000B060: GetProcAddress.KERNEL32(00000000), ref: 1000B187
                        • putchar.MSVCRT ref: 1000B68E
                        • GetProcAddress.KERNEL32(?,SetWindowsHookExA), ref: 1000B6A9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileAttributesA), ref: 1000B6B8
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B6BF
                        • putchar.MSVCRT ref: 1000B6D0
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$putchar
                        • String ID: .$2$3$A$D$G$GetFileAttributesA$GetTickCount$K$KERNEL32.dll$S$SetWindowsHookExA$\syslog.dat$c$d$i$k$lstrcatA$m$n$o$r$s
                        • API String ID: 3860417020-2219908216
                        • Opcode ID: c0506df1eb36be90c60e9df97dfc9f6a4b71a08f2c0bb025c8629eea346a2b82
                        • Instruction ID: 7bb24e255123807198f3e59c8143dc0489b4576930567646d8ce909a54256b0a
                        • Opcode Fuzzy Hash: c0506df1eb36be90c60e9df97dfc9f6a4b71a08f2c0bb025c8629eea346a2b82
                        • Instruction Fuzzy Hash: C4613576C08388DEEB01CBB8CC88BDEBF75EB2A354F184185D544A7342C3B58A45C7A5
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 10005ECC
                        • GetProcAddress.KERNEL32(00000000), ref: 10005ED5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree), ref: 10005EE4
                        • GetProcAddress.KERNEL32(00000000), ref: 10005EE7
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileSize), ref: 10005EF6
                        • GetProcAddress.KERNEL32(00000000), ref: 10005EF9
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 10005F08
                        • GetProcAddress.KERNEL32(00000000), ref: 10005F0B
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 10005F8E
                        • GetProcAddress.KERNEL32(00000000), ref: 10005F95
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 10005FB2
                        • GetProcAddress.KERNEL32(00000000), ref: 10005FB9
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .$2$3$A$C$CloseHandle$F$GetFileSize$KERNEL32.dll$LocalAlloc$LocalFree$a$d$i$k$kernel32.dll$l$lstrlenA$n$r$r$t
                        • API String ID: 2574300362-3506522646
                        • Opcode ID: 814e71e19dab9cc40bcb0da0327889806179cb21502255d82f6457ca8b94e039
                        • Instruction ID: 5e49c3b4e0a519e3fe84e3198b03eddbfbe54d7449a10c0bbcd858f2b94fc8ff
                        • Opcode Fuzzy Hash: 814e71e19dab9cc40bcb0da0327889806179cb21502255d82f6457ca8b94e039
                        • Instruction Fuzzy Hash: 5C519171D04288AEDB01DBF8DC48AEEBFB6EF59310F044159EA45AB381C7B98A44C775
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 100060BC
                        • GetProcAddress.KERNEL32(00000000), ref: 100060C5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetFilePointer), ref: 100060D4
                        • GetProcAddress.KERNEL32(00000000), ref: 100060D7
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ReadFile), ref: 100060E6
                        • GetProcAddress.KERNEL32(00000000), ref: 100060E9
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 1000616C
                        • GetProcAddress.KERNEL32(00000000), ref: 10006173
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 10006196
                        • GetProcAddress.KERNEL32(00000000), ref: 1000619F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree), ref: 100061AD
                        • GetProcAddress.KERNEL32(00000000), ref: 100061B0
                          • Part of subcall function 10006280: ?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,00000000,1000626E), ref: 1000629D
                          • Part of subcall function 10006280: ??3@YAXPAX@Z.MSVCRT ref: 100062A4
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??3@D@2@@std@@D@std@@Tidy@?$basic_string@U?$char_traits@V?$allocator@
                        • String ID: .$2$3$A$C$CloseHandle$F$KERNEL32.dll$LocalAlloc$LocalFree$ReadFile$SetFilePointer$a$d$i$k$l$n$r$r$t
                        • API String ID: 3930180597-656559191
                        • Opcode ID: ec3562c76cf02b6856c9bee384952842a4c3ff7b6c421bb19793b3f923da77ac
                        • Instruction ID: 78a80e282135f81af03c7fdf581fc6e5c74b732e9572507f890dce5143d03e5d
                        • Opcode Fuzzy Hash: ec3562c76cf02b6856c9bee384952842a4c3ff7b6c421bb19793b3f923da77ac
                        • Instruction Fuzzy Hash: CC51E272D04288AEEB01DBF8DC48BDEBFB9EF29310F14415AE644A7281C7B59904C7B5
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,?,?,?,00000000), ref: 10005A3E
                        • GetProcAddress.KERNEL32(00000000), ref: 10005A47
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindClose,?,?,00000000), ref: 10005A57
                        • GetProcAddress.KERNEL32(00000000), ref: 10005A5A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree,?,?,00000000), ref: 10005A6A
                        • GetProcAddress.KERNEL32(00000000), ref: 10005A6D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindNextFileA,?,?,00000000), ref: 10005A7D
                        • GetProcAddress.KERNEL32(00000000), ref: 10005A80
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalReAlloc,?,?,00000000), ref: 10005A90
                        • GetProcAddress.KERNEL32(00000000), ref: 10005A93
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindFirstFileA,?,?,00000000), ref: 10005AA3
                        • GetProcAddress.KERNEL32(00000000), ref: 10005AA6
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc,?,?,00000000), ref: 10005AB4
                        • GetProcAddress.KERNEL32(00000000), ref: 10005AB7
                        • putchar.MSVCRT ref: 10005AD7
                        • sprintf.MSVCRT ref: 10005B1B
                        • putchar.MSVCRT ref: 10005B23
                        • putchar.MSVCRT ref: 10005B3F
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?), ref: 10005B8F
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$putchar$Sleepsprintf
                        • String ID: %$.$FindClose$FindFirstFileA$FindNextFileA$KERNEL32.dll$LocalAlloc$LocalFree$LocalReAlloc$\$h$lstrlenA$s
                        • API String ID: 2618214712-3160943981
                        • Opcode ID: 8a69a945e8b0324ef820fab0aa294c9ce6098a293f04ac7549e39045fe80e8c3
                        • Instruction ID: f0a3fdec2b8c62b2eb02954bf6e4918d43d4f4ef5ffc7c2ff0cb3d43c87bd9e5
                        • Opcode Fuzzy Hash: 8a69a945e8b0324ef820fab0aa294c9ce6098a293f04ac7549e39045fe80e8c3
                        • Instruction Fuzzy Hash: 98713771908385ABE710DFB48C84A9FBFE5EF99384F404919F98897381D77AD908CB52
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 10010A64
                        • GetProcAddress.KERNEL32(00000000), ref: 10010A6B
                        • LoadLibraryA.KERNEL32(user32.dll), ref: 10010A83
                        • GetProcAddress.KERNEL32(?,CreateWindowExA), ref: 10010ADC
                        • putchar.MSVCRT ref: 10010B25
                        • LoadLibraryA.KERNEL32(AVICAP32.dll), ref: 10010B33
                        • GetProcAddress.KERNEL32(?,capCreateCaptureWindowA), ref: 10010B5F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10010B6E
                        • GetProcAddress.KERNEL32(00000000), ref: 10010B75
                        • putchar.MSVCRT ref: 10010BA7
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$putchar
                        • String ID: #32770$.$2$3$A$AVICAP32.dll$C$CVideoCap$CreateWindowExA$E$FreeLibrary$KERNEL32.dll$a$capCreateCaptureWindowA$d$k$n$n$r$r$user32.dll$v
                        • API String ID: 3860417020-205541454
                        • Opcode ID: 1fda7fcb7310f91f9d791d4c50a1b535213b48f83bce2a18f9c0ddce62f842cc
                        • Instruction ID: 2b6a0a263e35625f7b0ea68b9bb34738d6ea2ab0089d603b41eabc5278580cc7
                        • Opcode Fuzzy Hash: 1fda7fcb7310f91f9d791d4c50a1b535213b48f83bce2a18f9c0ddce62f842cc
                        • Instruction Fuzzy Hash: 5D51D7B2C04388EEEB01DBF48C487EEBF75EB26314F184199E581A7242D7B49A44C765
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1000AE1B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000AE24
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 1000AE33
                        • GetProcAddress.KERNEL32(00000000), ref: 1000AE36
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileAttributesA), ref: 1000AE45
                        • GetProcAddress.KERNEL32(00000000), ref: 1000AE48
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 1000AF19
                        • GetProcAddress.KERNEL32(00000000), ref: 1000AF20
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 1000B000
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B007
                          • Part of subcall function 1000BCE0: LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,?,1000AE5B), ref: 1000BCED
                          • Part of subcall function 1000BCE0: GetProcAddress.KERNEL32(00000000), ref: 1000BCF4
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .$2$3$A$C$CloseHandle$DeleteFileA$F$GetFileAttributesA$KERNEL32.dll$a$d$i$k$l$n$r$r$t
                        • API String ID: 2574300362-2960528897
                        • Opcode ID: 8310ebebaab0a4ffea15ff650fa727fb6eaf9aa96c5ca2260bfd54d23a74b2d1
                        • Instruction ID: af3d1c7a9db6ed9d969a3bc51e197d86f18dc4c2231b05834efbddafcb9e954d
                        • Opcode Fuzzy Hash: 8310ebebaab0a4ffea15ff650fa727fb6eaf9aa96c5ca2260bfd54d23a74b2d1
                        • Instruction Fuzzy Hash: A4716661C083C9DEEB02DBF488487EEBF759F26254F184189E584AB342D6B98B44C765
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateFileMappingA,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000,00000000,?,?,?,?,?,?,?,00000000,10019D88,000000FF), ref: 1000B08E
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B097
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,MapViewOfFile,?,?,?,?,?,?,?,00000000,10019D88,000000FF,?,10013AFB), ref: 1000B0A6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B0A9
                        • LoadLibraryA.KERNEL32(user32.dll,?,?,?,?,?,?,?,00000000,10019D88,000000FF,?,10013AFB), ref: 1000B0BC
                        • putchar.MSVCRT ref: 1000B107
                        • putchar.MSVCRT ref: 1000B147
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B17E
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B187
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapFree), ref: 1000B196
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B199
                        • putchar.MSVCRT ref: 1000B1C3
                        • putchar.MSVCRT ref: 1000B1EA
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B221
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B22A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapFree), ref: 1000B239
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B23C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B274
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B27D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapFree), ref: 1000B28C
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B28F
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: LibraryLoad$AddressProc$putchar
                        • String ID: C:\Program Files (x86)\Iefg\Nefghijkl.pic$CreateFileMappingA$GetProcessHeap$HeapFree$KERNEL32.dll$MapViewOfFile$MyCreateMa$user32.dll
                        • API String ID: 1256082471-3157973371
                        • Opcode ID: 7e492b6e8b9d6e4992306b5917f6a6b9fde949bf62dd0f427e13445e883ef58d
                        • Instruction ID: 29cbbc573f5d2514381535938bdc377b1719c72bed2d94ebac81446ff90f7634
                        • Opcode Fuzzy Hash: 7e492b6e8b9d6e4992306b5917f6a6b9fde949bf62dd0f427e13445e883ef58d
                        • Instruction Fuzzy Hash: 36619372D00658ABEB00DFE4DC84F9EBBA8EF48761F114625FA15EB290D774DD408BA0
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000047), ref: 1000753F
                        • GetProcAddress.KERNEL32(00000000), ref: 10007548
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileAttributesA), ref: 10007557
                        • GetProcAddress.KERNEL32(00000000), ref: 1000755A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 10007569
                        • GetProcAddress.KERNEL32(00000000), ref: 1000756C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 1000757B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000757E
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .$2$3$A$D$G$GetFileAttributesA$KERNEL32.dll$S$Sleep$\syslog.dat$c$d$i$k$lstrcatA$m$n$o$r$s
                        • API String ID: 2574300362-722792264
                        • Opcode ID: f63941be6667be7ac3821fdcb4d0eca9e252cea7e291b80ca1847c86cefd004b
                        • Instruction ID: 372f61bf8ddc8e2e157bfc7261c49d3b080176c7735ab3767f29fa06a8c0ca9b
                        • Opcode Fuzzy Hash: f63941be6667be7ac3821fdcb4d0eca9e252cea7e291b80ca1847c86cefd004b
                        • Instruction Fuzzy Hash: 56417361C082CD9DEB12DBF89C48BDEBF76AF32244F184185E184B7242C6B94749CB75
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10003F76
                        • GetProcAddress.KERNEL32(00000000), ref: 10003F7D
                        • WSASocketA.WS2_32(00000002,00000003,000000FF,00000000,00000000,00000001), ref: 10003FD0
                        • setsockopt.WS2_32(00000000,00000000,00000002,?,00000004), ref: 10003FF8
                        • setsockopt.WS2_32(00000000,0000FFFF,00001005,?,00000004), ref: 1000401B
                        • htons.WS2_32(?), ref: 10004039
                        • putchar.MSVCRT ref: 100040A7
                          • Part of subcall function 10002E90: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,00000F9F,?,00000000,00000001,000000FF,?,759A3A20), ref: 10002EA6
                          • Part of subcall function 10002E90: GetProcAddress.KERNEL32(00000000), ref: 10002EAF
                          • Part of subcall function 10002E90: LoadLibraryA.KERNEL32(KERNEL32.dll,GetLocalTime,?,759A3A20), ref: 10002EBD
                          • Part of subcall function 10002E90: GetProcAddress.KERNEL32(00000000), ref: 10002EC0
                          • Part of subcall function 10002E90: rand.MSVCRT ref: 10002EDB
                        • sprintf.MSVCRT ref: 100040FD
                        • putchar.MSVCRT ref: 10004105
                        • htons.WS2_32(00000028), ref: 1000410C
                        • inet_addr.WS2_32(00000000), ref: 1000411C
                        • rand.MSVCRT ref: 1000412D
                        • htons.WS2_32 ref: 1000413C
                        • htons.WS2_32(00000050), ref: 10004144
                        • rand.MSVCRT ref: 1000414A
                        • htonl.WS2_32 ref: 1000415A
                        • rand.MSVCRT ref: 10004163
                        • rand.MSVCRT ref: 10004174
                        • htons.WS2_32(00000200), ref: 10004196
                        • htons.WS2_32(00000014), ref: 100041A4
                        • sendto.WS2_32(?,?,00000028,00000000,00000002,00000010), ref: 1000425A
                        • closesocket.WS2_32(00000000), ref: 10004274
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: htons$rand$AddressLibraryLoadProc$putcharsetsockopt$Socketclosesockethtonlinet_addrsendtosprintf
                        • String ID: %d.%d.%d.%d $@$E$KERNEL32.dll$P$Sleep
                        • API String ID: 1474472973-3411789409
                        • Opcode ID: 3f09ce8a70a3ea506fb5c4b653835838d3c4346daa56f714e763525c6b6cc919
                        • Instruction ID: b404f13c9fa55964b40efd114664ec3b1ba1ed1ae6d1d6a25e2d4a8b32c3f009
                        • Opcode Fuzzy Hash: 3f09ce8a70a3ea506fb5c4b653835838d3c4346daa56f714e763525c6b6cc919
                        • Instruction Fuzzy Hash: 7E91A471E00659ABEB10CBE4CC44BEEB7B5EF88310F01815AF605B7290DBB45A45CB69
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 100068ED
                        • GetProcAddress.KERNEL32(00000000), ref: 100068F4
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindFirstFileA), ref: 10006917
                        • GetProcAddress.KERNEL32(00000000), ref: 10006920
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindClose), ref: 1000692E
                        • GetProcAddress.KERNEL32(00000000), ref: 10006931
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 10006940
                        • GetProcAddress.KERNEL32(00000000), ref: 10006943
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .$2$3$A$C$CloseHandle$F$FindClose$FindFirstFileA$KERNEL32.dll$a$d$i$k$l$n$p$r$r$t
                        • API String ID: 2574300362-4201145984
                        • Opcode ID: ccc6c8c4a033493e654936f70fff0c982460fde7f13037d03d426d3ce7837c32
                        • Instruction ID: c1f36126daed844e2bd13afaa6a9b1fda5f0f6d983b26dab4df2b2b2cb828ad6
                        • Opcode Fuzzy Hash: ccc6c8c4a033493e654936f70fff0c982460fde7f13037d03d426d3ce7837c32
                        • Instruction Fuzzy Hash: 0F51C371C082889EEB11CBF8CC487DEBFBAEF1A354F1541AAE544B7381C6754A44CBA1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,00000000,00000000,00000000,00000000,1001A0A6,000000FF,1001262C,00000000,00000000), ref: 10012103
                        • GetProcAddress.KERNEL32(00000000), ref: 1001210C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 1001211C
                        • GetProcAddress.KERNEL32(00000000), ref: 1001211F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,OpenEventA), ref: 1001212F
                        • GetProcAddress.KERNEL32(00000000), ref: 10012132
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetErrorMode), ref: 10012144
                        • GetProcAddress.KERNEL32(00000000), ref: 10012147
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 10012155
                        • GetProcAddress.KERNEL32(00000000), ref: 10012158
                          • Part of subcall function 10011EE0: LoadLibraryA.KERNEL32(WININET.dll,74DF0BD0,00000000), ref: 10011F1B
                          • Part of subcall function 10011EE0: GetProcAddress.KERNEL32(?,InternetOpenA), ref: 10011F37
                        • wsprintfA.USER32 ref: 10012172
                          • Part of subcall function 10002220: LoadLibraryA.KERNEL32(0000006B,00000043,74DEF550,74DF0BD0,00000000), ref: 100022FE
                          • Part of subcall function 10002220: GetProcAddress.KERNEL32(00000000), ref: 10002305
                          • Part of subcall function 10002220: WSAStartup.WS2_32(00000202,?), ref: 1000232E
                          • Part of subcall function 10002220: putchar.MSVCRT ref: 1000233C
                        • rand.MSVCRT ref: 100121FE
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 100122F9
                        • GetProcAddress.KERNEL32(00000000), ref: 100122FC
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 1001230A
                        • GetProcAddress.KERNEL32(00000000), ref: 1001230D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1001232D
                        • GetProcAddress.KERNEL32(00000000), ref: 10012330
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$Startupputcharrandwsprintf
                        • String ID: CloseHandle$GetTickCount$Global\Net_%d$KERNEL32.dll$OpenEventA$SetErrorMode$Sleep$WaitForSingleObject$kernel32.dll
                        • API String ID: 1261614309-3966361127
                        • Opcode ID: 7ecbfa4711ab2f435ed5951c03360d9941b5a2a6634c743f09c3a2236a6788e0
                        • Instruction ID: fcc21334dff26631f969f0527c6582dead7894640facd2b8009a9ff836c59d36
                        • Opcode Fuzzy Hash: 7ecbfa4711ab2f435ed5951c03360d9941b5a2a6634c743f09c3a2236a6788e0
                        • Instruction Fuzzy Hash: 56717474508385ABD721EFA4CC54BDFBBD8EF99384F00091DF689AB141DB74D9888B52
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetLastError,74DEF550,74DF0BD0,02062143), ref: 1000250E
                        • GetProcAddress.KERNEL32(00000000), ref: 10002517
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ResetEvent), ref: 10002526
                        • GetProcAddress.KERNEL32(00000000), ref: 10002529
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,74DF0BD0,?,?,00000000,?,10002534), ref: 10002AC9
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AD2
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,CancelIo,?,00000000,?,10002534), ref: 10002AE0
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AE3
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,00000000,?,10002534), ref: 10002AF3
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AF6
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B10
                          • Part of subcall function 10002AB0: setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10002B2D
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B35
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B47
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B59
                          • Part of subcall function 10002AB0: closesocket.WS2_32(?), ref: 10002B65
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B6D
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B7D
                        • puts.MSVCRT ref: 1000253F
                        • puts.MSVCRT ref: 10002559
                        • socket.WS2_32(00000002,00000001,00000006), ref: 10002564
                        • Sleep.KERNEL32(00000000), ref: 10002578
                        • putchar.MSVCRT ref: 10002590
                        • gethostbyname.WS2_32(?), ref: 1000259D
                        • putchar.MSVCRT ref: 100025A7
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$puts$Sleepclosesocketgethostbynamesetsockoptsocket
                        • String ID: GetLastError$KERNEL32.dll$ResetEvent$WS2_32.DLL$`$connect
                        • API String ID: 1105669736-88818756
                        • Opcode ID: c71a65267bf01e9fd5f32f9d513c7bd29baf321e37ead7116212f747ebc85de4
                        • Instruction ID: 47a0d10ca22121f92eb261470907223e266d3fa5b4e9900af84d09adbfdfa9cb
                        • Opcode Fuzzy Hash: c71a65267bf01e9fd5f32f9d513c7bd29baf321e37ead7116212f747ebc85de4
                        • Instruction Fuzzy Hash: C0510472A00718BFE710DBB4DC89F9EBBA8EF49315F104155FA09EB290CBB1A9448795
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10003DAC
                        • GetProcAddress.KERNEL32(00000000), ref: 10003DB5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 10003DC4
                        • GetProcAddress.KERNEL32(00000000), ref: 10003DC7
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 10003DD6
                        • GetProcAddress.KERNEL32(00000000), ref: 10003DD9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapAlloc), ref: 10003DE8
                        • GetProcAddress.KERNEL32(00000000), ref: 10003DEB
                        • putchar.MSVCRT ref: 10003E19
                        • WSASocketA.WS2_32(00000002,00000003,00000001,00000000,00000000,00000001), ref: 10003E2A
                        • putchar.MSVCRT ref: 10003E37
                        • putchar.MSVCRT ref: 10003E47
                        • setsockopt.WS2_32(00000000,0000FFFF,00001005,000007D0,00000004), ref: 10003E5D
                        • putchar.MSVCRT ref: 10003E6E
                        • putchar.MSVCRT ref: 10003E95
                        • putchar.MSVCRT ref: 10003E99
                          • Part of subcall function 10003CE0: LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcessId,00000000,00000000,?,759A3A20), ref: 10003CF4
                          • Part of subcall function 10003CE0: GetProcAddress.KERNEL32(00000000), ref: 10003CFB
                        • putchar.MSVCRT ref: 10003ED4
                        • putchar.MSVCRT ref: 10003EED
                        • putchar.MSVCRT ref: 10003EFA
                        • putchar.MSVCRT ref: 10003F0D
                        • sendto.WS2_32(?,00000000,00001000,00000000,00000002,00000010), ref: 10003F24
                        • putchar.MSVCRT ref: 10003F39
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$Socketsendtosetsockopt
                        • String ID: GetProcessHeap$GetTickCount$HeapAlloc$KERNEL32.dll$Sleep
                        • API String ID: 1979888943-4163489220
                        • Opcode ID: fe84f7a7f3504693ec86f6f9e7fd4984daf656ff8b729c2d76e71ae478caab0a
                        • Instruction ID: d8b2a23f1b5aa275b36c3b20c659598076b870ec2c7065d804e5c9a86020f4dc
                        • Opcode Fuzzy Hash: fe84f7a7f3504693ec86f6f9e7fd4984daf656ff8b729c2d76e71ae478caab0a
                        • Instruction Fuzzy Hash: 7741B870D4031566FB11EBB48C4AF9F7A68EF04790F104525FA18BB2C0DBB5EA4587A5
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putcharputs$AddressLibraryLoadProcSleephtonsstrncpystrstr
                        • String ID: %s%d%s$KERNEL32.dll$Sleep
                        • API String ID: 2958156663-2995088633
                        • Opcode ID: 0cb56cc7fe6907f04ab35d11660649744051a8c3f397de19fb852a6c0b0b92b6
                        • Instruction ID: 168d7be28b35332b9f9161e35b4e69393db29f7bf9a6b91ba67c704e73bbf590
                        • Opcode Fuzzy Hash: 0cb56cc7fe6907f04ab35d11660649744051a8c3f397de19fb852a6c0b0b92b6
                        • Instruction Fuzzy Hash: 4861AF716043449BE325CB68CC45BAFB7E5FFC8314F004A2DF69A97290DB71EA048B96
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetLastError), ref: 10005566
                        • GetProcAddress.KERNEL32(00000000), ref: 1000556F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000557E
                        • GetProcAddress.KERNEL32(00000000), ref: 10005581
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 1000558F
                        • GetProcAddress.KERNEL32(00000000), ref: 10005592
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateDirectoryA), ref: 100055A1
                        • GetProcAddress.KERNEL32(00000000), ref: 100055A4
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileAttributesA), ref: 100055B3
                        • GetProcAddress.KERNEL32(00000000), ref: 100055B6
                        • putchar.MSVCRT ref: 100055C4
                        • malloc.MSVCRT ref: 100055D5
                        • CharNextA.USER32(00000002), ref: 10005616
                        • CharNextA.USER32(00000002), ref: 10005634
                        • Sleep.KERNEL32(00000000), ref: 10005685
                        • Sleep.KERNEL32(00000000), ref: 10005692
                        • Sleep.KERNEL32(00000000), ref: 100056A0
                        • CharNextA.USER32(00000000), ref: 100056B3
                        • free.MSVCRT(00000000), ref: 100056C8
                        • free.MSVCRT(00000000), ref: 100056F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$CharNextSleep$free$mallocputchar
                        • String ID: CreateDirectoryA$GetFileAttributesA$GetLastError$KERNEL32.dll$lstrcpyA$lstrlenA
                        • API String ID: 249963510-2317385273
                        • Opcode ID: 69916e5d83d05739c4321cd0b6896549d1bacec5b8c465742fbf2142d6727869
                        • Instruction ID: 557be350d942e752aa57783df1badedd499570618447fe4f91bd789467dddb39
                        • Opcode Fuzzy Hash: 69916e5d83d05739c4321cd0b6896549d1bacec5b8c465742fbf2142d6727869
                        • Instruction Fuzzy Hash: F251C370C00699AFEB11DF688C44BAFBFE8EF097D1F90416AE991A7240C7764841CFA5
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000FCAA
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FCB3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalReAlloc), ref: 1000FCC3
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FCC6
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000FCD6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FCD9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize), ref: 1000FCE9
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FCEC
                        • putchar.MSVCRT ref: 1000FD03
                        • putchar.MSVCRT ref: 1000FD14
                        • GetWindowTextA.USER32(?,?,00000400), ref: 1000FD2B
                        • putchar.MSVCRT ref: 1000FD33
                        • IsWindowVisible.USER32(?), ref: 1000FD39
                        • putchar.MSVCRT ref: 1000FD5C
                        • putchar.MSVCRT ref: 1000FD71
                        • putchar.MSVCRT ref: 1000FD84
                        • putchar.MSVCRT ref: 1000FD92
                        • putchar.MSVCRT ref: 1000FDA6
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 1000FDB6
                        • putchar.MSVCRT ref: 1000FDBE
                        • putchar.MSVCRT ref: 1000FDE6
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$Window$ProcessTextThreadVisible
                        • String ID: KERNEL32.dll$LocalAlloc$LocalReAlloc$LocalSize$lstrlenA
                        • API String ID: 2271292106-2047254388
                        • Opcode ID: f2b4c3575cd06d63b26912efc34f8718c9f894f5c1bcd9a0c5cbd3f5eb597988
                        • Instruction ID: 2927bf0af80553ea17337698c1c35489f7fa34f6b5e95938d6431d495437883f
                        • Opcode Fuzzy Hash: f2b4c3575cd06d63b26912efc34f8718c9f894f5c1bcd9a0c5cbd3f5eb597988
                        • Instruction Fuzzy Hash: 3C41E9B19003446BE600EBB0CC45F9F76D8FF88744F400829FB4997240DBB9EA49CBA6
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetPrivateProfileSectionNamesA), ref: 1000437C
                        • GetProcAddress.KERNEL32(00000000), ref: 10004385
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 10004395
                        • GetProcAddress.KERNEL32(00000000), ref: 10004398
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 100043A6
                        • GetProcAddress.KERNEL32(00000000), ref: 100043A9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetWindowsDirectoryA), ref: 100043B9
                        • GetProcAddress.KERNEL32(00000000), ref: 100043BC
                        • strchr.MSVCRT ref: 100043DE
                        • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000023,00000000), ref: 10004412
                        • wsprintfA.USER32 ref: 10004432
                        • ??2@YAPAXI@Z.MSVCRT ref: 10004450
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 10004474
                        • GetProcAddress.KERNEL32(00000000), ref: 10004477
                        • ??3@YAXPAX@Z.MSVCRT ref: 100044CF
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@??3@FolderPathSpecialstrchrwsprintf
                        • String ID: %s\%s$Documents and Settings\$GetPrivateProfileSectionNamesA$GetWindowsDirectoryA$KERNEL32.dll$Microsoft\Network\Connections\pbk\rasphone.pbk$\Application Data\Microsoft\Network\Connections\pbk\rasphone.pbk$lstrcatA$lstrcpyA$lstrlenA
                        • API String ID: 812189891-1601105468
                        • Opcode ID: ef28d3a75b835e2d6c25e982900ad4b4ae17aaace8f00d93c161162db9a7ae95
                        • Instruction ID: e1f63756d64357b9da769824cd5ecf0ac8a268a32ab31ee415926941e61f39f9
                        • Opcode Fuzzy Hash: ef28d3a75b835e2d6c25e982900ad4b4ae17aaace8f00d93c161162db9a7ae95
                        • Instruction Fuzzy Hash: F4417F704043456BE300DFA4CC84F9FBBE9EF88388F404918F6889B241DB74DA858BA6
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 100057EF
                        • GetProcAddress.KERNEL32(00000000), ref: 100057F8
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 10005807
                        • GetProcAddress.KERNEL32(00000000), ref: 1000580A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetDriveTypeA), ref: 10005819
                        • GetProcAddress.KERNEL32(00000000), ref: 1000581C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetDiskFreeSpaceExA), ref: 1000582B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000582E
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetVolumeInformationA), ref: 1000583D
                        • GetProcAddress.KERNEL32(00000000), ref: 10005840
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetLogicalDriveStringsA), ref: 1000584F
                        • GetProcAddress.KERNEL32(00000000), ref: 10005852
                        • LoadLibraryA.KERNEL32(Shell32.dll), ref: 10005885
                        • GetProcAddress.KERNEL32(?,SHGetFileInfoA), ref: 100058A7
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: FreeLibrary$GetDiskFreeSpaceExA$GetDriveTypeA$GetLogicalDriveStringsA$GetVolumeInformationA$KERNEL32.dll$SHGetFileInfoA$Shell32.dll$g$lstrlenA
                        • API String ID: 2574300362-199167966
                        • Opcode ID: a26df80974d43fa6dc987d3bb79957ae327a9cfef5622b8e0044232025d6494d
                        • Instruction ID: 73a4dabb4e15416b3ab34be8909a01cdcade15f9ac6774e641ce18a4f71022ee
                        • Opcode Fuzzy Hash: a26df80974d43fa6dc987d3bb79957ae327a9cfef5622b8e0044232025d6494d
                        • Instruction Fuzzy Hash: 32612AB1D0025CAFDF11DFA4CC48AEEBBBAEF89340F104565E949A7240DB759E85CB60
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043,759A9E20,?,74DF0F00), ref: 1000FFF1
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FFFA
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 10010009
                        • GetProcAddress.KERNEL32(00000000), ref: 1001000C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1001001B
                        • GetProcAddress.KERNEL32(00000000), ref: 1001001E
                        • _beginthreadex.MSVCRT ref: 10010066
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$_beginthreadex
                        • String ID: .$2$3$A$C$CloseHandle$E$KERNEL32.dll$WaitForSingleObject$a$d$k$n$n$r$r$v
                        • API String ID: 780464054-4013608565
                        • Opcode ID: 4f298074024c17595d47c72bd98f3d82e2c697fd77346945051b57bf041a1f24
                        • Instruction ID: 93b32ab5de4703ae6f1ec44a9a2c4a623436cf1636124a67b927a84aedefec7c
                        • Opcode Fuzzy Hash: 4f298074024c17595d47c72bd98f3d82e2c697fd77346945051b57bf041a1f24
                        • Instruction Fuzzy Hash: C1419361C042CDAEDF01DBF8C848BDEBFB5AF26204F144189E544B7342C6B98A45C7B5
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 100039FC
                        • GetProcAddress.KERNEL32(00000000), ref: 10003A05
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10003A14
                        • GetProcAddress.KERNEL32(00000000), ref: 10003A17
                        • LoadLibraryA.KERNEL32(WININET.dll), ref: 10003A45
                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 10003A6B
                        • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 10003A91
                        • GetProcAddress.KERNEL32(?,InternetOpenUrlA), ref: 10003AB7
                        • puts.MSVCRT ref: 10003AD3
                        • puts.MSVCRT ref: 10003AEF
                        • puts.MSVCRT ref: 10003B0E
                        • puts.MSVCRT ref: 10003B1C
                        • puts.MSVCRT ref: 10003B2D
                        • puts.MSVCRT ref: 10003B40
                        • Sleep.KERNEL32(00000000), ref: 10003B4E
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: puts$AddressProc$LibraryLoad$Sleep
                        • String ID: FreeLibrary$InternetCloseHandle$InternetOpenA$InternetOpenUrlA$KERNEL32.dll$Sleep$User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET4.0C; .NET4.0E)$WININET.dll
                        • API String ID: 718009383-1913245550
                        • Opcode ID: 3511f568b730a8031ee973775ed48d7f3e489b130b323fd6d2c71f81849f94ba
                        • Instruction ID: 924f37bafe39c2e4b45789eb26d058000e75dd64711b790dfaaed26ad31c8fea
                        • Opcode Fuzzy Hash: 3511f568b730a8031ee973775ed48d7f3e489b130b323fd6d2c71f81849f94ba
                        • Instruction Fuzzy Hash: DA41F9B280021CBBE701EBB49C8DFAE3E29EF45315F254561FA15EB240DBB4DD808655
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,?,?,?,75A8F1B0), ref: 1000A06A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A073
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot,?,?,?,75A8F1B0), ref: 1000A083
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A086
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First,?,?,?,75A8F1B0), ref: 1000A094
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A097
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next,?,?,?,75A8F1B0), ref: 1000A0A5
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A0A8
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA,?,?,?,75A8F1B0), ref: 1000A0B8
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A0BB
                        • putchar.MSVCRT ref: 1000A0D1
                        • putchar.MSVCRT ref: 1000A0E0
                        • putchar.MSVCRT ref: 1000A0EC
                        • putchar.MSVCRT ref: 1000A0FB
                        • putchar.MSVCRT ref: 1000A119
                        • putchar.MSVCRT ref: 1000A144
                        • putchar.MSVCRT ref: 1000A150
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc
                        • String ID: CloseHandle$CreateToolhelp32Snapshot$KERNEL32.dll$Process32First$Process32Next$lstrcmpiA
                        • API String ID: 2374183287-2568122304
                        • Opcode ID: 31e5f829061dbba53c5d2c6fde3747c196ce944b40467f94ed6185f2e2a995e6
                        • Instruction ID: 14c29f076475eddc1fc17d839b90263275fdc630c602952802ceb7b6b34ae79f
                        • Opcode Fuzzy Hash: 31e5f829061dbba53c5d2c6fde3747c196ce944b40467f94ed6185f2e2a995e6
                        • Instruction Fuzzy Hash: C821847190435867E611EBE18C55F9F7E9CEF88788F010929F6449B180EB75DA44CBA3
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,?,?), ref: 10006471
                        • GetProcAddress.KERNEL32(00000000), ref: 1000647A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindClose), ref: 10006488
                        • GetProcAddress.KERNEL32(00000000), ref: 1000648B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindNextFileA), ref: 1000649B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000649E
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindFirstFileA), ref: 100064AE
                        • GetProcAddress.KERNEL32(00000000), ref: 100064B1
                        • wsprintfA.USER32 ref: 10006504
                        • wsprintfA.USER32 ref: 10006550
                        • wsprintfA.USER32 ref: 10006571
                        • ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000001), ref: 100065A6
                        • ??2@YAPAXI@Z.MSVCRT ref: 100065E8
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000664F
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$wsprintf$??2@??3@D@2@@std@@D@std@@Grow@?$basic_string@U?$char_traits@V?$allocator@
                        • String ID: %s%s%s$%s%s*.*$.$FindClose$FindFirstFileA$FindNextFileA$KERNEL32.dll$lstrlenA
                        • API String ID: 1051829685-4185473705
                        • Opcode ID: 40d6a69a410f8a4008f87e46fa74277f2d55c6ef92f2220bb7b6a495cfa671bd
                        • Instruction ID: 56a734af7b99267e499c2eb78b03cd318febd9cc107b854223aadbb49d82d025
                        • Opcode Fuzzy Hash: 40d6a69a410f8a4008f87e46fa74277f2d55c6ef92f2220bb7b6a495cfa671bd
                        • Instruction Fuzzy Hash: 7561E2B18083849BD720DF64CC44AAFBBE9FF88744F504A1DF58997280DB75E944CB92
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 10001094
                        • GetProcAddress.KERNEL32(00000000), ref: 1000109B
                        • LoadLibraryA.KERNEL32(WINMM.dll), ref: 100010B3
                        • ??2@YAPAXI@Z.MSVCRT ref: 10001119
                        • ??2@YAPAXI@Z.MSVCRT ref: 10001133
                        • ??2@YAPAXI@Z.MSVCRT ref: 10001144
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000114E
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: ??2@$LibraryLoad$AddressProc
                        • String ID: .$2$3$A$C$E$WINMM.dll$a$d$k$n$n$r$r$v
                        • API String ID: 1878065171-3858805395
                        • Opcode ID: 3e1d99bc5b267fd6550d7bc06a530206c33219135d45aa3c8a60a47f63e6e427
                        • Instruction ID: 309269514b4cbd4aaa70d75ce1d203b49880823388a5057a75443779e6c1f287
                        • Opcode Fuzzy Hash: 3e1d99bc5b267fd6550d7bc06a530206c33219135d45aa3c8a60a47f63e6e427
                        • Instruction Fuzzy Hash: 415180B1C04388DEDB01CFA8C4486DEBFB5FF26308F244199D585AB352D7B98A45CB69
                        APIs
                        • IsWindow.USER32(?), ref: 10010ED6
                        • SendMessageA.USER32(?,00000409,00000000,00000000), ref: 10010EEE
                        • IsWindow.USER32(?), ref: 10010EF4
                        • SendMessageA.USER32(?,00000402,00000000,10010BE0), ref: 10010F0A
                        • IsWindow.USER32(?), ref: 10010F10
                        • SendMessageA.USER32(?,00000405,00000000,Function_00010BF0), ref: 10010F26
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: MessageSendWindow
                        • String ID:
                        • API String ID: 701072176-0
                        • Opcode ID: 6525c0767e4b7ad584db84ae01d08633f965776642d849c279cfdd0c403f51fa
                        • Instruction ID: 07b4332cc4033d2887b8d39bac4ef4e67846ece46a0ab40e7f2c02d166cf3a63
                        • Opcode Fuzzy Hash: 6525c0767e4b7ad584db84ae01d08633f965776642d849c279cfdd0c403f51fa
                        • Instruction Fuzzy Hash: 8D51C1717403056AE234DB65EC82F67B3E8EF88B50F01891DFA818F680C6B1F885CB65
                        APIs
                          • Part of subcall function 1000EA70: ReleaseDC.USER32(?,?), ref: 1000EA8A
                          • Part of subcall function 1000EA70: GetDesktopWindow.USER32 ref: 1000EA90
                          • Part of subcall function 1000EA70: GetDC.USER32(00000000), ref: 1000EA9D
                        • GetCursorPos.USER32(?), ref: 1000E234
                        • GetCursorInfo.USER32(?,?,00000008,?,?), ref: 1000E252
                        • LoadLibraryA.KERNEL32(User32.dll,?,?), ref: 1000E28D
                        • GetProcAddress.KERNEL32(?,DestroyCursor), ref: 1000E2B9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary,?,?), ref: 1000E2C5
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E2CC
                        • DestroyCursor.USER32(?), ref: 1000E2DF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,?,00000001,?,?), ref: 1000E3E6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E3F3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,?), ref: 1000E401
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E408
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,?), ref: 1000E417
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E41E
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$Cursor$DesktopDestroyInfoReleaseWindow
                        • String ID: DestroyCursor$FreeLibrary$GetTickCount$InterlockedExchange$KERNEL32.dll$Sleep$User32.dll
                        • API String ID: 2116817699-1045129642
                        • Opcode ID: 5fb9d3b9814b643b432a612074b4a3233b282e242a617cfdf832a38565391524
                        • Instruction ID: 7502a50747b9e10b677eab54ea5e0d87601013399c0b8f1625b389c5abe93b3f
                        • Opcode Fuzzy Hash: 5fb9d3b9814b643b432a612074b4a3233b282e242a617cfdf832a38565391524
                        • Instruction Fuzzy Hash: C771B771A006449FEB14DFB8CC889AEBBF9FF88350B108A59F546E7245DB70ED418B90
                        APIs
                        • putchar.MSVCRT ref: 1000F030
                        • GetProcAddress.KERNEL32(?,TerminateThread), ref: 1000F04E
                        • putchar.MSVCRT ref: 1000F06F
                        • GetProcAddress.KERNEL32(?,TerminateProcess), ref: 1000F093
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 1000F0A2
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F0A9
                        • putchar.MSVCRT ref: 1000F0CC
                        • putchar.MSVCRT ref: 1000F0DE
                        • putchar.MSVCRT ref: 1000F0F1
                        • GetProcAddress.KERNEL32(?,DisconnectNamedPipe), ref: 1000F114
                        • GetProcAddress.KERNEL32(?,CloseHandle), ref: 1000F175
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 1000F184
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F18B
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$putchar$LibraryLoad
                        • String ID: CloseHandle$DisconnectNamedPipe$FreeLibrary$KERNEL32.dll$TerminateProcess$TerminateThread$WaitForSingleObject
                        • API String ID: 2307409925-2198904809
                        • Opcode ID: 940fed469944679cc117962effeb96548658c7666f0ae78484961eb187d21bce
                        • Instruction ID: 7aa4cb8553133a3f9dea7be2f32008c8d3e95df56a599438eae320ccf76c8637
                        • Opcode Fuzzy Hash: 940fed469944679cc117962effeb96548658c7666f0ae78484961eb187d21bce
                        • Instruction Fuzzy Hash: E65191B2900615ABE711EFB4CD88A6FB7B9FF58310F154A19F651E7250CBB4E9018BA0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetVersionExA,74DEF550,74DF0BD0,00000000,02062143), ref: 10011CCA
                        • GetProcAddress.KERNEL32(00000000), ref: 10011CD3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetComputerNameA), ref: 10011CE1
                        • GetProcAddress.KERNEL32(00000000), ref: 10011CE4
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetSystemInfo), ref: 10011CF4
                        • GetProcAddress.KERNEL32(00000000), ref: 10011CF7
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalMemoryStatus), ref: 10011D05
                        • GetProcAddress.KERNEL32(00000000), ref: 10011D08
                        • RegCreateKeyExA.ADVAPI32(80000001,NetSubKey,00000000,00000000,00000000,00000001,00000000,?,?), ref: 10011DB3
                        • RegQueryValueExA.ADVAPI32(?,10020D00,00000000,?,00000000,?), ref: 10011DDB
                        • RegCloseKey.ADVAPI32(?), ref: 10011DEA
                        • getsockname.WS2_32(?,?,?), ref: 10011E35
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$CloseCreateQueryValuegetsockname
                        • String ID: $GetComputerNameA$GetSystemInfo$GetVersionExA$GlobalMemoryStatus$KERNEL32.dll$NetSubKey$f
                        • API String ID: 3784463823-2235311193
                        • Opcode ID: 2a237a0f92db840a1eb1ab9269a4e371118933cfe521fe5565239a92627a67a5
                        • Instruction ID: 494a88bb51f59abb848ea5efdb670c61c01dd5f1d335179065a96a5b25abebd3
                        • Opcode Fuzzy Hash: 2a237a0f92db840a1eb1ab9269a4e371118933cfe521fe5565239a92627a67a5
                        • Instruction Fuzzy Hash: A1512671508385ABD724DB64CC48BDFBBE9FBC8344F00491EF699A7240DBB4A948CB56
                        APIs
                          • Part of subcall function 10001C80: LoadLibraryA.KERNEL32(kernel32.dll,74DEF550,?,00000000,74DF0BD0,00000000), ref: 10001CAC
                          • Part of subcall function 10001C80: GetProcAddress.KERNEL32(?,InitializeCriticalSection), ref: 10001CD8
                          • Part of subcall function 10001C80: LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10001CE6
                          • Part of subcall function 10001C80: GetProcAddress.KERNEL32(00000000), ref: 10001CED
                        • LoadLibraryA.KERNEL32(0000006B,00000043,74DEF550,74DF0BD0,00000000), ref: 100022FE
                        • GetProcAddress.KERNEL32(00000000), ref: 10002305
                        • WSAStartup.WS2_32(00000202,?), ref: 1000232E
                        • putchar.MSVCRT ref: 1000233C
                        • putchar.MSVCRT ref: 10002357
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$putchar$Startup
                        • String ID: .$2$3$A$C$E$Gh0s$a$d$k$n$n$r$r$v
                        • API String ID: 1415271762-3694356089
                        • Opcode ID: 246be07735fbafbdc6cfa98a1d98683731798cfbd75714db3880e71cb4c0338e
                        • Instruction ID: c765593f1228ab312f51a2440231554b2701b48cf444d5cd7ee0975be0ee5b9d
                        • Opcode Fuzzy Hash: 246be07735fbafbdc6cfa98a1d98683731798cfbd75714db3880e71cb4c0338e
                        • Instruction Fuzzy Hash: A45180718093C8DEEB02CBF8C9497DEBFB59F26204F184189E49567382C7B95608C776
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary,?,?,?,?,?,10010BC8), ref: 10010D5D
                        • GetProcAddress.KERNEL32(00000000), ref: 10010D66
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle,?,?,?,?,?,10010BC8), ref: 10010D74
                        • GetProcAddress.KERNEL32(00000000), ref: 10010D77
                        • IsWindow.USER32(?), ref: 10010D96
                        • SendMessageA.USER32(?,00000445,00000000,00000000), ref: 10010DA9
                        • IsWindow.USER32(?), ref: 10010DAF
                        • SendMessageA.USER32(?,0000040B,00000000,00000000), ref: 10010DC2
                        • ??3@YAXPAX@Z.MSVCRT ref: 10010DCC
                        • ??3@YAXPAX@Z.MSVCRT ref: 10010DDC
                        • IsWindow.USER32(?), ref: 10010DEF
                        • SendMessageA.USER32(?,00000402,00000000,00000000), ref: 10010E02
                        • IsWindow.USER32(?), ref: 10010E08
                        • SendMessageA.USER32(?,00000405,00000000,00000000), ref: 10010E1B
                        • CloseWindow.USER32(?), ref: 10010E27
                        • CloseWindow.USER32(?), ref: 10010E2D
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Window$MessageSend$??3@AddressCloseLibraryLoadProc
                        • String ID: CloseHandle$FreeLibrary$KERNEL32.dll$kernel32.dll
                        • API String ID: 3909432327-2974971588
                        • Opcode ID: 8b75e71f1fa09ceaf3887dad9fbe66cd354355976bce3fadba1be06135833af6
                        • Instruction ID: d169c2e70cab9f9fcb7b336e6b01fa6f8e499f057b8a28c9d8f61b6d283482d5
                        • Opcode Fuzzy Hash: 8b75e71f1fa09ceaf3887dad9fbe66cd354355976bce3fadba1be06135833af6
                        • Instruction Fuzzy Hash: 183129B5300745ABE620EBA5DD85F1BB3E8EF88B40F114918F6819B290DBB4F8458B65
                        APIs
                        • LoadCursorA.USER32(00000000,00000000), ref: 1000DD11
                        • LoadLibraryA.KERNEL32(GDI32.dll), ref: 1000DD37
                          • Part of subcall function 1000EA70: ReleaseDC.USER32(?,?), ref: 1000EA8A
                          • Part of subcall function 1000EA70: GetDesktopWindow.USER32 ref: 1000EA90
                          • Part of subcall function 1000EA70: GetDC.USER32(00000000), ref: 1000EA9D
                        • GetDesktopWindow.USER32 ref: 1000DD85
                        • GetDC.USER32(?), ref: 1000DDA5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 1000DDBF
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DDC6
                        • GetSystemMetrics.USER32(00000000), ref: 1000DDF5
                        • GetSystemMetrics.USER32(00000001), ref: 1000DDFC
                        • GetProcAddress.KERNEL32(?,CreateCompatibleDC), ref: 1000DE29
                        • GetProcAddress.KERNEL32(?,CreateDIBSection), ref: 1000DED1
                        • GetProcAddress.KERNEL32(?,SelectObject), ref: 1000DF48
                        • SetRect.USER32(00000036,00000000,00000000,?,?), ref: 1000DF95
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000DFA4
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$Load$DesktopLibraryMetricsSystemWindow$??2@CursorRectRelease
                        • String ID: CreateCompatibleDC$CreateDIBSection$GDI32.dll$GetTickCount$KERNEL32.dll$SelectObject
                        • API String ID: 3033261317-3678707404
                        • Opcode ID: aed57b3fa759c06229671b5f44264d3ff8f269b51171447d703ecef44c09c810
                        • Instruction ID: d06106a4e2d45155262b7b5c0f48e5bdc8c13f7e7a2ea952bc00af2bd6466b29
                        • Opcode Fuzzy Hash: aed57b3fa759c06229671b5f44264d3ff8f269b51171447d703ecef44c09c810
                        • Instruction Fuzzy Hash: FDB12CB5900B05AFE720DF65C884B6ABBF5FB48704F11891DE9969B750DBB4F8018F90
                        APIs
                        • ReleaseDC.USER32(?,?), ref: 1000E069
                        • GetProcAddress.KERNEL32(?,DeleteDC), ref: 1000E085
                        • GetProcAddress.KERNEL32(?,DeleteObject), ref: 1000E0D5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 1000E0E4
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E0EB
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000E11D
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000E129
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000E132
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000E13B
                        • LoadLibraryA.KERNEL32 ref: 1000E163
                        • GetProcAddress.KERNEL32(?,DestroyCursor), ref: 1000E18F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 1000E19E
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E1A5
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$??3@$LibraryLoad$Release
                        • String ID: DeleteDC$DeleteObject$DestroyCursor$FreeLibrary$KERNEL32.dll$User32.dll
                        • API String ID: 2450414274-2609009130
                        • Opcode ID: 83bbe95f12b0d2d38b5ce48e46a91e7028aac5a1ea4d83c99539493008367d94
                        • Instruction ID: f2966247950a2038ef805fc82d3ce22fed5f2f9c988e255f31edded61e873c45
                        • Opcode Fuzzy Hash: 83bbe95f12b0d2d38b5ce48e46a91e7028aac5a1ea4d83c99539493008367d94
                        • Instruction Fuzzy Hash: 955181B6800609AFDB10EBB4CD88A6FBBB9FF08310F154919F655E7210DB74E9418B90
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 10013C1A
                        • GetProcAddress.KERNEL32(00000000), ref: 10013C23
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10013C33
                        • GetProcAddress.KERNEL32(00000000), ref: 10013C36
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 10013C46
                        • GetProcAddress.KERNEL32(00000000), ref: 10013C49
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateFileA), ref: 10013C57
                        • GetProcAddress.KERNEL32(00000000), ref: 10013C5A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ReadFile), ref: 10013C68
                        • GetProcAddress.KERNEL32(00000000), ref: 10013C6B
                        • strstr.MSVCRT ref: 10013D28
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$strstr
                        • String ID: CloseHandle$CreateFileA$DeleteFileA$KERNEL32.dll$ReadFile$Sleep$c:\NT_Path.jpg
                        • API String ID: 2500802090-1674106499
                        • Opcode ID: 0737d5972adfadde29a827fa96b72669720f97e7de01c4dfca1cc12e72f9fc24
                        • Instruction ID: 1babe2449e0d2d2bc05475167633330b2679202f1ae16dd96b98fb59404567fb
                        • Opcode Fuzzy Hash: 0737d5972adfadde29a827fa96b72669720f97e7de01c4dfca1cc12e72f9fc24
                        • Instruction Fuzzy Hash: 2041E3326043446BD320D6B4DC48BDFBBC5EBD8360F010A2DF795AB1C0DEB9E9488696
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10009782
                        • GetProcAddress.KERNEL32(00000000), ref: 1000978B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange), ref: 1000979A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000979D
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 100097AC
                        • GetProcAddress.KERNEL32(00000000), ref: 100097AF
                        • LoadLibraryA.KERNEL32(kernel32.dll,CreateThread), ref: 100097BE
                        • GetProcAddress.KERNEL32(00000000), ref: 100097C1
                        • RegCreateKeyExA.ADVAPI32(80000001,NetSubKey,00000000,00000000,00000000,00000002,00000000,?,?), ref: 10009A97
                        • RegSetValueExA.ADVAPI32(?,10020D00,00000000,00000001,?,?), ref: 10009AB4
                        • RegCloseKey.ADVAPI32(?), ref: 10009ABE
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$CloseCreateValue
                        • String ID: CloseHandle$CreateThread$InterlockedExchange$KERNEL32.dll$NetSubKey$Sleep$kernel32.dll
                        • API String ID: 4117740996-4135363688
                        • Opcode ID: 0ed5dbf1ea7c656ac72894d5cc2a42729d6afc5a2d8570a2d443478e4e3c9a26
                        • Instruction ID: 44b1fb31bbc208b649749b85e8b6f975ee1b0b8e11b1698b694e0121b82185e0
                        • Opcode Fuzzy Hash: 0ed5dbf1ea7c656ac72894d5cc2a42729d6afc5a2d8570a2d443478e4e3c9a26
                        • Instruction Fuzzy Hash: 3D91E9767402046BE710DE98EC82FA9B755FB84716F1441B6FF0CDF186D6B2685087A1
                        APIs
                        • LoadLibraryA.KERNEL32(WININET.dll,74DF0BD0,00000000), ref: 10011F1B
                        • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 10011F37
                        • GetProcAddress.KERNEL32(?,InternetOpenUrlA), ref: 10011F8A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: FreeLibrary$InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$KERNEL32.dll$Mozilla/4.0 (compatible)$WININET.dll
                        • API String ID: 2238633743-2965260709
                        • Opcode ID: 5a19922fb3e839d5377f8b9ad65df482db5bb8ca6901535b746399f6da59df0a
                        • Instruction ID: 2338258057033c5bffd16e43ff37a7f08f7d89a5e28c8140163f19effd12da90
                        • Opcode Fuzzy Hash: 5a19922fb3e839d5377f8b9ad65df482db5bb8ca6901535b746399f6da59df0a
                        • Instruction Fuzzy Hash: 8351E872D002186BE711DBB4DC48BFD7BA8FB45311F1186A9FA15E7180DBB49E418A94
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10013446
                        • GetProcAddress.KERNEL32(00000000), ref: 1001344D
                        • _strrev.MSVCRT ref: 10013490
                          • Part of subcall function 1000A050: LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,?,?,?,75A8F1B0), ref: 1000A06A
                          • Part of subcall function 1000A050: GetProcAddress.KERNEL32(00000000), ref: 1000A073
                          • Part of subcall function 1000A050: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot,?,?,?,75A8F1B0), ref: 1000A083
                          • Part of subcall function 1000A050: GetProcAddress.KERNEL32(00000000), ref: 1000A086
                          • Part of subcall function 1000A050: LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First,?,?,?,75A8F1B0), ref: 1000A094
                          • Part of subcall function 1000A050: GetProcAddress.KERNEL32(00000000), ref: 1000A097
                          • Part of subcall function 1000A050: LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next,?,?,?,75A8F1B0), ref: 1000A0A5
                          • Part of subcall function 1000A050: GetProcAddress.KERNEL32(00000000), ref: 1000A0A8
                          • Part of subcall function 1000A050: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA,?,?,?,75A8F1B0), ref: 1000A0B8
                          • Part of subcall function 1000A050: GetProcAddress.KERNEL32(00000000), ref: 1000A0BB
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A0D1
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A0E0
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A0EC
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A0FB
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A119
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A144
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A150
                        • RegDeleteKeyA.ADVAPI32(80000002,?), ref: 10013542
                        • putchar.MSVCRT ref: 10013546
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$Delete_strrev
                        • String ID: .$D$Defghi Klmnopqr Tuv$KERNEL32.dll$M$S$SYSTEM\CurrentControlSet\Services\$Sleep$\Parameters$a$i$n$x
                        • API String ID: 3812702976-3428715818
                        • Opcode ID: 391fcfc8539eb9d5919a778e419801ff6ff3d8d8e1af6a8a892af190ae81f974
                        • Instruction ID: 656b8730f2840debe5b44b57a15900f3d9bc3f561e08d9fea14a6ea0d0f8655a
                        • Opcode Fuzzy Hash: 391fcfc8539eb9d5919a778e419801ff6ff3d8d8e1af6a8a892af190ae81f974
                        • Instruction Fuzzy Hash: 73314831D00548AADB15C6B88C0979FBF72EF55314F488299F926AB2C1CBB59F48C751
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,74DF0BD0,?,?,00000000,?,10002534), ref: 10002AC9
                        • GetProcAddress.KERNEL32(00000000), ref: 10002AD2
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CancelIo,?,00000000,?,10002534), ref: 10002AE0
                        • GetProcAddress.KERNEL32(00000000), ref: 10002AE3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,00000000,?,10002534), ref: 10002AF3
                        • GetProcAddress.KERNEL32(00000000), ref: 10002AF6
                        • putchar.MSVCRT ref: 10002B10
                        • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10002B2D
                        • putchar.MSVCRT ref: 10002B35
                        • putchar.MSVCRT ref: 10002B47
                        • putchar.MSVCRT ref: 10002B59
                        • closesocket.WS2_32(?), ref: 10002B65
                        • putchar.MSVCRT ref: 10002B6D
                        • putchar.MSVCRT ref: 10002B7D
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$closesocketsetsockopt
                        • String ID: CancelIo$InterlockedExchange$KERNEL32.dll$SetEvent
                        • API String ID: 3616939384-4182564124
                        • Opcode ID: 22cdaf30fb1c124b0a1bfa513ced311f00fc4bcbc434222ea9ac3985815e3075
                        • Instruction ID: 80e820570aa8316687aeadd10efe1906bfac7e14aa234264a32a53d59e8af479
                        • Opcode Fuzzy Hash: 22cdaf30fb1c124b0a1bfa513ced311f00fc4bcbc434222ea9ac3985815e3075
                        • Instruction Fuzzy Hash: 8D11C3706003046BE210E7B48C95F5FB69CEF84358F014928F7998B190DBB1E9488BA3
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ResumeThread), ref: 1000161E
                        • GetProcAddress.KERNEL32(00000000), ref: 10001627
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 10001636
                        • GetProcAddress.KERNEL32(00000000), ref: 10001639
                        • GetProcAddress.KERNEL32(00000000,waveInGetNumDevs), ref: 10001649
                        • GetProcAddress.KERNEL32(00000000,waveInOpen), ref: 10001666
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: CreateThread$KERNEL32.dll$ResumeThread$waveInAddBuffer$waveInGetNumDevs$waveInOpen$waveInPrepareHeader$waveInStart
                        • API String ID: 2238633743-3299099871
                        • Opcode ID: 7c23e62d525bf484745cf17373ffefd112803f4cfd4b00d922179e5f9f2b3a25
                        • Instruction ID: 26153d58bdf52741785f43a7263c109918ace4d3c2c4c2bb7e2863db81e4dc62
                        • Opcode Fuzzy Hash: 7c23e62d525bf484745cf17373ffefd112803f4cfd4b00d922179e5f9f2b3a25
                        • Instruction Fuzzy Hash: C4417FB1A00205AFD710DFA8DC88EAABBB9FF59310F204699EA05D7345DB71ED418B90
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1000D0A0
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D0A9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 1000D0B8
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D0BB
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange), ref: 1000D0CA
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D0CD
                        • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,10019EF3,000000FF), ref: 1000D123
                        • GetProcAddress.KERNEL32(?,DestroyCursor), ref: 1000D14B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary,?,?,?,?,?,?,?,10019EF3,000000FF), ref: 1000D15A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D161
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: CloseHandle$DestroyCursor$FreeLibrary$InterlockedExchange$KERNEL32.dll$User32.dll$WaitForSingleObject
                        • API String ID: 2574300362-2298042170
                        • Opcode ID: 2e6f788b3fd0c435e2aeeaeb4e28e77bd3d1990dcefbf6004740af77da005aaf
                        • Instruction ID: 22b61fc93f8b594afbf484fe73ad82fa853709b14961d151676a2a7b1a9c52fc
                        • Opcode Fuzzy Hash: 2e6f788b3fd0c435e2aeeaeb4e28e77bd3d1990dcefbf6004740af77da005aaf
                        • Instruction Fuzzy Hash: A04164B1900649ABDB11EFF4CC84BAEB7B8FF48310F104A19E66597240DBB4ED408BA4
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 10007EFA
                        • GetProcAddress.KERNEL32(00000000), ref: 10007F03
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 10007F13
                        • GetProcAddress.KERNEL32(00000000), ref: 10007F16
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection), ref: 10007F26
                        • GetProcAddress.KERNEL32(00000000), ref: 10007F29
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection), ref: 10007F37
                        • GetProcAddress.KERNEL32(00000000), ref: 10007F3A
                          • Part of subcall function 10007DB0: _strnicmp.MSVCRT ref: 10007DC4
                        • send.WS2_32(?,HTTP/1.0 200 OK,?,00000000), ref: 1000800B
                        • send.WS2_32(?,?,00000000,00000000), ref: 10008081
                          • Part of subcall function 10007D20: atoi.MSVCRT ref: 10007D59
                          • Part of subcall function 100085C0: htons.WS2_32 ref: 100085E3
                          • Part of subcall function 100085C0: inet_addr.WS2_32(?), ref: 100085F9
                          • Part of subcall function 100085C0: inet_addr.WS2_32(?), ref: 10008617
                          • Part of subcall function 100085C0: socket.WS2_32(00000002,00000001,00000006), ref: 10008623
                          • Part of subcall function 100085C0: setsockopt.WS2_32 ref: 1000864E
                          • Part of subcall function 100085C0: connect.WS2_32(?,?,00000010), ref: 1000865E
                          • Part of subcall function 100085C0: closesocket.WS2_32 ref: 1000866C
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$inet_addrsend$_strnicmpatoiclosesocketconnecthtonssetsockoptsocket
                        • String ID: CreateThread$EnterCriticalSection$HTTP/1.0 200 OK$KERNEL32.dll$LeaveCriticalSection$WaitForSingleObject
                        • API String ID: 3052754541-739832319
                        • Opcode ID: 7da915b50903dce6945727a973b4ef154478643b5d5d4c7976fc711e11c9e9c3
                        • Instruction ID: 52866b1079af80d2b305d3905d162663b83d34c508c9b66606edd0fc3eb35aaf
                        • Opcode Fuzzy Hash: 7da915b50903dce6945727a973b4ef154478643b5d5d4c7976fc711e11c9e9c3
                        • Instruction Fuzzy Hash: 9351C271504345ABE760DB65CC44EAF7BE8FB88794F000A19F68897184DB34EE498BA2
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteCriticalSection), ref: 10008CD9
                        • GetProcAddress.KERNEL32(00000000), ref: 10008CE2
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InitializeCriticalSection), ref: 10008CF2
                        • GetProcAddress.KERNEL32(00000000), ref: 10008CF5
                        • strchr.MSVCRT ref: 10008D0B
                        • atoi.MSVCRT ref: 10008D38
                          • Part of subcall function 10008B80: WSAStartup.WS2_32(00000202,?), ref: 10008B91
                          • Part of subcall function 10008B80: socket.WS2_32(00000002,00000001,00000006), ref: 10008BA5
                          • Part of subcall function 10008B80: htons.WS2_32 ref: 10008BDC
                          • Part of subcall function 10008B80: bind.WS2_32(00000000,?,00000010), ref: 10008BF7
                          • Part of subcall function 10008B80: listen.WS2_32(00000000,00000032), ref: 10008C0C
                        • strchr.MSVCRT ref: 10008D7A
                        • strncpy.MSVCRT ref: 10008DB1
                        • strchr.MSVCRT ref: 10008DBD
                        • strncpy.MSVCRT ref: 10008DE5
                        • strncpy.MSVCRT ref: 10008E01
                        • WSACleanup.WS2_32 ref: 10008E71
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: strchrstrncpy$AddressLibraryLoadProc$CleanupStartupatoibindhtonslistensocket
                        • String ID: DeleteCriticalSection$InitializeCriticalSection$KERNEL32.dll
                        • API String ID: 1006115148-499905313
                        • Opcode ID: 75cad7a7bac20715824d92c9c192a9340d4210a9972cf71da4b207119ee3d975
                        • Instruction ID: 5f8be6a1ed72d2f484aab7dfbce2e4da3a60a98b84222065e7be3347505b39c2
                        • Opcode Fuzzy Hash: 75cad7a7bac20715824d92c9c192a9340d4210a9972cf71da4b207119ee3d975
                        • Instruction Fuzzy Hash: 624103765046085BD32CDA789C458AF7AD5FBC8360F514B2EFA26832D0DFB4DE088695
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: puts$Sleepputchar$AddressLibraryLoadProcclosesocketconnecthtonssendsocket
                        • String ID: KERNEL32.dll$Sleep
                        • API String ID: 3260058973-534790634
                        • Opcode ID: 184470e16eb88ea4019fad5a03110320653dcbeb1917fe3b4b129a9fa83417dc
                        • Instruction ID: bcd62129689d4c613132e2af378b0e7d5011e0aa68824e4f4f3977d62fecbfe9
                        • Opcode Fuzzy Hash: 184470e16eb88ea4019fad5a03110320653dcbeb1917fe3b4b129a9fa83417dc
                        • Instruction Fuzzy Hash: 9431BFB15083509BE310DF64CC89A9FBBE4EF89354F00492DF98997250D734E648C7A7
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree,?,?,00000000,74DEF550,?,100021FA,00000400,?,?,?,?), ref: 10002089
                        • GetProcAddress.KERNEL32(00000000), ref: 10002092
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualAlloc,?,100021FA,00000400,?,?,?,?), ref: 100020A2
                        • GetProcAddress.KERNEL32(00000000), ref: 100020A5
                        • puts.MSVCRT ref: 100020B4
                        • Sleep.KERNEL32(00000000,?,?,100021FA,00000400,?,?,?,?), ref: 100020D6
                        • ceil.MSVCRT ref: 100020F8
                        • _ftol.MSVCRT ref: 100020FE
                        • puts.MSVCRT ref: 1000210D
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcputs$Sleep_ftolceil
                        • String ID: KERNEL32.dll$VirtualAlloc$VirtualFree
                        • API String ID: 709144826-854231263
                        • Opcode ID: 5378d1068792a0296754f2e6aa33abd89c9b70de50dba18f36d2c0b1eef24d53
                        • Instruction ID: 67b4ca322b55172d5b2b3f26809400ec8d34f7560449fec68a2835166f1cb84b
                        • Opcode Fuzzy Hash: 5378d1068792a0296754f2e6aa33abd89c9b70de50dba18f36d2c0b1eef24d53
                        • Instruction Fuzzy Hash: 3931D671A043189BE700EF74AC9575FBB94EB84750F05843AFA419B340EBB5E948CBA2
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000057), ref: 1000F283
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F28A
                        • putchar.MSVCRT ref: 1000F2C6
                        • putchar.MSVCRT ref: 1000F2DF
                          • Part of subcall function 1000BCE0: LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,?,1000AE5B), ref: 1000BCED
                          • Part of subcall function 1000BCE0: GetProcAddress.KERNEL32(00000000), ref: 1000BCF4
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcputchar
                        • String ID: .$2$3$F$W$d$k$l$n$r$r$t
                        • API String ID: 1538228972-552937298
                        • Opcode ID: 0f27b6de2dfdc01747567f23aba05658d44cd7bac98a52a1360e8559715075e9
                        • Instruction ID: cfd7fc7050bdb867459b98675480d65a3e182ccc8e398decb3b62b5952879010
                        • Opcode Fuzzy Hash: 0f27b6de2dfdc01747567f23aba05658d44cd7bac98a52a1360e8559715075e9
                        • Instruction Fuzzy Hash: BC318962C082C9DEEB01DBE89849BEEBF759F26254F084099D98477342C7B54708C7B6
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,74DEF550,74DF0BD0,00000000), ref: 10011B0C
                        • GetProcAddress.KERNEL32(00000000), ref: 10011B15
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot), ref: 10011B24
                        • GetProcAddress.KERNEL32(00000000), ref: 10011B27
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First), ref: 10011B35
                        • GetProcAddress.KERNEL32(00000000), ref: 10011B38
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next), ref: 10011B47
                        • GetProcAddress.KERNEL32(00000000), ref: 10011B4A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA), ref: 10011B59
                        • GetProcAddress.KERNEL32(00000000), ref: 10011B5C
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: CloseHandle$CreateToolhelp32Snapshot$KERNEL32.dll$Process32First$Process32Next$lstrcmpiA
                        • API String ID: 2574300362-2568122304
                        • Opcode ID: 54dd4eeb168421093c2fb5c6fb9ba70261b7bb2e36105e4be8dbd006d9ac00a4
                        • Instruction ID: 33a7d0bff169a808deda72ae241a761edb1d2097b65121f844c3f43c11954401
                        • Opcode Fuzzy Hash: 54dd4eeb168421093c2fb5c6fb9ba70261b7bb2e36105e4be8dbd006d9ac00a4
                        • Instruction Fuzzy Hash: 7A212171D0125CB6DB11EBF58C48EDFBBA8EF48355F014595F608A7140DBB4DE808BA1
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043,74DEF550,?,02062143), ref: 1000BB74
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BB7B
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .$2$3$A$C$E$a$d$k$n$n$r$r$v
                        • API String ID: 2574300362-202716631
                        • Opcode ID: 56874e524665a964731267736d58daac631161e239299b27c2e259f170452e5b
                        • Instruction ID: d026ff1e715d9bef1d7702f1d61489e2b18bede88cf70736868d30998b8e7535
                        • Opcode Fuzzy Hash: 56874e524665a964731267736d58daac631161e239299b27c2e259f170452e5b
                        • Instruction Fuzzy Hash: 86312C61C093C9DDEB02DAF895497EEBFB5AF26204F184089D585B7382C2B94748C776
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: ??2@
                        • String ID: ICOpen$ICSendMessage$ICSeqCompressFrameStart$IV32$M263$MP42$MSVFW32.dll$cvid$vidc
                        • API String ID: 1033339047-3354383837
                        • Opcode ID: f822e3d6776e00fb8041a8986804b2f273a358f2b5952b817fd9d49a4e585832
                        • Instruction ID: ee81bd89cf373bdf8deb7698395b47bb453ca70eceb4a31eb16da47c69291720
                        • Opcode Fuzzy Hash: f822e3d6776e00fb8041a8986804b2f273a358f2b5952b817fd9d49a4e585832
                        • Instruction Fuzzy Hash: 0AB1D2B2E00209DFDB04DFA4D584AADBBB6FB49310F254259E946EB341DB74ED81CB50
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 1000F306
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F30D
                        • GetProcAddress.KERNEL32(?,PeekNamedPipe), ref: 1000F332
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree), ref: 1000F37E
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F387
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000F396
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F399
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ReadFile), ref: 1000F3A7
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F3AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: KERNEL32.dll$LocalAlloc$LocalFree$PeekNamedPipe$ReadFile$Sleep
                        • API String ID: 2238633743-3908338389
                        • Opcode ID: 57c4142caff495a6a6edc287235360e8d6fd1aef602bcf3c527697dd76cf0f4e
                        • Instruction ID: a4832e17eabea6061c2a429b004f403c802ac44fc9aaa6377eaf78ef81cbf902
                        • Opcode Fuzzy Hash: 57c4142caff495a6a6edc287235360e8d6fd1aef602bcf3c527697dd76cf0f4e
                        • Instruction Fuzzy Hash: 90312CB5900219BBEB15DBA0CD88EEF7B79EF48340F108595FA05E7240DB74EE408BA5
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot,74DEF550,00000000), ref: 100100A7
                        • GetProcAddress.KERNEL32(00000000), ref: 100100B0
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First), ref: 100100BE
                        • GetProcAddress.KERNEL32(00000000), ref: 100100C1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next), ref: 100100CF
                        • GetProcAddress.KERNEL32(00000000), ref: 100100D2
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA), ref: 100100E2
                        • GetProcAddress.KERNEL32(00000000), ref: 100100E5
                        • ??2@YAPAXI@Z.MSVCRT ref: 100100F8
                        • _stricmp.MSVCRT(00000024,?), ref: 10010119
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@_stricmp
                        • String ID: CreateToolhelp32Snapshot$KERNEL32.dll$Process32First$Process32Next$lstrcmpiA
                        • API String ID: 1309286175-2242182618
                        • Opcode ID: 1a3dfc7ac0c0e6541102edbdc541287a5c2ce652a02bb8189215e1b6d0523268
                        • Instruction ID: 2ebfecebbe8207ada7d1c7b20146d11ea3a69a26d2ab8a63f2565491de4f4a3f
                        • Opcode Fuzzy Hash: 1a3dfc7ac0c0e6541102edbdc541287a5c2ce652a02bb8189215e1b6d0523268
                        • Instruction Fuzzy Hash: 5F117561A003597AD610EBB29C49E9F7EDCEF853D1F414825FA44CB140EBB9E845C7A1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,74DEF550,74DF0BD0,00000000,00000000,?,00000000,10019B5C,000000FF,100123B3), ref: 100023FE
                        • GetProcAddress.KERNEL32(00000000), ref: 10002407
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 10002415
                        • GetProcAddress.KERNEL32(00000000), ref: 10002418
                        • puts.MSVCRT ref: 10002427
                        • Sleep.KERNEL32(00000000), ref: 10002435
                        • puts.MSVCRT ref: 1000244B
                        • puts.MSVCRT ref: 10002469
                        • putchar.MSVCRT ref: 10002479
                        • puts.MSVCRT ref: 10002490
                        • WSACleanup.WS2_32 ref: 10002495
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,74DF0BD0,?,?,00000000,?,10002534), ref: 10002AC9
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AD2
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,CancelIo,?,00000000,?,10002534), ref: 10002AE0
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AE3
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,00000000,?,10002534), ref: 10002AF3
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AF6
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B10
                          • Part of subcall function 10002AB0: setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10002B2D
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B35
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B47
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B59
                          • Part of subcall function 10002AB0: closesocket.WS2_32(?), ref: 10002B65
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B6D
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B7D
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$puts$CleanupSleepclosesocketsetsockopt
                        • String ID: CloseHandle$KERNEL32.dll$WaitForSingleObject$kernel32.dll
                        • API String ID: 47822364-3809471920
                        • Opcode ID: 2cf5aa14253fe279c61591adbf3b38a76934faa1dbed84de76ab2b76edc51f44
                        • Instruction ID: d78f0f19bb28b42d6256308152d9275956a10a08728b7f487f26977846528c0a
                        • Opcode Fuzzy Hash: 2cf5aa14253fe279c61591adbf3b38a76934faa1dbed84de76ab2b76edc51f44
                        • Instruction Fuzzy Hash: 5121C3701047889FE211EB74CC45B9FB7D8EF89354F414A2DF5A647281CBB5E9488B63
                        APIs
                        • RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?), ref: 1000C009
                        • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,00000000), ref: 1000C03B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalReAlloc), ref: 1000C083
                        • GetProcAddress.KERNEL32(00000000), ref: 1000C08C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000C09C
                        • GetProcAddress.KERNEL32(00000000), ref: 1000C09F
                        • malloc.MSVCRT ref: 1000C10F
                        • malloc.MSVCRT ref: 1000C11A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcmalloc$InfoOpenQuery
                        • String ID: KERNEL32.dll$LocalAlloc$LocalReAlloc
                        • API String ID: 1258441503-2711553049
                        • Opcode ID: 8c37f560148f30f82c7ad7b864de35396c8234b062251e6dc13cd6593f5a7f4c
                        • Instruction ID: 9172dfafab3165e71304a6681021f4a781f481aa2e306401e2f2409e7b3d4183
                        • Opcode Fuzzy Hash: 8c37f560148f30f82c7ad7b864de35396c8234b062251e6dc13cd6593f5a7f4c
                        • Instruction Fuzzy Hash: 977187716083499FD318CF68CC80A5BBBE9EBC8794F44892DF58A93340D771E909CB92
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 10010209
                        • GetProcAddress.KERNEL32(00000000), ref: 10010212
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,OpenProcess), ref: 10010221
                        • GetProcAddress.KERNEL32(00000000), ref: 10010224
                          • Part of subcall function 10010090: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot,74DEF550,00000000), ref: 100100A7
                          • Part of subcall function 10010090: GetProcAddress.KERNEL32(00000000), ref: 100100B0
                          • Part of subcall function 10010090: LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First), ref: 100100BE
                          • Part of subcall function 10010090: GetProcAddress.KERNEL32(00000000), ref: 100100C1
                          • Part of subcall function 10010090: LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next), ref: 100100CF
                          • Part of subcall function 10010090: GetProcAddress.KERNEL32(00000000), ref: 100100D2
                          • Part of subcall function 10010090: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA), ref: 100100E2
                          • Part of subcall function 10010090: GetProcAddress.KERNEL32(00000000), ref: 100100E5
                          • Part of subcall function 10010090: ??2@YAPAXI@Z.MSVCRT ref: 100100F8
                          • Part of subcall function 10010090: _stricmp.MSVCRT(00000024,?), ref: 10010119
                        • OpenProcessToken.ADVAPI32(00000000,00000008,?), ref: 1001027A
                        • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,00000000,?), ref: 100102A0
                        • ??2@YAPAXI@Z.MSVCRT ref: 100102AD
                        • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,?,?), ref: 100102CF
                        • ??2@YAPAXI@Z.MSVCRT ref: 100102F1
                        • LookupAccountSidA.ADVAPI32(00000000,00000000,00000000,00000100,?,00000104,?), ref: 10010321
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@Token$Information$AccountLookupOpenProcess_stricmp
                        • String ID: CloseHandle$KERNEL32.dll$OpenProcess$explorer.exe
                        • API String ID: 262538485-3644286086
                        • Opcode ID: eb2989b1fff5d03f98c39b57767800e2655dc431c0bf1dd0ddc44c66fb6d1c5b
                        • Instruction ID: 686f0c5367471ec8589c1892a92d5e31d5c5de1d0ba109975a8e4cc611351407
                        • Opcode Fuzzy Hash: eb2989b1fff5d03f98c39b57767800e2655dc431c0bf1dd0ddc44c66fb6d1c5b
                        • Instruction Fuzzy Hash: 73411CB1D00618ABDB51DFA5DC85BDEBBB8FF88710F10415AF519AB250E7B09981CF60
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentThreadId,00007F86,00000002,?,0000000F), ref: 1001042A
                        • GetProcAddress.KERNEL32(00000000), ref: 10010433
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA,?,0000000F), ref: 10010441
                        • GetProcAddress.KERNEL32(00000000), ref: 10010444
                        • GetThreadDesktop.USER32(00000000), ref: 10010453
                        • GetUserObjectInformationA.USER32(00000000,00000002,?,00000100,?), ref: 1001047A
                        • OpenInputDesktop.USER32(00000000,00000000,02000000), ref: 10010489
                        • GetUserObjectInformationA.USER32(00000000,00000002,?,00000100,?), ref: 100104B6
                        • SetThreadDesktop.USER32(00000000), ref: 100104D0
                        • CloseDesktop.USER32(00000000), ref: 100104E8
                        • CloseDesktop.USER32(00000000), ref: 100104EB
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Desktop$AddressCloseInformationLibraryLoadObjectProcThreadUser$InputOpen
                        • String ID: GetCurrentThreadId$KERNEL32.dll$lstrcmpiA
                        • API String ID: 2669542783-3583696425
                        • Opcode ID: 6a1f81e7cd70d3c671da6a8adc1b93085e50937805a86d6d8735f39b7fbf4705
                        • Instruction ID: 106e680e66321e465b7654eeab688ead780144e25000a5e5e3930718b96b1682
                        • Opcode Fuzzy Hash: 6a1f81e7cd70d3c671da6a8adc1b93085e50937805a86d6d8735f39b7fbf4705
                        • Instruction Fuzzy Hash: F62184712043596BE710EBA4CC89FDF77D9FB88340F014915F745A7191EBB8E8498BA1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 1000F84B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F854
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,OpenProcess), ref: 1000F864
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F867
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,TerminateProcess), ref: 1000F875
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F878
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 1000F886
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F889
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: CloseHandle$KERNEL32.dll$OpenProcess$Sleep$TerminateProcess$kernel32.dll
                        • API String ID: 2574300362-2023942180
                        • Opcode ID: bbd60b100ff63f5ddc2d5cf3de426f2c578620cc07108f38c8cb3f906a151163
                        • Instruction ID: 0f302c128fa7de2b6d215540bdc35a7e998cb7c1c2c65e33171ff27cd8f7d6c9
                        • Opcode Fuzzy Hash: bbd60b100ff63f5ddc2d5cf3de426f2c578620cc07108f38c8cb3f906a151163
                        • Instruction Fuzzy Hash: 7011A775A003546BD611FBB58C48E6FBED8EFC8790F010929FA4497240DBB4EC448BE2
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10008EF8
                        • GetProcAddress.KERNEL32(00000000), ref: 10008EFF
                        • select.WS2_32(?,?,00000000,00000000,00000000), ref: 10008F95
                        • _errno.MSVCRT ref: 10008F9F
                        • __WSAFDIsSet.WS2_32(?,?), ref: 10008FB7
                        • __WSAFDIsSet.WS2_32(?,?), ref: 10008FCD
                        • recvfrom.WS2_32(00000010,?,00004FF6,00000000,?,00000010), ref: 10009007
                        • inet_addr.WS2_32(00000000), ref: 10009088
                        • htons.WS2_32(?), ref: 10009097
                        • closesocket.WS2_32 ref: 10009143
                        • closesocket.WS2_32(?), ref: 10009149
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: closesocket$AddressLibraryLoadProc_errnohtonsinet_addrrecvfromselect
                        • String ID: KERNEL32.dll$Sleep
                        • API String ID: 2572120288-534790634
                        • Opcode ID: 647c8c9056ecafe6be0bebd789b7f7c21d1c154331daaccf2652a9b5e0a6097a
                        • Instruction ID: e79c81247fa068893c5a0a18a03b09551ee79d98065f2261218ba87f614bd604
                        • Opcode Fuzzy Hash: 647c8c9056ecafe6be0bebd789b7f7c21d1c154331daaccf2652a9b5e0a6097a
                        • Instruction Fuzzy Hash: 1D616DB5508782ABE710CF64CC48A9FB7E4FFC8754F008A2DF99997250E770DA098B56
                        APIs
                        • GetProcAddress.KERNEL32(?,GetActiveWindow), ref: 1000A904
                        • GetProcAddress.KERNEL32(?,GetWindowTextA), ref: 1000A93D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 1000A960
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A969
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetLocalTime), ref: 1000A98A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A98D
                        • wsprintfA.USER32 ref: 1000AA15
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad$wsprintf
                        • String ID: [%02u-%02u-%d %02u:%02u:%02u] (%s)$GetActiveWindow$GetLocalTime$GetWindowTextA$KERNEL32.dll$lstrcatA
                        • API String ID: 1732317035-1432727782
                        • Opcode ID: 5763eed0ed1c51fceaa045eab7ba1771b7dcbbad3d70494b22323b880b0b11d1
                        • Instruction ID: 1e46e9e7cf6953ab3ed65de4d76be8fba034e5f6a4f3c264055b66cb13503dc8
                        • Opcode Fuzzy Hash: 5763eed0ed1c51fceaa045eab7ba1771b7dcbbad3d70494b22323b880b0b11d1
                        • Instruction Fuzzy Hash: C05103B2900219AFEB04DBA4CC84DBEBB79FF8A351F244665E605E7245CB34DD418B50
                        APIs
                        • RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?), ref: 1000BE4A
                        • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00000000,00000000), ref: 1000BE7C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalReAlloc), ref: 1000BEBC
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BEC5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000BED5
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BED8
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000BF20
                        • RegEnumKeyExA.ADVAPI32(?,?,00000000,?,00000000,00000000,00000000,00000000), ref: 1000BF79
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@EnumInfoOpenQuery
                        • String ID: KERNEL32.dll$LocalAlloc$LocalReAlloc
                        • API String ID: 1594150316-2711553049
                        • Opcode ID: 1d47f7c55ed226ced2e92bebcf9672223f4d13c501e34aca67b518ebf0718e0b
                        • Instruction ID: 1e511cf904c36394fea8c543c6dbc0983839fb17e8ec9ee4041522732a303212
                        • Opcode Fuzzy Hash: 1d47f7c55ed226ced2e92bebcf9672223f4d13c501e34aca67b518ebf0718e0b
                        • Instruction Fuzzy Hash: 9A518C71608355AFD314DF29CC40A6BBBE9EBC8790F448A2DF659D7240DA31ED05CBA2
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000F6D0
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F6D9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree), ref: 1000F6EB
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F6EE
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000F6FE
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F701
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize), ref: 1000F711
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F714
                          • Part of subcall function 10004290: ??2@YAPAXI@Z.MSVCRT ref: 100042BB
                          • Part of subcall function 10004290: ??2@YAPAXI@Z.MSVCRT ref: 100042CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@
                        • String ID: KERNEL32.dll$LocalAlloc$LocalFree$LocalSize$lstrlenA
                        • API String ID: 729240022-3256744539
                        • Opcode ID: 8908c35b6e2bc7b6dc7c85cde6700387f0f506a08a2a7f144e4bdd676ec995e1
                        • Instruction ID: 09151e469b537d2d4807bf04e5168df54ca2ef505e4c2b6c081f7b3372e75f3a
                        • Opcode Fuzzy Hash: 8908c35b6e2bc7b6dc7c85cde6700387f0f506a08a2a7f144e4bdd676ec995e1
                        • Instruction Fuzzy Hash: 164136B55083859BD300DF64CC84A2FBBE5FB89394F400A2DF99997340CB78E9458B92
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: ??2@$??3@
                        • String ID:
                        • API String ID: 1245774677-0
                        • Opcode ID: d50685c07fc8e4a33409b2ae018ace28bf02c788de52f839d40d063411901558
                        • Instruction ID: 0955d762f10532c73ca106df8cf33809bd7e98a680463d9846988eb612767b71
                        • Opcode Fuzzy Hash: d50685c07fc8e4a33409b2ae018ace28bf02c788de52f839d40d063411901558
                        • Instruction Fuzzy Hash: C8C1BFB5B002058BE718CE39C89292B77D6EF882A0B16863DF9168B3C1DF71ED05C795
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree,00000000,?,?,?,?,10001DE2,00000000,?,?,?,?), ref: 10001F69
                        • GetProcAddress.KERNEL32(00000000), ref: 10001F72
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualAlloc,?,10001DE2,00000000,?,?,?,?), ref: 10001F82
                        • GetProcAddress.KERNEL32(00000000), ref: 10001F85
                        • ceil.MSVCRT ref: 10001FC0
                        • _ftol.MSVCRT ref: 10001FC6
                        • putchar.MSVCRT ref: 10001FD8
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$_ftolceilputchar
                        • String ID: KERNEL32.dll$VirtualAlloc$VirtualFree
                        • API String ID: 1002542111-854231263
                        • Opcode ID: f5311b14f0455f95b195ff1f4646f693abe788d38b50bbae20ad59dc3f208bf0
                        • Instruction ID: f10c4aba8c28df8adf62b9ebd62d7853fcf90992ae737c539b5aa2a879643abe
                        • Opcode Fuzzy Hash: f5311b14f0455f95b195ff1f4646f693abe788d38b50bbae20ad59dc3f208bf0
                        • Instruction Fuzzy Hash: 8B31D671A043045BE700EF64AC5575BBBD4EF847A0F05443AF9449B390DBB5D908CBA2
                        APIs
                        • GetProcAddress.KERNEL32(00000000,waveInAddBuffer), ref: 100018AE
                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 100018C1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 100018EB
                        • GetProcAddress.KERNEL32(00000000), ref: 100018EE
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent), ref: 10001900
                        • GetProcAddress.KERNEL32(00000000), ref: 10001903
                        • TranslateMessage.USER32(?), ref: 10001943
                        • DispatchMessageA.USER32(?), ref: 1000194D
                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1000195D
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Message$AddressProc$LibraryLoad$DispatchTranslate
                        • String ID: KERNEL32.dll$SetEvent$WaitForSingleObject$waveInAddBuffer
                        • API String ID: 323455292-1319925935
                        • Opcode ID: 0d8279d6833c800dec4d3a33bdb3b83f94fb5d191e267e8c3b1764b3d83ec4d5
                        • Instruction ID: 00e73342f542f1f5e5f269486634e561f78a75a8fe6509b01a3d07f81f72cb1b
                        • Opcode Fuzzy Hash: 0d8279d6833c800dec4d3a33bdb3b83f94fb5d191e267e8c3b1764b3d83ec4d5
                        • Instruction Fuzzy Hash: 9C21B471A00715ABE720DBB5CC88FAAB7B8EF48351F108619F615E7184DB74E9408B60
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,00000000,?,00000000,74DEF550,?,10004B40,00000000), ref: 10005187
                        • GetProcAddress.KERNEL32(00000000), ref: 10005190
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,MultiByteToWideChar,?,00000000,74DEF550,?,10004B40,00000000), ref: 1000519E
                        • GetProcAddress.KERNEL32(00000000), ref: 100051A1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WideCharToMultiByte,?,00000000,74DEF550,?,10004B40,00000000), ref: 100051B1
                        • GetProcAddress.KERNEL32(00000000), ref: 100051B4
                        • ??2@YAPAXI@Z.MSVCRT ref: 100051D1
                        • ??2@YAPAXI@Z.MSVCRT ref: 100051D9
                        • ??3@YAXPAX@Z.MSVCRT ref: 10005205
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@$??3@
                        • String ID: KERNEL32.dll$MultiByteToWideChar$WideCharToMultiByte$lstrlenA
                        • API String ID: 2774626721-4059950253
                        • Opcode ID: d7cacddbd15bfb88fcbe6019714b75dbf31395039c7574a945899cfd78a14b52
                        • Instruction ID: 9c5c66fe498036c3d4431d75e68116c0c9bfaf470cc058836bda1e038a9e4851
                        • Opcode Fuzzy Hash: d7cacddbd15bfb88fcbe6019714b75dbf31395039c7574a945899cfd78a14b52
                        • Instruction Fuzzy Hash: F8110672A4035836D610F6B62C49F4FBE9CDF967B1F110532FB04AB180DA75E84486F6
                        APIs
                        • GetProcAddress.KERNEL32(?,ICSendMessage), ref: 10011911
                        • GetProcAddress.KERNEL32(?,ICSeqCompressFrameEnd), ref: 1001192B
                        • GetProcAddress.KERNEL32(?,ICCompressorFree), ref: 1001193C
                        • GetProcAddress.KERNEL32(?,ICClose), ref: 1001194A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10011958
                        • GetProcAddress.KERNEL32(00000000), ref: 1001195F
                        • ??3@YAXPAX@Z.MSVCRT ref: 10011979
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$??3@LibraryLoad
                        • String ID: FreeLibrary$ICClose$ICCompressorFree$ICSendMessage$ICSeqCompressFrameEnd$KERNEL32.dll
                        • API String ID: 3057795744-1660901631
                        • Opcode ID: 027f405a1c8a5098067f5e9ccd07a3d626195aca3d9361b2bfb60785c11bc74e
                        • Instruction ID: 4d79a081a2b0dbb5144a50138e913ac24297a08ce51522ac81cfc057e2ab5203
                        • Opcode Fuzzy Hash: 027f405a1c8a5098067f5e9ccd07a3d626195aca3d9361b2bfb60785c11bc74e
                        • Instruction Fuzzy Hash: 380161B6200B546BE221E7B98C84E8BB2EDDF88740B014C28F761D7260CB75FC818B60
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000E603
                        • putchar.MSVCRT ref: 1000E664
                        • GetDC.USER32(00000000), ref: 1000E66A
                        • putchar.MSVCRT ref: 1000E675
                        • putchar.MSVCRT ref: 1000E686
                        • GetProcAddress.KERNEL32(?,CreateCompatibleBitmap), ref: 1000E69B
                        • GetProcAddress.KERNEL32(?,GetDIBits), ref: 1000E6D1
                        • ReleaseDC.USER32(00000000,?), ref: 1000E6FE
                        • GetProcAddress.KERNEL32(?,DeleteObject), ref: 1000E719
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProcputchar$??2@Release
                        • String ID: CreateCompatibleBitmap$DeleteObject$GetDIBits
                        • API String ID: 2864807487-483435919
                        • Opcode ID: a87edf00a4808446149df7ba30ef71a4b00c28d3ba07bbec9b7e9cb8e6e3ba50
                        • Instruction ID: c12efb4bc809e3de7e5bbfb8e1ce1d6d505bb2f9d693b4d46cc8469a21d4e5ee
                        • Opcode Fuzzy Hash: a87edf00a4808446149df7ba30ef71a4b00c28d3ba07bbec9b7e9cb8e6e3ba50
                        • Instruction Fuzzy Hash: D35127B2900255AFE704DF28DC88AA9BBA5FF55314F15C1AAF915DF361D7B0DA02CB80
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000A2C2
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 1000A308
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A311
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 1000A320
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A323
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1000A334
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A337
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000A41B
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@??3@
                        • String ID: CloseHandle$CreateThread$KERNEL32.dll$Sleep
                        • API String ID: 2249131349-2798766653
                        • Opcode ID: bfcdd782b3c82d2f8fe0afc77d9375d24df26a339858dc50b9d355b766c7d066
                        • Instruction ID: 44d532e6d1b5cab07083413fdeb4812748d7a018b959a1b577aa736fe4627f3f
                        • Opcode Fuzzy Hash: bfcdd782b3c82d2f8fe0afc77d9375d24df26a339858dc50b9d355b766c7d066
                        • Instruction Fuzzy Hash: 474126B5D00208BFEB00DFB48C89F9D7AA5FB66380F154164F605EB281E7B4DA818B40
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection,?,00000000,?,?,00000000,759A3A20,?,?,?,00000000,10019B70,000000FF,?,100027E7), ref: 10001E49
                        • GetProcAddress.KERNEL32(00000000), ref: 10001E52
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection,?,?,00000000,759A3A20,?,?,?,00000000,10019B70,000000FF,?,100027E7,?), ref: 10001E64
                        • GetProcAddress.KERNEL32(00000000), ref: 10001E67
                        • Sleep.KERNEL32(00000000,?,?,00000000,759A3A20,?,?,?,00000000,10019B70,000000FF,?,100027E7,?), ref: 10001E6D
                        • Sleep.KERNEL32(00000000,?,?,00000000,759A3A20,?,?,?,00000000,10019B70,000000FF,?,100027E7,?), ref: 10001ED2
                        • memmove.MSVCRT ref: 10001EE6
                        • Sleep.KERNEL32(00000000,?,?,?,00000000,759A3A20,?,?,?,00000000,10019B70,000000FF,?,100027E7,?), ref: 10001EF1
                        • putchar.MSVCRT ref: 10001F14
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Sleep$AddressLibraryLoadProc$memmoveputchar
                        • String ID: EnterCriticalSection$KERNEL32.dll$LeaveCriticalSection
                        • API String ID: 912286022-1950043958
                        • Opcode ID: 1a2a2bd3c4118896cdd056336935b0cf6cf6125520f30055565659cde7f11279
                        • Instruction ID: eccae69e5102e23f90fbc1400e1d47b36914905a76f09ad57e49f820cb905a2f
                        • Opcode Fuzzy Hash: 1a2a2bd3c4118896cdd056336935b0cf6cf6125520f30055565659cde7f11279
                        • Instruction Fuzzy Hash: 4021A0366002195BD704FFB49C91AAFBB99EF84290F054479FA019B246DF75ED0887E1
                        APIs
                        • LoadLibraryA.KERNEL32(Shell32.dll), ref: 10007C49
                        • GetProcAddress.KERNEL32(00000000,ShellExecuteA), ref: 10007C59
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10007C67
                        • GetProcAddress.KERNEL32(00000000), ref: 10007C6A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: FreeLibrary$KERNEL32.dll$Shell32.dll$ShellExecuteA$e$n$o$p
                        • API String ID: 2574300362-2349682124
                        • Opcode ID: b9e0edf3f4df24e08de4b228d8db5f39e27349f92bbd7a006c3a865600ea2cf8
                        • Instruction ID: 11d82ed1ce08c2d56356509464648dab1a31a934e30de640c98d0ce6ea347312
                        • Opcode Fuzzy Hash: b9e0edf3f4df24e08de4b228d8db5f39e27349f92bbd7a006c3a865600ea2cf8
                        • Instruction Fuzzy Hash: 9D0168201083846AE200E6388C40F6FFBC4EFD9399F050A5CF588572C0C7B6DD4987BA
                        APIs
                        • putchar.MSVCRT ref: 10012FC8
                        • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,000F003F,?,75A8F1B0), ref: 10012FE6
                        • putchar.MSVCRT ref: 10012FFE
                        • RegQueryValueExA.ADVAPI32 ref: 10013050
                        • RegCloseKey.ADVAPI32(?), ref: 1001305B
                        • _stricmp.MSVCRT(?,C:\Program Files (x86)\Iefg\Nefghijkl.pic), ref: 1001306B
                        Strings
                        • \Parameters, xrefs: 10012F9A
                        • SYSTEM\CurrentControlSet\Services\, xrefs: 10012F47
                        • C:\Program Files (x86)\Iefg\Nefghijkl.pic, xrefs: 10013065
                        • Defghi Klmnopqr Tuv, xrefs: 10012F69
                        • ServiceDll, xrefs: 1001303A
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$CloseOpenQueryValue_stricmp
                        • String ID: C:\Program Files (x86)\Iefg\Nefghijkl.pic$Defghi Klmnopqr Tuv$SYSTEM\CurrentControlSet\Services\$ServiceDll$\Parameters
                        • API String ID: 2222881598-1181091016
                        • Opcode ID: fafd8fc2c1ee435cdd7456266d05dc10da5760be41d8e0e15c389fcccebb80f6
                        • Instruction ID: 172bcb438a44e1edeeddb3111f318fa3f9c130a51982fd021ea6d174d8f01146
                        • Opcode Fuzzy Hash: fafd8fc2c1ee435cdd7456266d05dc10da5760be41d8e0e15c389fcccebb80f6
                        • Instruction Fuzzy Hash: 073128312046042BE718CA78CC557AB7795FBC4320F904A3DF65A972D0DAB49A0DC792
                        APIs
                          • Part of subcall function 1000BAE0: LoadLibraryA.KERNEL32(0000006B,00000043,74DEF550,?,02062143), ref: 1000BB74
                          • Part of subcall function 1000BAE0: GetProcAddress.KERNEL32(00000000), ref: 1000BB7B
                        • putchar.MSVCRT ref: 1000A4F9
                        • LoadLibraryA.KERNEL32(IMM32.dll), ref: 1000A510
                        • putchar.MSVCRT ref: 1000A527
                        • LoadLibraryA.KERNEL32(user32.dll), ref: 1000A53E
                        • putchar.MSVCRT ref: 1000A555
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 1000A59B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A5A2
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: LibraryLoad$putchar$AddressProc
                        • String ID: IMM32.dll$KERNEL32.dll$Sleep$user32.dll
                        • API String ID: 1608385978-2989729630
                        • Opcode ID: 483df61e1388b3766e4fc3ef24f4339834b21e875271673a3085238bfbfe6df0
                        • Instruction ID: 369412b175836c1cd4be7d870a70c29b12889e7913f010337c978ba3e31e77de
                        • Opcode Fuzzy Hash: 483df61e1388b3766e4fc3ef24f4339834b21e875271673a3085238bfbfe6df0
                        • Instruction Fuzzy Hash: 8931E4796006149BF700DF64CCC5B9A7BA9FF4A391F0041A9FA068B365CB70D901CB51
                        APIs
                        • LoadLibraryA.KERNEL32 ref: 10011190
                        • GetProcAddress.KERNEL32(00000000), ref: 10011199
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange), ref: 100111A7
                        • GetProcAddress.KERNEL32(00000000), ref: 100111AA
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 100111BA
                        • GetProcAddress.KERNEL32(00000000), ref: 100111BD
                          • Part of subcall function 1000BBE0: LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,74DF0BD0,1000974D), ref: 1000BBF3
                          • Part of subcall function 1000BBE0: GetProcAddress.KERNEL32(00000000), ref: 1000BBFA
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: CloseHandle$InterlockedExchange$KERNEL32.dll$WaitForSingleObject$kernel32.dll
                        • API String ID: 2574300362-1578280562
                        • Opcode ID: e91c4d8f141cb9723779da5c9419121d4f360fa600f13cead8d7a31c036ac56e
                        • Instruction ID: f5d13ae2897e68361ed96a281903b064943801b35e1352852a2484c0a38b3074
                        • Opcode Fuzzy Hash: e91c4d8f141cb9723779da5c9419121d4f360fa600f13cead8d7a31c036ac56e
                        • Instruction Fuzzy Hash: 25118271504784ABC211EFA48C44F5FB7A8FB88760F110B1DF26597290CBB8D8848BA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: inet_ntoa$htons$inet_addr
                        • String ID:
                        • API String ID: 2325850693-0
                        • Opcode ID: c45103d885fd92be750276a8694257432146acdbe33b862109c6a28506e57a6d
                        • Instruction ID: 06e12904e5218c81b4e9040584a028b9bb7e8ea56ee9a0ed9b1d271d6cfd16d2
                        • Opcode Fuzzy Hash: c45103d885fd92be750276a8694257432146acdbe33b862109c6a28506e57a6d
                        • Instruction Fuzzy Hash: 0451223A2046544BCB18CF3498901AFB7E2FF89661B59846DED8AD7381DB31ED06C7A4
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForMultipleObjects), ref: 1000F433
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F43A
                        • putchar.MSVCRT ref: 1000F459
                        • putchar.MSVCRT ref: 1000F46C
                        • GetProcAddress.KERNEL32(?,TerminateThread), ref: 1000F487
                        • GetProcAddress.KERNEL32(?,TerminateProcess), ref: 1000F4B0
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,74DF0BD0,?,?,00000000,?,10002534), ref: 10002AC9
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AD2
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,CancelIo,?,00000000,?,10002534), ref: 10002AE0
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AE3
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,00000000,?,10002534), ref: 10002AF3
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AF6
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B10
                          • Part of subcall function 10002AB0: setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10002B2D
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B35
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B47
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B59
                          • Part of subcall function 10002AB0: closesocket.WS2_32(?), ref: 10002B65
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B6D
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B7D
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$AddressProc$LibraryLoad$closesocketsetsockopt
                        • String ID: KERNEL32.dll$TerminateProcess$TerminateThread$WaitForMultipleObjects
                        • API String ID: 4283027344-2489239429
                        • Opcode ID: 5c7e3796056e4cbd3379f5c872fddea207afd272e04c54cea7f7c62c049bb4e7
                        • Instruction ID: fde39d320287b4dd3584fb3fb776219f39cffd84d4f36fbccbecf11c1a9422b1
                        • Opcode Fuzzy Hash: 5c7e3796056e4cbd3379f5c872fddea207afd272e04c54cea7f7c62c049bb4e7
                        • Instruction Fuzzy Hash: D9210EB6900218AFE701EBB0DC89EAA7F78FB09320F114655FA56D7290DB70E940CA90
                        APIs
                          • Part of subcall function 1000BAE0: LoadLibraryA.KERNEL32(0000006B,00000043,74DEF550,?,02062143), ref: 1000BB74
                          • Part of subcall function 1000BAE0: GetProcAddress.KERNEL32(00000000), ref: 1000BB7B
                        • LoadLibraryA.KERNEL32(kernel32.dll,lstrcpyA,?,74DEF550,74DF0BD0,00000000,02062143,?,?), ref: 100095D8
                        • GetProcAddress.KERNEL32(00000000), ref: 100095E1
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 100095EF
                        • GetProcAddress.KERNEL32(00000000), ref: 100095F2
                        • LoadLibraryA.KERNEL32(kernel32.dll,CreateThread), ref: 10009602
                        • GetProcAddress.KERNEL32(00000000), ref: 10009605
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: CloseHandle$CreateThread$kernel32.dll$lstrcpyA
                        • API String ID: 2574300362-3792933955
                        • Opcode ID: 9091bcc8e501bd56a2bc30e6ea4072968cb40d9c146612e1e15759d62e73b9ad
                        • Instruction ID: fe7ce33b4d86a413b075f2b16fa1947077f76fb4672d29feb2f1acfd94731923
                        • Opcode Fuzzy Hash: 9091bcc8e501bd56a2bc30e6ea4072968cb40d9c146612e1e15759d62e73b9ad
                        • Instruction Fuzzy Hash: 89218C71604784ABE310DB69CC40F9BBBE8EF88B54F01091CF259D7280C7B5EC408B66
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$closesocketsetsockopt
                        • String ID: bad Allocate$bad buffer
                        • API String ID: 3616939384-2913219628
                        • Opcode ID: 3e0046746b5ce4adc019aa3c9e3aba578350255f0b2243ae27adee8c6788bd2d
                        • Instruction ID: 9dd5e3e30a0f3f0958516b7de65f22ec458712ef5f89b2b598548e140e2be646
                        • Opcode Fuzzy Hash: 3e0046746b5ce4adc019aa3c9e3aba578350255f0b2243ae27adee8c6788bd2d
                        • Instruction Fuzzy Hash: D851B775A00149ABEF04DFA5CC91BEF77B9EF88780F008129F905AB245DF34EA458791
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,?,?,?,00000000,?,00000000,?,?,?,?), ref: 10002D37
                        • GetProcAddress.KERNEL32(00000000), ref: 10002D3E
                        • puts.MSVCRT ref: 10002D77
                        • send.WS2_32(?,?,?,00000000), ref: 10002D8F
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 10002D99
                        • Sleep.KERNEL32(00000000), ref: 10002DC2
                        • send.WS2_32(?,?,?,00000000), ref: 10002DEF
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Sleepsend$AddressLibraryLoadProcputs
                        • String ID: KERNEL32.dll$Sleep
                        • API String ID: 506547598-534790634
                        • Opcode ID: e9db4176a47c9d4d603cf89a5d6947398456bd026460020f4cc68f733c8cd9a6
                        • Instruction ID: fb6095805535c0a94b1921df8d56cda95d35855f03679ee4b773a2e70032a466
                        • Opcode Fuzzy Hash: e9db4176a47c9d4d603cf89a5d6947398456bd026460020f4cc68f733c8cd9a6
                        • Instruction Fuzzy Hash: 86319A726043549BE300DF24CC88B0FBBE4FB88798F110A2EF998A7290D770DD458B92
                        APIs
                        • LoadLibraryA.KERNEL32(Shell32.dll), ref: 10005738
                        • GetProcAddress.KERNEL32(?,ShellExecuteA), ref: 1000575A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10005769
                        • GetProcAddress.KERNEL32(00000000), ref: 10005770
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: FreeLibrary$KERNEL32.dll$Shell32.dll$ShellExecuteA$open
                        • API String ID: 2574300362-3909544775
                        • Opcode ID: 4c6c1ddee89bdf1601a2266b15924c516d2a5e3d68bab9ce85e7b424c8057b02
                        • Instruction ID: 41d5c09341cedf949a8e495c982338020b92463cc999780d4f0196b9bd5c9131
                        • Opcode Fuzzy Hash: 4c6c1ddee89bdf1601a2266b15924c516d2a5e3d68bab9ce85e7b424c8057b02
                        • Instruction Fuzzy Hash: 9A1190B2C00248AEEB01EBF4DD4DBBEBF79EB26315F144195F945E6241D7B48E4087A0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc
                        • String ID: EnumWindows$user32.dll
                        • API String ID: 2374183287-245904054
                        • Opcode ID: b8208c4cab019e14eb58bd8ef4f3bd53baaea404a3de742ce8d18416d34b44b3
                        • Instruction ID: c45bb8d21575c65a63a34b4907720d092ae53db163c7da872aa286adcdab7aee
                        • Opcode Fuzzy Hash: b8208c4cab019e14eb58bd8ef4f3bd53baaea404a3de742ce8d18416d34b44b3
                        • Instruction Fuzzy Hash: F511CEB2C40104BFF701ABB8AD8EAAB7F28FB02326F154151F946C5260E7B09A408656
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,00000F9F,?,00000000,00000001,000000FF,?,759A3A20), ref: 10002EA6
                        • GetProcAddress.KERNEL32(00000000), ref: 10002EAF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetLocalTime,?,759A3A20), ref: 10002EBD
                        • GetProcAddress.KERNEL32(00000000), ref: 10002EC0
                        • rand.MSVCRT ref: 10002EDB
                        • rand.MSVCRT ref: 10002F0C
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcrand
                        • String ID: GetLocalTime$GetTickCount$KERNEL32.dll
                        • API String ID: 1703804876-841556142
                        • Opcode ID: e0a8aa6874521f8d6e43febe6ec1c5afea584208fed4c954f0b4b3749d8d9869
                        • Instruction ID: 7a3049161d37d83d8d956c1facf6c928a5037acca9d7e249140b39230d5f9e00
                        • Opcode Fuzzy Hash: e0a8aa6874521f8d6e43febe6ec1c5afea584208fed4c954f0b4b3749d8d9869
                        • Instruction Fuzzy Hash: 5011E373A0066617D720EBE8CC455AB7795EFC83A0F8E4675EE18D3240D238DC1846D0
                        APIs
                        • LoadLibraryA.KERNEL32(User32.dll), ref: 1000CFB7
                        • GetProcAddress.KERNEL32(?,DestroyCursor), ref: 1000CFE3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 1000CFF2
                        • GetProcAddress.KERNEL32(00000000), ref: 1000CFF9
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000D02D
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??3@
                        • String ID: DestroyCursor$FreeLibrary$KERNEL32.dll$User32.dll
                        • API String ID: 845963415-3389378975
                        • Opcode ID: 2a65dc85002af9b5ba2a96eb6b2987ff4408610064f565c2702aee200e0c8c90
                        • Instruction ID: 0980dc21b89a1b23c15b38efa359d04a0eb62cea6c8e067bad16bb8c0a79e0c5
                        • Opcode Fuzzy Hash: 2a65dc85002af9b5ba2a96eb6b2987ff4408610064f565c2702aee200e0c8c90
                        • Instruction Fuzzy Hash: C911A0B2C00208ABDB01EFB49D8DAAEBF68FF15350F1549A6FA45D7201D774DE818A94
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,74DEF550,74DF0BD0,00000001), ref: 1000B759
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B762
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,UnmapViewOfFile), ref: 1000B771
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B774
                        • GetProcAddress.KERNEL32(?,UnhookWindowsHookEx), ref: 1000B78E
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: CloseHandle$KERNEL32.dll$UnhookWindowsHookEx$UnmapViewOfFile
                        • API String ID: 2238633743-600064166
                        • Opcode ID: 07d5ef75f54fa1f0ecd40d4cca29776b7b21d514a83f9c3f189d2ea07221cf66
                        • Instruction ID: 51fce7eb2b97b11f9ffc7c4898600e953d8dcb7a15d4a7eb49c6ef8d6e20fbd7
                        • Opcode Fuzzy Hash: 07d5ef75f54fa1f0ecd40d4cca29776b7b21d514a83f9c3f189d2ea07221cf66
                        • Instruction Fuzzy Hash: 3A113CB6D00228ABD701EBF48D8889EBB79FB983567218596FA05D7210D774D9418B90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: strstr$CloseQueryValue
                        • String ID: 2000$2003$2008$ProductName
                        • API String ID: 810289328-4212795574
                        • Opcode ID: 84ae04167add677d625ab3ccad7ad6b31fcf3dcb0772e9791728c43eae7912cd
                        • Instruction ID: 601a36fe5f5d9a92ebcfe6db4435d00f9b4456b4edcac870eabdc3e630252293
                        • Opcode Fuzzy Hash: 84ae04167add677d625ab3ccad7ad6b31fcf3dcb0772e9791728c43eae7912cd
                        • Instruction Fuzzy Hash: F401AD715003126BE600DB58EDA9BDB77ECEF88349F408818F98893140F735EA088BA3
                        APIs
                        • GetProcAddress.KERNEL32(?,CreateDIBSection), ref: 1000E8AA
                        • GetProcAddress.KERNEL32(?,SelectObject), ref: 1000E8F7
                        • GetProcAddress.KERNEL32(?,BitBlt), ref: 1000E92E
                        • GetProcAddress.KERNEL32(?,DeleteObject), ref: 1000E9B8
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc
                        • String ID: BitBlt$CreateDIBSection$DeleteObject$SelectObject
                        • API String ID: 190572456-815035257
                        • Opcode ID: 503d731b9095df9c6d03a02a2006f9597252b66ce2278101a9cb687525f596f4
                        • Instruction ID: 004b18f6554b730f5c45cf184dca801f8e09d9ae1f9ae04991f37051ec486055
                        • Opcode Fuzzy Hash: 503d731b9095df9c6d03a02a2006f9597252b66ce2278101a9cb687525f596f4
                        • Instruction Fuzzy Hash: B0519DB6900208AFD704DFA8CD89E6EBBB9FF48310B258659FA06D7351D770ED018B94
                        APIs
                        • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,000F003F,00000000,?,?,?,75A8F1B0), ref: 100130C1
                        • RegQueryValueExA.ADVAPI32(?,imgsvc,00000000,00000007,?), ref: 10013119
                        • RegCloseKey.ADVAPI32(?), ref: 1001312C
                        • _stricmp.MSVCRT(?,Defghi Klmnopqr Tuv), ref: 10013159
                        • RegCloseKey.ADVAPI32(?), ref: 100131AD
                        Strings
                        • SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost, xrefs: 100130A3
                        • Defghi Klmnopqr Tuv, xrefs: 10013153
                        • imgsvc, xrefs: 1001310B
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Close$OpenQueryValue_stricmp
                        • String ID: Defghi Klmnopqr Tuv$SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost$imgsvc
                        • API String ID: 3475241718-1899898062
                        • Opcode ID: 9bf4d1f0bfeb4b7e54a4a3deed1d59b0a146391428f8cbc132b5b48e89963b7a
                        • Instruction ID: 21c96db37a89fab73345ab23cfc66b206060dc6afe70c1b6738f8fb2a5fb681c
                        • Opcode Fuzzy Hash: 9bf4d1f0bfeb4b7e54a4a3deed1d59b0a146391428f8cbc132b5b48e89963b7a
                        • Instruction Fuzzy Hash: DF3134362043066BE704CA64CC84BBBB7E4FB847A0F40892DF95197190DBB9ED0D87A1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,10019F21,000000FF,1000D365,?,?,?,?,?,?,10019F30,000000FF), ref: 1000D1D3
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D1DA
                        • CloseHandle.KERNEL32(?,?,?,10019F21,000000FF,1000D365,?,?,?,?,?,?,10019F30,000000FF), ref: 1000D1F0
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000D214
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000D245
                          • Part of subcall function 1000DC60: LoadCursorA.USER32(00000000,00000000), ref: 1000DD11
                          • Part of subcall function 1000DC60: LoadLibraryA.KERNEL32(GDI32.dll), ref: 1000DD37
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000D26C
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: ??2@Load$Library$AddressCloseCursorHandleProc
                        • String ID: KERNEL32.dll$WaitForSingleObject
                        • API String ID: 261307611-3889371928
                        • Opcode ID: ffb439ba301902b4dbac372751125f6ee189a38e30c5d73aed1d79768ab87827
                        • Instruction ID: 51312dc75bc5faf12228c5e910e794450c8203c9dd932687773c32088200b489
                        • Opcode Fuzzy Hash: ffb439ba301902b4dbac372751125f6ee189a38e30c5d73aed1d79768ab87827
                        • Instruction Fuzzy Hash: 0C31E574604741ABF720DF248C56B5FBAE1EF55740F004A2DF2569B2C1DBB1E848C7A6
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcmallocputcharstrrchr
                        • String ID: CreateProcessA$D$KERNEL32.dll
                        • API String ID: 189992226-1276209912
                        • Opcode ID: 2a03e6ac6b0066ddbd6cc564a7abdc43b91a812419abc5c1008d298fe253afe7
                        • Instruction ID: eba57bcc8d31b89eaa507860f832d070f9dbc449a745fdd333c5c3cac8a74b20
                        • Opcode Fuzzy Hash: 2a03e6ac6b0066ddbd6cc564a7abdc43b91a812419abc5c1008d298fe253afe7
                        • Instruction Fuzzy Hash: 372138B26042001BE614A764AC44AABB7D5EBC4371F00053AFE46D3290EF76D84982B2
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcmallocputcharstrrchr
                        • String ID: CreateProcessA$D$KERNEL32.dll
                        • API String ID: 189992226-1276209912
                        • Opcode ID: 947060a2213fbea0ad5f5441051ecb0ae5e951f146b3ae58568aba0f1adce1c5
                        • Instruction ID: 2828d72653d2406cdddd6234a8948036db010591438d37b1094796d04063a2f8
                        • Opcode Fuzzy Hash: 947060a2213fbea0ad5f5441051ecb0ae5e951f146b3ae58568aba0f1adce1c5
                        • Instruction Fuzzy Hash: A71127B27042501BE214E768AC45AABB7D5FBC4371F01053AFE46D7280DFBADD4982B2
                        APIs
                        • LoadLibraryA.KERNEL32(AVICAP32.dll,?,00000000,00000000), ref: 10011A65
                        • GetProcAddress.KERNEL32(?,capGetDriverDescriptionA), ref: 10011A91
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10011AA0
                        • GetProcAddress.KERNEL32(00000000), ref: 10011AA7
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: AVICAP32.dll$FreeLibrary$KERNEL32.dll$capGetDriverDescriptionA
                        • API String ID: 2574300362-2837770986
                        • Opcode ID: 32f65fddd331245a191edc55556fec79f9fbfc0edb3604ae48f742ba754f073f
                        • Instruction ID: e37c0a250960508e2cf7d0eb12f9adc44ae83a7f4b6d446a4907b195bf076639
                        • Opcode Fuzzy Hash: 32f65fddd331245a191edc55556fec79f9fbfc0edb3604ae48f742ba754f073f
                        • Instruction Fuzzy Hash: 4C11C672D00258BFDB119BF49C48BEEBF78EF1A311F004591FA55E7101D7748A458794
                        APIs
                        • LoadLibraryA.KERNEL32(User32.dll), ref: 1000CF27
                        • GetProcAddress.KERNEL32(?,DestroyCursor), ref: 1000CF53
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 1000CF62
                        • GetProcAddress.KERNEL32(00000000), ref: 1000CF69
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: DestroyCursor$FreeLibrary$KERNEL32.dll$User32.dll
                        • API String ID: 2574300362-3389378975
                        • Opcode ID: 1443308fdc6f6ce54cedbede98953e31b2f09f3fa0f3bb9e07ba7cc8d5c52e4d
                        • Instruction ID: 4e33f39dcdbe39727c16940ce3d8678dbc847f33df06c372395ef2de23fa33ca
                        • Opcode Fuzzy Hash: 1443308fdc6f6ce54cedbede98953e31b2f09f3fa0f3bb9e07ba7cc8d5c52e4d
                        • Instruction Fuzzy Hash: DB0100B2C00208ABDB01EBF4CD4C9AEBF79FF08321B1149A5FA04E7200D774DE418A80
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,74DEF550,?,00000000,74DF0BD0,00000000), ref: 10001CAC
                        • GetProcAddress.KERNEL32(?,InitializeCriticalSection), ref: 10001CD8
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10001CE6
                        • GetProcAddress.KERNEL32(00000000), ref: 10001CED
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: FreeLibrary$InitializeCriticalSection$KERNEL32.dll$kernel32.dll
                        • API String ID: 2574300362-2472849579
                        • Opcode ID: eaae7cc9a550c319ea947826e4ee7f3b195cceae9d57f4325eb129900523a7b7
                        • Instruction ID: 6aa86751103756ba19ab13df35f8fab319288fc9f805d5be92915ca29492b1da
                        • Opcode Fuzzy Hash: eaae7cc9a550c319ea947826e4ee7f3b195cceae9d57f4325eb129900523a7b7
                        • Instruction Fuzzy Hash: 140192B2C00208AF9701EFF49D4846EBFB8FE0922572585AAEA09D7200E775DD418B94
                        APIs
                        • LoadLibraryA.KERNEL32 ref: 100096F0
                        • GetProcAddress.KERNEL32(00000000), ref: 100096F9
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 10009707
                        • GetProcAddress.KERNEL32(00000000), ref: 1000970A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: CloseHandle$KERNEL32.dll$TerminateThread$kernel32.dll
                        • API String ID: 2574300362-2388941276
                        • Opcode ID: 9c09ad6fb2e4c1b93b1673bce2ebe0496d65afa23dafe971fcb38650b6fd562b
                        • Instruction ID: 199db684e3ee1caa01176aa0a35859e622a5c42fe252f77eb2cb49d84e941425
                        • Opcode Fuzzy Hash: 9c09ad6fb2e4c1b93b1673bce2ebe0496d65afa23dafe971fcb38650b6fd562b
                        • Instruction Fuzzy Hash: 5411C6756047419BC710DFA8CC84B8AFBE8FF48761F510B29F56897280C7B4EC408BA1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,?,?,00000000,?,100046B6,?,?,?,L$_RasDefaultCredentials#0), ref: 10004604
                        • GetProcAddress.KERNEL32(00000000), ref: 1000460D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,MultiByteToWideChar,?,00000000,?,100046B6,?,?,?,L$_RasDefaultCredentials#0), ref: 1000461B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000461E
                        • malloc.MSVCRT ref: 1000463F
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$malloc
                        • String ID: KERNEL32.dll$MultiByteToWideChar$lstrlenA
                        • API String ID: 1625907898-1681667406
                        • Opcode ID: bc7e2323f6949f8a37bfcc0e61b844eca8e5f04e3f8cd3779ccc68e2a2f6caa2
                        • Instruction ID: 83b7b65355f7706635673efdd8426b0e3c15878589515ca315a3fb5add5cecd5
                        • Opcode Fuzzy Hash: bc7e2323f6949f8a37bfcc0e61b844eca8e5f04e3f8cd3779ccc68e2a2f6caa2
                        • Instruction Fuzzy Hash: 86F0A4A15406556AF210A7B48C86E6BB7ACEF58351F01882AF64597240DA78EC408771
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B4B8
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B4C1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapFree), ref: 1000B4CF
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B4D2
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000B4EF
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??3@
                        • String ID: GetProcessHeap$HeapFree$KERNEL32.dll
                        • API String ID: 845963415-3454514201
                        • Opcode ID: 462d4b85e1a1034cc3431bf106a58a17e61dcdca0540b7c48d4856ecf14e4768
                        • Instruction ID: 8e82963ce2f20f439254b5526edf320060cb151459a6c3e457815943d93f1a4e
                        • Opcode Fuzzy Hash: 462d4b85e1a1034cc3431bf106a58a17e61dcdca0540b7c48d4856ecf14e4768
                        • Instruction Fuzzy Hash: 56F0C2729046556BE601EBE69C48E5BEBCCEFD57A0F028426F614AB201CBB4EC4086B1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentThreadId,?,00000000), ref: 10010512
                        • GetProcAddress.KERNEL32(00000000), ref: 10010519
                        • GetThreadDesktop.USER32(00000000), ref: 10010522
                        • GetUserObjectInformationA.USER32(?,00000002,?,00000100,?), ref: 10010543
                        • SetThreadDesktop.USER32(?), ref: 10010557
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: DesktopThread$AddressInformationLibraryLoadObjectProcUser
                        • String ID: GetCurrentThreadId$KERNEL32.dll
                        • API String ID: 3036381255-1458786552
                        • Opcode ID: 18770a1fe4dbcf73fa969aebd7f5b6486168eeef38b4a8067ef0f2da3bddd3d6
                        • Instruction ID: 833e892427034d026e993ccb682bb8696454c43104ed07a143a44b4b5f7b0140
                        • Opcode Fuzzy Hash: 18770a1fe4dbcf73fa969aebd7f5b6486168eeef38b4a8067ef0f2da3bddd3d6
                        • Instruction Fuzzy Hash: 6CF0C271200520ABE311A769EC8DFEF3B98FF88711F408025F694C6160E7B8C9898AA1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindClose,?), ref: 1000678C
                        • GetProcAddress.KERNEL32(00000000), ref: 10006795
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindFirstFileA), ref: 100067A5
                        • GetProcAddress.KERNEL32(00000000), ref: 100067A8
                          • Part of subcall function 10005530: LoadLibraryA.KERNEL32(KERNEL32.dll,GetLastError), ref: 10005566
                          • Part of subcall function 10005530: GetProcAddress.KERNEL32(00000000), ref: 1000556F
                          • Part of subcall function 10005530: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000557E
                          • Part of subcall function 10005530: GetProcAddress.KERNEL32(00000000), ref: 10005581
                          • Part of subcall function 10005530: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 1000558F
                          • Part of subcall function 10005530: GetProcAddress.KERNEL32(00000000), ref: 10005592
                          • Part of subcall function 10005530: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateDirectoryA), ref: 100055A1
                          • Part of subcall function 10005530: GetProcAddress.KERNEL32(00000000), ref: 100055A4
                          • Part of subcall function 10005530: LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileAttributesA), ref: 100055B3
                          • Part of subcall function 10005530: GetProcAddress.KERNEL32(00000000), ref: 100055B6
                          • Part of subcall function 10005530: putchar.MSVCRT ref: 100055C4
                          • Part of subcall function 10005530: malloc.MSVCRT ref: 100055D5
                          • Part of subcall function 10005530: CharNextA.USER32(00000002), ref: 10005616
                          • Part of subcall function 10005530: CharNextA.USER32(00000002), ref: 10005634
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$CharNext$mallocputchar
                        • String ID: FindClose$FindFirstFileA$KERNEL32.dll
                        • API String ID: 2036624238-3859562830
                        • Opcode ID: 08d6e0be5b70e9897d15e53c0c4e217d4fe2de277949bc98215d746e5a3d9ec8
                        • Instruction ID: 715cbf3846f150a1725a9cd5557ebcb6fa1e7231fe07a9e4984ea373b5282805
                        • Opcode Fuzzy Hash: 08d6e0be5b70e9897d15e53c0c4e217d4fe2de277949bc98215d746e5a3d9ec8
                        • Instruction Fuzzy Hash: 422143326002144BE714EE64DC44AAFBBD6EBC93A0F10463AF94AD7391CE75ED49C7A1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree), ref: 1000C611
                        • GetProcAddress.KERNEL32(00000000), ref: 1000C61A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize), ref: 1000C628
                        • GetProcAddress.KERNEL32(00000000), ref: 1000C62B
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$LocalFree$LocalSize
                        • API String ID: 2574300362-127136793
                        • Opcode ID: 5ca9dae351c9fddcc92f091b2179f7cec23b8067cf04418eab9d226d3342786f
                        • Instruction ID: b9ff663b914e14fab95e4db01679e41a8e4d55429728726ae4c66c87215de853
                        • Opcode Fuzzy Hash: 5ca9dae351c9fddcc92f091b2179f7cec23b8067cf04418eab9d226d3342786f
                        • Instruction Fuzzy Hash: CA21CF35101B985BE221EF64CC41FEFB6D8EF89390F000A29F55197286DF34EC048AE6
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentThreadId,?,10019F30,000000FF), ref: 100105E3
                        • GetProcAddress.KERNEL32(00000000), ref: 100105EA
                        • GetThreadDesktop.USER32(00000000), ref: 100105F3
                        • _strrev.MSVCRT ref: 10010638
                          • Part of subcall function 10010580: OpenDesktopA.USER32(?,00000000,00000000,400001CF), ref: 10010593
                        • PostMessageA.USER32(0000FFFF,00000312,00000000,002E0003), ref: 10010673
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Desktop$AddressLibraryLoadMessageOpenPostProcThread_strrev
                        • String ID: GetCurrentThreadId$KERNEL32.dll
                        • API String ID: 540453910-1458786552
                        • Opcode ID: 4236fe490a2b43ca766c1360484dae5c0bf6134db19f5bfbc0b93306ac4f8ff4
                        • Instruction ID: 07bb75c2037145e51f058acebe15a17ddda69d343ac8ea5b3e29ba818300e23b
                        • Opcode Fuzzy Hash: 4236fe490a2b43ca766c1360484dae5c0bf6134db19f5bfbc0b93306ac4f8ff4
                        • Instruction Fuzzy Hash: E3115B72900288AEE701E7F8AC4CBAE7F69EB11305F044495F944D6242D2B5C6548761
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 100114D3
                        • GetProcAddress.KERNEL32(00000000), ref: 100114DC
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 100114EA
                        • GetProcAddress.KERNEL32(00000000), ref: 100114ED
                          • Part of subcall function 10011280: ??2@YAPAXI@Z.MSVCRT ref: 10011286
                          • Part of subcall function 10011280: ??3@YAXPAX@Z.MSVCRT ref: 100112B4
                          • Part of subcall function 1000BC90: LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,?,?,?,1000A576), ref: 1000BCA6
                          • Part of subcall function 1000BC90: GetProcAddress.KERNEL32(00000000), ref: 1000BCAF
                          • Part of subcall function 1000BC90: LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,?,1000A576), ref: 1000BCBD
                          • Part of subcall function 1000BC90: GetProcAddress.KERNEL32(00000000), ref: 1000BCC0
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@??3@
                        • String ID: GetTickCount$KERNEL32.dll$Sleep
                        • API String ID: 2249131349-1262029506
                        • Opcode ID: f5f9fad658a3d1c5fe97a50b8d6d30c87f64e7aa8fefcfac340236f87b026efa
                        • Instruction ID: 34408a371c8056f7721af778b5a6187b5a8ae70ff4f834ec6cfe8761b723a322
                        • Opcode Fuzzy Hash: f5f9fad658a3d1c5fe97a50b8d6d30c87f64e7aa8fefcfac340236f87b026efa
                        • Instruction Fuzzy Hash: 671129296006A447DB05EBB54C945CF2BDADFD57D0315485AE2A18F242CF30D882CBA0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection,?,?,?,?,?,10002D04,?,00000005,?,00000000,?,00000000), ref: 10001DA7
                        • GetProcAddress.KERNEL32(00000000), ref: 10001DB0
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection,?,?,?,?), ref: 10001DC2
                        • GetProcAddress.KERNEL32(00000000), ref: 10001DC5
                          • Part of subcall function 10001F50: LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree,00000000,?,?,?,?,10001DE2,00000000,?,?,?,?), ref: 10001F69
                          • Part of subcall function 10001F50: GetProcAddress.KERNEL32(00000000), ref: 10001F72
                          • Part of subcall function 10001F50: LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualAlloc,?,10001DE2,00000000,?,?,?,?), ref: 10001F82
                          • Part of subcall function 10001F50: GetProcAddress.KERNEL32(00000000), ref: 10001F85
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: EnterCriticalSection$KERNEL32.dll$LeaveCriticalSection
                        • API String ID: 2574300362-1950043958
                        • Opcode ID: d17b92f535407b10d1d5c8a5060b03c25a03f19b08d9744025a23f9ad0067ada
                        • Instruction ID: 5b462253e58bfee8e2dccfed5e634a75f218b6c43f8e4f9e68e51f4161190dee
                        • Opcode Fuzzy Hash: d17b92f535407b10d1d5c8a5060b03c25a03f19b08d9744025a23f9ad0067ada
                        • Instruction Fuzzy Hash: 8F01C4727002185B9B08EFA4DC848AFB79DEB882B1714456EFE16D7341CB70ED4487B0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree,?,?), ref: 1000D4FD
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D506
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualAlloc,?,?), ref: 1000D516
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D519
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$VirtualAlloc$VirtualFree
                        • API String ID: 2574300362-854231263
                        • Opcode ID: c7e03051a9c8aa37f6476984808cc5c99d45258fea9fe9eb2bb1706784078963
                        • Instruction ID: 8d2988216eeb259400dff83b3ebcaa4ee3dbfcc9fb1eefef0f51cf4ccf514edc
                        • Opcode Fuzzy Hash: c7e03051a9c8aa37f6476984808cc5c99d45258fea9fe9eb2bb1706784078963
                        • Instruction Fuzzy Hash: B301C8357003486FE710EA748C85BAFB699FF88380F004529FA459B280CBB5BD058791
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 100014F6
                        • GetProcAddress.KERNEL32(00000000), ref: 100014FF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent), ref: 1000150D
                        • GetProcAddress.KERNEL32(00000000), ref: 10001510
                          • Part of subcall function 10001600: LoadLibraryA.KERNEL32(KERNEL32.dll,ResumeThread), ref: 1000161E
                          • Part of subcall function 10001600: GetProcAddress.KERNEL32(00000000), ref: 10001627
                          • Part of subcall function 10001600: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 10001636
                          • Part of subcall function 10001600: GetProcAddress.KERNEL32(00000000), ref: 10001639
                          • Part of subcall function 10001600: GetProcAddress.KERNEL32(00000000,waveInGetNumDevs), ref: 10001649
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: KERNEL32.dll$SetEvent$WaitForSingleObject
                        • API String ID: 2238633743-601223695
                        • Opcode ID: b738b1f32a49024a2b0f876405b79a377610698ac4ac701528d04fae2553e765
                        • Instruction ID: 73ebe775897d1bf67a5f5b79541b9af596cfe4f1940e55fc67e852c0b522cfd9
                        • Opcode Fuzzy Hash: b738b1f32a49024a2b0f876405b79a377610698ac4ac701528d04fae2553e765
                        • Instruction Fuzzy Hash: CE01B1733006549B9621EAAAAC84CDBF3DCDF993A1301892AE345C7200CB72EC418760
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree,00000000,00000000,?,00000000,1000BAB8,00000000,00000000), ref: 1000B81B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B824
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc,?,00000000,1000BAB8,00000000,00000000), ref: 1000B834
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B837
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$LocalAlloc$LocalFree
                        • API String ID: 2574300362-4288603552
                        • Opcode ID: 06fa6f908cb209310e77bf82f82b4c92b617f615ecddb61920612db000cbd137
                        • Instruction ID: 7e4b49a6111b3693da8d235190f84ef4e4b5acbda8601b9e7e85a3bfe9523918
                        • Opcode Fuzzy Hash: 06fa6f908cb209310e77bf82f82b4c92b617f615ecddb61920612db000cbd137
                        • Instruction Fuzzy Hash: 5B018F72A042596BDB04EFA49C4495FBB99EB98391F01086AFA44E7200C675BD088BF1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,?,1001126A,?,?), ref: 10011456
                        • GetProcAddress.KERNEL32(00000000), ref: 1001145F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,?,?,?,1001126A,?,?), ref: 1001146D
                        • GetProcAddress.KERNEL32(00000000), ref: 10011470
                          • Part of subcall function 1000FF60: LoadLibraryA.KERNEL32(0000006B,00000043,759A9E20,?,74DF0F00), ref: 1000FFF1
                          • Part of subcall function 1000FF60: GetProcAddress.KERNEL32(00000000), ref: 1000FFFA
                          • Part of subcall function 1000FF60: LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 10010009
                          • Part of subcall function 1000FF60: GetProcAddress.KERNEL32(00000000), ref: 1001000C
                          • Part of subcall function 1000FF60: LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1001001B
                          • Part of subcall function 1000FF60: GetProcAddress.KERNEL32(00000000), ref: 1001001E
                          • Part of subcall function 1000FF60: _beginthreadex.MSVCRT ref: 10010066
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$_beginthreadex
                        • String ID: InterlockedExchange$KERNEL32.dll$WaitForSingleObject
                        • API String ID: 780464054-3102577651
                        • Opcode ID: fd60ab5e19b057075c066c9bb2d7e3bf8beb4220d8b0b91c1660579f60ce8dbf
                        • Instruction ID: 635336324a5817ebb6bf66a2a74f683e682ec107a73a052a3edaf7a798989065
                        • Opcode Fuzzy Hash: fd60ab5e19b057075c066c9bb2d7e3bf8beb4220d8b0b91c1660579f60ce8dbf
                        • Instruction Fuzzy Hash: CF0162726443147BE220EBA58C85F9BB79CEF89750F114A19F3459B2C0DBB1E8408B64
                        APIs
                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,00000000,74DEF550), ref: 1001278F
                        • OpenServiceA.ADVAPI32(00000000,Defghi Klmnopqr Tuv,000F003F,?,?,?,?,?,?,?,?,?,?,10013BE5), ref: 100127A2
                        • LockServiceDatabase.ADVAPI32 ref: 10012805
                        • ChangeServiceConfig2A.ADVAPI32(00000000,00000002,?), ref: 10012813
                        • CloseServiceHandle.ADVAPI32(00000000), ref: 1001281A
                        • UnlockServiceDatabase.ADVAPI32(00000000), ref: 10012821
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: Service$DatabaseOpen$ChangeCloseConfig2HandleLockManagerUnlock
                        • String ID: Defghi Klmnopqr Tuv
                        • API String ID: 3576742245-1553144822
                        • Opcode ID: 8242b42af8a2c538c7ae6c912ba52f921246bb4d296905a702196d8567fe2067
                        • Instruction ID: 979725648ea5624c37e5db280a7066a56225332a09d4f3c86fafda82edb6931b
                        • Opcode Fuzzy Hash: 8242b42af8a2c538c7ae6c912ba52f921246bb4d296905a702196d8567fe2067
                        • Instruction Fuzzy Hash: 0F112EB0409310AFE301DF25C8C8B6FBAF8FB8C758F40491DF59996251D7B886498F92
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA,?), ref: 1001016E
                        • GetProcAddress.KERNEL32(00000000), ref: 10010175
                        • WTSQuerySessionInformationA.WTSAPI32(00000000,000000FF,00000005,?,?), ref: 10010196
                        • ??2@YAPAXI@Z.MSVCRT ref: 100101A5
                        • WTSFreeMemory.WTSAPI32(?), ref: 100101BC
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: ??2@AddressFreeInformationLibraryLoadMemoryProcQuerySession
                        • String ID: KERNEL32.dll$lstrcpyA
                        • API String ID: 628228830-739640453
                        • Opcode ID: c8794d6c8d0368645fb03014219f32e218bf387bff35de0783f4478029be3e98
                        • Instruction ID: 4f9be430be8656fe696166f367461231b0c686f58e4ec5394a051c5fc79ec9c8
                        • Opcode Fuzzy Hash: c8794d6c8d0368645fb03014219f32e218bf387bff35de0783f4478029be3e98
                        • Instruction Fuzzy Hash: 0EF09C756042117FD600DBB9DC05D5F7AD8DFC4751F414928F549C6150EA34D949C7E2
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree,?,00000050,?,?,1000F52C,?,?,00000050,00000000,10019FD8,000000FF,10007A03,?), ref: 1000F5F6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F5FF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize,?,00000050,?,?,1000F52C,?,?,00000050,00000000,10019FD8,000000FF,10007A03,?), ref: 1000F60D
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F610
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1000F90C
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F915
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,LocalReAlloc), ref: 1000F924
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F927
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000F936
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F939
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize), ref: 1000F948
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F94B
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot), ref: 1000F95A
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F95D
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First), ref: 1000F96B
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F96E
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next), ref: 1000F97D
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F980
                          • Part of subcall function 1000F8F0: putchar.MSVCRT ref: 1000F9BB
                          • Part of subcall function 1000F8F0: putchar.MSVCRT ref: 1000F9C9
                          • Part of subcall function 1000F8F0: putchar.MSVCRT ref: 1000F9DB
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$putchar
                        • String ID: KERNEL32.dll$LocalFree$LocalSize
                        • API String ID: 3860417020-127136793
                        • Opcode ID: c7e14e40ebfe24844784abefe58bfae978303ddca6c79f08813a26c0fe55ed85
                        • Instruction ID: d70911c5b119bcea8e85fd7799bc783a74f8ae8d0e43b0a038cf00aa553e73cf
                        • Opcode Fuzzy Hash: c7e14e40ebfe24844784abefe58bfae978303ddca6c79f08813a26c0fe55ed85
                        • Instruction Fuzzy Hash: 5FE06D62A026783AA502A3F94C84CBFA68DDF892D53010566F60097202CFA5EC4103F8
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree,?,?,?,?,1000F5A1), ref: 1000F656
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F65F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize,?,?,?,?,1000F5A1), ref: 1000F66D
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F670
                          • Part of subcall function 1000FE10: putchar.MSVCRT ref: 1000FE22
                          • Part of subcall function 1000FE10: LoadLibraryA.KERNEL32(user32.dll), ref: 1000FE30
                          • Part of subcall function 1000FE10: putchar.MSVCRT ref: 1000FE45
                          • Part of subcall function 1000FE10: putchar.MSVCRT ref: 1000FE5A
                          • Part of subcall function 1000FE10: GetProcAddress.KERNEL32(?,EnumWindows), ref: 1000FE6C
                          • Part of subcall function 1000FE10: putchar.MSVCRT ref: 1000FE81
                          • Part of subcall function 1000FE10: putchar.MSVCRT ref: 1000FEA2
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$LocalFree$LocalSize
                        • API String ID: 2374183287-127136793
                        • Opcode ID: 1a12c0cfb2d62d7db108ee40f990ac2cdf46120d3356b9963177ae90ebb778b0
                        • Instruction ID: 39687c258324d9af63445024950fe9fcbe7e67f7ac15e3728e8537f8cdf83c30
                        • Opcode Fuzzy Hash: 1a12c0cfb2d62d7db108ee40f990ac2cdf46120d3356b9963177ae90ebb778b0
                        • Instruction Fuzzy Hash: 1FE06D62A026783AA502A3F95C84CBFA68DDF892D13010566F60097211CFB5EC4102F8
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,0000006F,?,?,?,10005481,0000006F), ref: 10006C76
                        • GetProcAddress.KERNEL32(00000000), ref: 10006C7F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,MoveFileA,?,?,?,10005481,0000006F), ref: 10006C8D
                        • GetProcAddress.KERNEL32(00000000), ref: 10006C90
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$MoveFileA$lstrlenA
                        • API String ID: 2574300362-2667531482
                        • Opcode ID: 4805dad5504e30285bb994fe7d7c858771234758b6e479bee3be976b1d7f239d
                        • Instruction ID: 5f4f5e56de4c5efbf47a5c78d48e29a7ad09a041bba15cfb9ae28dacb9f2c98a
                        • Opcode Fuzzy Hash: 4805dad5504e30285bb994fe7d7c858771234758b6e479bee3be976b1d7f239d
                        • Instruction Fuzzy Hash: 48E06D626006282BA601E7E49C84CBF675DEF8D3907014472F704AB141DBB5EC4147B9
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteCriticalSection,759A9E20,?,00000000,00000000,100024A8), ref: 10001D4C
                        • GetProcAddress.KERNEL32(00000000), ref: 10001D55
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree), ref: 10001D63
                        • GetProcAddress.KERNEL32(00000000), ref: 10001D66
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: DeleteCriticalSection$KERNEL32.dll$VirtualFree
                        • API String ID: 2574300362-834918275
                        • Opcode ID: 9b0d53f833990a5a0aaf02e17cf435255bad5745e8f2993bfc6634b20cfa57ac
                        • Instruction ID: de24d1f777150d321959ae89f14270a1b7e629dd5b50cfb5e8bbae6585d01e99
                        • Opcode Fuzzy Hash: 9b0d53f833990a5a0aaf02e17cf435255bad5745e8f2993bfc6634b20cfa57ac
                        • Instruction Fuzzy Hash: 33E09B7120165837E625E7E58C44F9FAB5CDF85391B010969F60497140CBF6EC4046A4
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B2E1
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B2EA
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapFree), ref: 1000B2F8
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B2FB
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetProcessHeap$HeapFree$KERNEL32.dll
                        • API String ID: 2574300362-3454514201
                        • Opcode ID: 03626b03dd023116e98fb4ea4f566bb4f9a014edb3d61d8aae51cde71110ae27
                        • Instruction ID: 310a44c4b7cdbb270d522b78608fe0ec49ac24af4aca9d099abcab58f91b4b15
                        • Opcode Fuzzy Hash: 03626b03dd023116e98fb4ea4f566bb4f9a014edb3d61d8aae51cde71110ae27
                        • Instruction Fuzzy Hash: 6FE06D739006686BE900F7E98C84E4B6A8CDF893D5B524561E704AB100C7B2DC4147F0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection,?,00000000,?,?,10002BB7,?,00000000,?,00000000,?,?,?,?), ref: 100021C6
                        • GetProcAddress.KERNEL32(00000000), ref: 100021CF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection,?,?,?,?), ref: 100021DD
                        • GetProcAddress.KERNEL32(00000000), ref: 100021E0
                          • Part of subcall function 10002070: LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree,?,?,00000000,74DEF550,?,100021FA,00000400,?,?,?,?), ref: 10002089
                          • Part of subcall function 10002070: GetProcAddress.KERNEL32(00000000), ref: 10002092
                          • Part of subcall function 10002070: LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualAlloc,?,100021FA,00000400,?,?,?,?), ref: 100020A2
                          • Part of subcall function 10002070: GetProcAddress.KERNEL32(00000000), ref: 100020A5
                          • Part of subcall function 10002070: puts.MSVCRT ref: 100020B4
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$puts
                        • String ID: EnterCriticalSection$KERNEL32.dll$LeaveCriticalSection
                        • API String ID: 2365495358-1950043958
                        • Opcode ID: 6e1a9d865275c1195eb0810f5d040a9fa8ffc5c988c1dcf26130878df8d133a7
                        • Instruction ID: 784a852ed69f14d488034ed7e4a864560cbfd45e2e389442ae4117b144a7c494
                        • Opcode Fuzzy Hash: 6e1a9d865275c1195eb0810f5d040a9fa8ffc5c988c1dcf26130878df8d133a7
                        • Instruction Fuzzy Hash: 21E092726003586BD621E7F58C88DAFB7ADEFC9751701496AF3149B100CBB5FC4147A4
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,?,?,?,1000A576), ref: 1000BCA6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BCAF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,?,1000A576), ref: 1000BCBD
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BCC0
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$Sleep$WaitForSingleObject
                        • API String ID: 2574300362-1894623987
                        • Opcode ID: 33a666b476e140a8f8c871be7aee747473652424465154160a6930d692a1832c
                        • Instruction ID: 1fccbf4ff30f5a4550b0fe0fe6a56459ea15908391166e8337ca4d0f8b12fcd3
                        • Opcode Fuzzy Hash: 33a666b476e140a8f8c871be7aee747473652424465154160a6930d692a1832c
                        • Instruction Fuzzy Hash: EBE04F622002683AE521E3F68C84CAFE74CEF893717010665F32497190CFB2DC808770
                        APIs
                        • ?_Xran@std@@YAXXZ.MSVCP60(?,?,?,00000000,?,-00000008,10019C11,000000FF,100063BE,-00000008,?,?,?,?,?), ref: 10006DCF
                        • ?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ.MSVCP60(?,?,?,00000000,?,-00000008,10019C11,000000FF,100063BE,-00000008,?,?,?,?,?), ref: 10006DD7
                        • memmove.MSVCRT ref: 10006DF9
                        • ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000000), ref: 10006E0B
                        • ?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z.MSVCP60(?), ref: 10006E18
                        • ?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ.MSVCP60(?,00000000,?,-00000008,10019C11,000000FF,100063BE,-00000008,?,?,?,?,?), ref: 10006E20
                        • ?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,?,?,00000000,?,-00000008,10019C11,000000FF,100063BE,-00000008,?,?,?,?,?), ref: 10006E57
                        • ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z.MSVCP60(3B4208C4,00000001,?,?,?,00000000,?,-00000008,10019C11,000000FF,100063BE,-00000008,?,?,?), ref: 10006E98
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: D@2@@std@@D@std@@U?$char_traits@V?$allocator@$Grow@?$basic_string@Split@?$basic_string@$Eos@?$basic_string@Tidy@?$basic_string@Xran@std@@memmove
                        • String ID:
                        • API String ID: 1074130261-0
                        • Opcode ID: 6453fa029f67a1a700aa8543c53005a187c52897ab2fc396bcd21011305c2596
                        • Instruction ID: 1f6dc37bb7bd278f628bc600a919a3777c22ab94731e7534e6f4ea16ccf593b5
                        • Opcode Fuzzy Hash: 6453fa029f67a1a700aa8543c53005a187c52897ab2fc396bcd21011305c2596
                        • Instruction Fuzzy Hash: 0C41FF35700BA49FD711DF58CCC46AABBE6FB8C6A0F60892EE86A87340C7359D44CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: _strnicmp
                        • String ID: CONNECT $GET $HEAD $POST
                        • API String ID: 2635805826-4031508290
                        • Opcode ID: 481b378a983ec95f02804e289f69900a8b027311c82380ac88004a847cd836b5
                        • Instruction ID: c70ae619576b633602851eb6159f78066b6353e148645e3fca1d5dd950b70279
                        • Opcode Fuzzy Hash: 481b378a983ec95f02804e289f69900a8b027311c82380ac88004a847cd836b5
                        • Instruction Fuzzy Hash: 1C018C3170029157E301EA1CEC00BCEB3D8FF85356F8600A2FA44DB284E3B8DC458B82
                        APIs
                        • GetProcAddress.KERNEL32(00000000,waveOutGetNumDevs), ref: 10001797
                        • GetProcAddress.KERNEL32(00000000,waveOutOpen), ref: 100017F9
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc
                        • String ID: waveOutGetNumDevs$waveOutOpen$waveOutPrepareHeader
                        • API String ID: 190572456-3006884721
                        • Opcode ID: c0672bbd657d60da7a62fba07e8a7a99cab492d54b45343f5947f5f434c369be
                        • Instruction ID: ce5621f32cbc2ef36ccf1da218a0d45e5495487102fa125a822fe108158a2c00
                        • Opcode Fuzzy Hash: c0672bbd657d60da7a62fba07e8a7a99cab492d54b45343f5947f5f434c369be
                        • Instruction Fuzzy Hash: 5D319375A00205AFD714DF68D884AAABBF5FB89310F2045A9EA05D7345DB31ED02CB90
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 10006327
                        • GetProcAddress.KERNEL32(00000000), ref: 1000632E
                        • ?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z.MSVCP60(?,?,?), ref: 1000638C
                          • Part of subcall function 10006440: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,?,?), ref: 10006471
                          • Part of subcall function 10006440: GetProcAddress.KERNEL32(00000000), ref: 1000647A
                          • Part of subcall function 10006440: LoadLibraryA.KERNEL32(KERNEL32.dll,FindClose), ref: 10006488
                          • Part of subcall function 10006440: GetProcAddress.KERNEL32(00000000), ref: 1000648B
                          • Part of subcall function 10006440: LoadLibraryA.KERNEL32(KERNEL32.dll,FindNextFileA), ref: 1000649B
                          • Part of subcall function 10006440: GetProcAddress.KERNEL32(00000000), ref: 1000649E
                          • Part of subcall function 10006440: LoadLibraryA.KERNEL32(KERNEL32.dll,FindFirstFileA), ref: 100064AE
                          • Part of subcall function 10006440: GetProcAddress.KERNEL32(00000000), ref: 100064B1
                          • Part of subcall function 10006440: wsprintfA.USER32 ref: 10006504
                          • Part of subcall function 100066B0: ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z.MSVCP60(?,?,?,?,00000000,?,1000635E,?), ref: 100066F4
                          • Part of subcall function 100066B0: ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z.MSVCP60(?,?,00000000,?,1000635E,?), ref: 10006705
                          • Part of subcall function 100066B0: ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z.MSVCP60(?,?,00000000,?,1000635E,?), ref: 10006716
                          • Part of subcall function 100066B0: ??3@YAXPAX@Z.MSVCRT ref: 1000673F
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$D@2@@std@@D@std@@U?$char_traits@V?$allocator@$Refcnt@?$basic_string@$??3@?assign@?$basic_string@V12@wsprintf
                        • String ID: KERNEL32.dll$lstrlenA
                        • API String ID: 1916893902-1796993502
                        • Opcode ID: e0b391abb841a7829105a7001758cfc126c682f5c3696db6e38f7df281d6d75e
                        • Instruction ID: eeecbe46f180edadddb5c42fdebf3831498551bd03c72119858809fffa62efc0
                        • Opcode Fuzzy Hash: e0b391abb841a7829105a7001758cfc126c682f5c3696db6e38f7df281d6d75e
                        • Instruction Fuzzy Hash: C731E1B55047429FE300CF68CC84A5BBBE5FF8D290F204A2DF59987391C734EA458BA2
                        APIs
                        • htons.WS2_32 ref: 100085E3
                        • inet_addr.WS2_32(?), ref: 100085F9
                        • inet_addr.WS2_32(?), ref: 10008617
                        • socket.WS2_32(00000002,00000001,00000006), ref: 10008623
                        • setsockopt.WS2_32 ref: 1000864E
                        • connect.WS2_32(?,?,00000010), ref: 1000865E
                        • closesocket.WS2_32 ref: 1000866C
                          • Part of subcall function 100083B0: gethostbyname.WS2_32(?), ref: 100083B5
                          • Part of subcall function 100083B0: inet_ntoa.WS2_32(00000000), ref: 100083C8
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: inet_addr$closesocketconnectgethostbynamehtonsinet_ntoasetsockoptsocket
                        • String ID:
                        • API String ID: 1372979013-0
                        • Opcode ID: 8a7243a903e700a571d8f5d735249f95955cb8d29f26a7dd3346c4c37a6d1d94
                        • Instruction ID: 2ef1c08a475b93d1d30a38a551d650a9823448007ed46fe3478c86a47590e5aa
                        • Opcode Fuzzy Hash: 8a7243a903e700a571d8f5d735249f95955cb8d29f26a7dd3346c4c37a6d1d94
                        • Instruction Fuzzy Hash: 4B119D70504711ABE710DF288C85A5BB7E4FF883A4F508A19F4A8D62E0E7B1D9448B92
                        APIs
                        • IsWindow.USER32(?), ref: 10010C1A
                        • SendMessageA.USER32(?,00000408,00000000,00000000), ref: 10010C2E
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,?,?,?,?,?,1001A020,000000FF), ref: 10010C44
                        • GetProcAddress.KERNEL32(00000000), ref: 10010C4B
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadMessageProcSendWindow
                        • String ID: KERNEL32.dll$SetEvent
                        • API String ID: 4217182500-1240338101
                        • Opcode ID: dc4ef39d119e2903dd12595a883f60e45b26bf2eac42065822fea1cd3add9524
                        • Instruction ID: 6384992c116f9cac417eac121cbe395da42384bff593b8ba7c2dd42a5e07efc2
                        • Opcode Fuzzy Hash: dc4ef39d119e2903dd12595a883f60e45b26bf2eac42065822fea1cd3add9524
                        • Instruction Fuzzy Hash: 4211A535600614AFD704DF54DC95B5BB7A9FB4D720F008259FE059B380CB75E940CBA0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,?,?,?), ref: 1000EAC2
                        • GetProcAddress.KERNEL32(00000000), ref: 1000EACF
                        • GetProcAddress.KERNEL32(?,BitBlt), ref: 1000EAE0
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: BitBlt$KERNEL32.dll$Sleep
                        • API String ID: 2238633743-3382908569
                        • Opcode ID: a4cf78a9fdaf5011dfe05a6834ed4b09f11624f9c3812add02a35ae9711c83a1
                        • Instruction ID: 80d2dc58ce5143aeb720f31c2f76471c939d4acdc1391abfc761270904054b7e
                        • Opcode Fuzzy Hash: a4cf78a9fdaf5011dfe05a6834ed4b09f11624f9c3812add02a35ae9711c83a1
                        • Instruction Fuzzy Hash: 3D0152726442646BD310DB99CC84E5BBBECFB9D791F014929FA48A7240C771EC058BA1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,100112E6), ref: 10010E5E
                        • GetProcAddress.KERNEL32(00000000), ref: 10010E65
                        • IsWindow.USER32(?), ref: 10010E71
                        • SendMessageA.USER32(?,0000043D,00000000,00000000), ref: 10010E88
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadMessageProcSendWindow
                        • String ID: KERNEL32.dll$WaitForSingleObject
                        • API String ID: 4217182500-3889371928
                        • Opcode ID: 35de2e643744c5910c6ad20459225d6b002ddd7c2e74455300ccce17b1c3095d
                        • Instruction ID: 43b46d2f5609498b0dd9ee59ec715d185c634a343cb93416766cca141da8a0ea
                        • Opcode Fuzzy Hash: 35de2e643744c5910c6ad20459225d6b002ddd7c2e74455300ccce17b1c3095d
                        • Instruction Fuzzy Hash: 69F01C76300720ABE760DBA5EC48F4B77A8EB88B61F018959F645DB180DBB0E8818760
                        APIs
                          • Part of subcall function 100021B0: LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection,?,00000000,?,?,10002BB7,?,00000000,?,00000000,?,?,?,?), ref: 100021C6
                          • Part of subcall function 100021B0: GetProcAddress.KERNEL32(00000000), ref: 100021CF
                          • Part of subcall function 100021B0: LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection,?,?,?,?), ref: 100021DD
                          • Part of subcall function 100021B0: GetProcAddress.KERNEL32(00000000), ref: 100021E0
                        • _ftol.MSVCRT ref: 10002BDF
                        • ??2@YAPAXI@Z.MSVCRT ref: 10002BE9
                        • ??3@YAXPAX@Z.MSVCRT ref: 10002C1E
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@??3@_ftol
                        • String ID:
                        • API String ID: 907892022-0
                        • Opcode ID: f20f1712f8050ff989f7084e8eb515db515269b0456350a3c15761881792ee97
                        • Instruction ID: d41c8f31576468369ca1b47338740924bd3f9691942a29fca6a49e72c163abc7
                        • Opcode Fuzzy Hash: f20f1712f8050ff989f7084e8eb515db515269b0456350a3c15761881792ee97
                        • Instruction Fuzzy Hash: 7041B4767043045BE704EF259C42ABF73D9EBD8690F00092DFA4557386EE35FA0987A2
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar$recvselect
                        • String ID:
                        • API String ID: 990658656-0
                        • Opcode ID: 9f136abbb7ba4cd4be2037d96fc9867f676b6e030023a6ffeaf2df9ac05be5e4
                        • Instruction ID: d5fbc5164cb0050960c893280cf0169d827a4e858c2d298e0a75bd7ae736d97d
                        • Opcode Fuzzy Hash: 9f136abbb7ba4cd4be2037d96fc9867f676b6e030023a6ffeaf2df9ac05be5e4
                        • Instruction Fuzzy Hash: FA312576B0021467EA10CA64DC86BEA7354EF453B0F0043A5FE19AB2D1CF71BD85C796
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 100053DF
                        • GetProcAddress.KERNEL32(00000000), ref: 100053E6
                        • Sleep.KERNEL32(00000000), ref: 1000541A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcSleep
                        • String ID: DeleteFileA$KERNEL32.dll
                        • API String ID: 188063004-2147215044
                        • Opcode ID: 53b0e606c39ac888e3f65b27229fd5ad64fe52a2532cb209e29ee44e1a34e688
                        • Instruction ID: 111b25c7b5b3c32ed8a88bd0af0234a4f4a27215f145db55a404f07c7f97eb56
                        • Opcode Fuzzy Hash: 53b0e606c39ac888e3f65b27229fd5ad64fe52a2532cb209e29ee44e1a34e688
                        • Instruction Fuzzy Hash: 9021732B30002013A415F29E7C99EBFDB1DEBE5AF7B20803BF682C5195CB451CA692B5
                        APIs
                        • LoadLibraryA.KERNEL32(WINMM.dll), ref: 10001AE6
                        • GetProcAddress.KERNEL32(?,waveInGetNumDevs), ref: 10001B02
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: WINMM.dll$waveInGetNumDevs
                        • API String ID: 2574300362-817700921
                        • Opcode ID: 94dd57762219a88611f35a8c154427ee6484170ef8eb23dda1bc12ffa7650c71
                        • Instruction ID: e73551ae0253794c8a5c6544d3d27412878de8d53c60ea806c2f1c7c45091e12
                        • Opcode Fuzzy Hash: 94dd57762219a88611f35a8c154427ee6484170ef8eb23dda1bc12ffa7650c71
                        • Instruction Fuzzy Hash: 6A110372E006499FEB01CFA8EC457EDBBB9FB45251F1002BAE919C3740EB359901C791
                        APIs
                        • wsprintfA.USER32 ref: 1000490C
                          • Part of subcall function 10004670: LsaOpenPolicy.ADVAPI32(00000000,?,00000004,?), ref: 10004692
                        • LsaFreeMemory.ADVAPI32(?), ref: 1000493A
                        • LsaFreeMemory.ADVAPI32(?), ref: 10004964
                          • Part of subcall function 10004700: LoadLibraryA.KERNEL32(KERNEL32.dll,WideCharToMultiByte,?,00000000,00000000), ref: 10004716
                          • Part of subcall function 10004700: GetProcAddress.KERNEL32(00000000), ref: 1000471D
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: FreeMemory$AddressLibraryLoadOpenPolicyProcwsprintf
                        • String ID: L$_RasDefaultCredentials#0$RasDialParams!%s#0
                        • API String ID: 4178720857-1591505386
                        • Opcode ID: e43955cd61d83b4fcbcd524804181394f015150c14cf35c21bbdfaaadf604e78
                        • Instruction ID: 5dbc5db930d339ed8d670602376d9ed9f1f6c6c76cd1139057483e510253f374
                        • Opcode Fuzzy Hash: e43955cd61d83b4fcbcd524804181394f015150c14cf35c21bbdfaaadf604e78
                        • Instruction Fuzzy Hash: B92192B96047519BE304DF14D89086BB7EAEFCC744F00892DF98987301EA34ED08CB91
                        APIs
                        • RegOpenKeyA.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,?), ref: 100119F9
                        • RegQueryValueExA.ADVAPI32(?,~MHz,00000000,00000004,?,00000004), ref: 10011A20
                        • RegCloseKey.ADVAPI32(?), ref: 10011A34
                        Strings
                        • ~MHz, xrefs: 10011A1A
                        • HARDWARE\DESCRIPTION\System\CentralProcessor\0, xrefs: 100119EF
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID: HARDWARE\DESCRIPTION\System\CentralProcessor\0$~MHz
                        • API String ID: 3677997916-2226868861
                        • Opcode ID: d109830256526acac79d2669b2750e4d5475c000351bb180b780b94e8fe5af54
                        • Instruction ID: 1b8816a47789439313b26247d8e880e8f194f70c70f62c5fd10b935215d2600c
                        • Opcode Fuzzy Hash: d109830256526acac79d2669b2750e4d5475c000351bb180b780b94e8fe5af54
                        • Instruction Fuzzy Hash: 8A01D2F3800509BFEB05EAB4EE8CEBE7B3EFB51218F240245FA15D1204EA748A018618
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar
                        • String ID: CreateThread$KERNEL32.dll$Sleep
                        • API String ID: 2332253611-933711560
                        • Opcode ID: 2312679918a36abb4d04cfc295b63230907a7276eec1b7fa3e2c97e5bd5fd1df
                        • Instruction ID: c5c1dcb7ef1ad39004ac39bd421cc68e8377f655f5857e45d56879e9997a8e21
                        • Opcode Fuzzy Hash: 2312679918a36abb4d04cfc295b63230907a7276eec1b7fa3e2c97e5bd5fd1df
                        • Instruction Fuzzy Hash: 49F0AF79E40228B7E310EBF45C95FDF7A58EB98350F214072FA09AB280D6B0DA418F91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: putchar
                        • String ID: CreateThread$KERNEL32.dll$Sleep
                        • API String ID: 2332253611-933711560
                        • Opcode ID: 40ba6680ac7aef9a45845643e59f85c0d27882956f6a619d0e0f0560d23ed27f
                        • Instruction ID: 6639dc5b20e13b9ffc20b7d029d38c8bf6795efa3ba254e4639380a2f20fe8e3
                        • Opcode Fuzzy Hash: 40ba6680ac7aef9a45845643e59f85c0d27882956f6a619d0e0f0560d23ed27f
                        • Instruction Fuzzy Hash: 88F03072F4025836E510B3F55C5AF9F6A48EB84794F110522F708AA180C9F1D9508AA6
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WideCharToMultiByte,?,00000000,00000000), ref: 10004716
                        • GetProcAddress.KERNEL32(00000000), ref: 1000471D
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$WideCharToMultiByte
                        • API String ID: 2574300362-2634761684
                        • Opcode ID: 6fab4e53bca937376b5e52c08edff61ee41b765bf7b5218c31c0fad5cbd9b2d6
                        • Instruction ID: eebf43c34f85d85ec279a3e96838be588e74a7e6cfa64fb4382280e521ea847d
                        • Opcode Fuzzy Hash: 6fab4e53bca937376b5e52c08edff61ee41b765bf7b5218c31c0fad5cbd9b2d6
                        • Instruction Fuzzy Hash: 6541E3725042568FDB18CE2CC8549AFBBD5FBC4354F168A2DF86593281DE70DD0ACB91
                        APIs
                          • Part of subcall function 10010E50: LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,100112E6), ref: 10010E5E
                          • Part of subcall function 10010E50: GetProcAddress.KERNEL32(00000000), ref: 10010E65
                          • Part of subcall function 10010E50: IsWindow.USER32(?), ref: 10010E71
                          • Part of subcall function 10010E50: SendMessageA.USER32(?,0000043D,00000000,00000000), ref: 10010E88
                        • ??2@YAPAXI@Z.MSVCRT ref: 100112F8
                        • GetProcAddress.KERNEL32(?,ICSeqCompressFrame), ref: 10011393
                        • ??3@YAXPAX@Z.MSVCRT ref: 10011426
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$??2@??3@LibraryLoadMessageSendWindow
                        • String ID: ICSeqCompressFrame
                        • API String ID: 2489156091-1610221639
                        • Opcode ID: 7e25597ab546359d2a8180d076c7e857adf4dbdfe4734e7351304efe555cf152
                        • Instruction ID: 670ec2e5f3974c571d900b6b407094b4b862db627b4d759557e127e0940dcbb3
                        • Opcode Fuzzy Hash: 7e25597ab546359d2a8180d076c7e857adf4dbdfe4734e7351304efe555cf152
                        • Instruction Fuzzy Hash: ED416EB5B0010A9FDB1CCF64D995AABBBF5FF48244B154198E806EF345D631ED81CBA0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcessId,00000000,00000000,?,759A3A20), ref: 10003CF4
                        • GetProcAddress.KERNEL32(00000000), ref: 10003CFB
                          • Part of subcall function 10002E90: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,00000F9F,?,00000000,00000001,000000FF,?,759A3A20), ref: 10002EA6
                          • Part of subcall function 10002E90: GetProcAddress.KERNEL32(00000000), ref: 10002EAF
                          • Part of subcall function 10002E90: LoadLibraryA.KERNEL32(KERNEL32.dll,GetLocalTime,?,759A3A20), ref: 10002EBD
                          • Part of subcall function 10002E90: GetProcAddress.KERNEL32(00000000), ref: 10002EC0
                          • Part of subcall function 10002E90: rand.MSVCRT ref: 10002EDB
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$rand
                        • String ID: GetCurrentProcessId$KERNEL32.dll
                        • API String ID: 237380613-1570577352
                        • Opcode ID: 0470e2496fdb1645f775446bc4e49627f3889440c96ab3b7fc32d8b380eafc00
                        • Instruction ID: 367786970d8e879bccbbb5aaf35d38d8f6bcda55fe6c16505e8c99dfb50899a8
                        • Opcode Fuzzy Hash: 0470e2496fdb1645f775446bc4e49627f3889440c96ab3b7fc32d8b380eafc00
                        • Instruction Fuzzy Hash: 651106312487865BE325CB64DC012ABBBD5FF85310F404D3DE6A693680CF75A90C8392
                        APIs
                        • LsaOpenPolicy.ADVAPI32(00000000,?,00000004,?), ref: 10004692
                        • LsaRetrievePrivateData.ADVAPI32(?,?,?), ref: 100046C5
                        Strings
                        • L$_RasDefaultCredentials#0, xrefs: 10004675
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: DataOpenPolicyPrivateRetrieve
                        • String ID: L$_RasDefaultCredentials#0
                        • API String ID: 1655749231-2801509457
                        • Opcode ID: 7d9469a1c1fa6bf10911a44bd94c175364d005d9e62463a7837736ccd188982d
                        • Instruction ID: 77331fefa27b426b9a93bc2f5e8769b784269982fce734c4936179efd27b4e46
                        • Opcode Fuzzy Hash: 7d9469a1c1fa6bf10911a44bd94c175364d005d9e62463a7837736ccd188982d
                        • Instruction Fuzzy Hash: DC01D8B62082026FE704DA28DC42EBBB3D8EBD4254F008D2DF544CB141FA71E959C792
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10002F63
                        • GetProcAddress.KERNEL32(00000000), ref: 10002F6A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$Sleep
                        • API String ID: 2574300362-534790634
                        • Opcode ID: 4d0212f82a36383c1feb37774aa7978657163f070ada41fa4824c188b90f222c
                        • Instruction ID: 6bf08cfb84708a53feb671671ff8d99a5db139820554d43d51ecefb986336f89
                        • Opcode Fuzzy Hash: 4d0212f82a36383c1feb37774aa7978657163f070ada41fa4824c188b90f222c
                        • Instruction Fuzzy Hash: FE01F5B3A0011A9FE710CF9CDCC8CAABBBAFB45351B6202BBEA14C7514DB3199558B51
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetVersionExA), ref: 10010392
                        • GetProcAddress.KERNEL32(00000000), ref: 10010399
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetVersionExA$KERNEL32.dll
                        • API String ID: 2574300362-3023017819
                        • Opcode ID: 82f2b0b514181a4903b275308320458c98271e8cb33de1fd48414da4b85e077c
                        • Instruction ID: 0f9b196472ab68e805716585def8839785b03ec4095205029c5d0f18bfe44061
                        • Opcode Fuzzy Hash: 82f2b0b514181a4903b275308320458c98271e8cb33de1fd48414da4b85e077c
                        • Instruction Fuzzy Hash: 32F0D635A00342A7E310E774DC48F9B3FE8EFC4394F408829F99896151E7B8C5898A92
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent), ref: 1000FEEB
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FEF2
                          • Part of subcall function 10010580: OpenDesktopA.USER32(?,00000000,00000000,400001CF), ref: 10010593
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressDesktopLibraryLoadOpenProc
                        • String ID: KERNEL32.dll$SetEvent
                        • API String ID: 2817197735-1240338101
                        • Opcode ID: 54c6dc6ae0a56f88ec01dd66ece30b45ad8f3537a7bfceda0149dba70bb2369e
                        • Instruction ID: e7479e4afdd57a121476432866be38c6927a37c84e4a5ae2cdeaf398eaadcd33
                        • Opcode Fuzzy Hash: 54c6dc6ae0a56f88ec01dd66ece30b45ad8f3537a7bfceda0149dba70bb2369e
                        • Instruction Fuzzy Hash: 4F01D676904644EBC305DF94DC41B6ABBB8FF4D760F10856EFA0997380C732E8018AA1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange), ref: 1001120D
                        • GetProcAddress.KERNEL32(00000000), ref: 10011214
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: InterlockedExchange$KERNEL32.dll
                        • API String ID: 2574300362-896495449
                        • Opcode ID: 765902535b6fde137b4ad2f71effcb023d1b9619df46c92c6c5f583fd52c208c
                        • Instruction ID: ad45b1caf5e8cac53132981ffbe2540148f7c74f6a55752de9e01a09189c2720
                        • Opcode Fuzzy Hash: 765902535b6fde137b4ad2f71effcb023d1b9619df46c92c6c5f583fd52c208c
                        • Instruction Fuzzy Hash: 8BF0F63620842197E648EB649CA0EEFB755EFAD351B06864EF9169B2C0CB309CD1C3D9
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,10019AB8,000000FF,10001A28), ref: 10001A75
                        • GetProcAddress.KERNEL32(00000000), ref: 10001A7C
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$WaitForSingleObject
                        • API String ID: 2574300362-3889371928
                        • Opcode ID: 9792fb54ace26a4efeb0556bd1d455398675d1cbb426dba80bb32bc06295ea0d
                        • Instruction ID: 23ae332d06c33137492a8de233bea9ceaec26f1b355b87d5c938c7ec8b0537e1
                        • Opcode Fuzzy Hash: 9792fb54ace26a4efeb0556bd1d455398675d1cbb426dba80bb32bc06295ea0d
                        • Instruction Fuzzy Hash: DA016D71104B52ABD324DF58CC44B9ABBA4FB49720F504B4DF176876D0CBB894448B92
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,TerminateThread), ref: 1001243A
                        • GetProcAddress.KERNEL32(00000000), ref: 10012441
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$TerminateThread
                        • API String ID: 2574300362-3315417790
                        • Opcode ID: 24442554f76a4791856c97d2b7a15cc731875ce1c8c942be61a1074fece9f87f
                        • Instruction ID: f85aac3ac9cb4f3fa26bccd3d9435cec06b79a3cd592f3cb8fa1da8c44eb7136
                        • Opcode Fuzzy Hash: 24442554f76a4791856c97d2b7a15cc731875ce1c8c942be61a1074fece9f87f
                        • Instruction Fuzzy Hash: F8E04FB468020076F121E3A04C4AF593111DB14B60F608644F3252E0E1C7F1E9D18629
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,1000D2BE,FFFFFFFF,?), ref: 1000E9FD
                        • GetProcAddress.KERNEL32(00000000), ref: 1000EA04
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: InterlockedExchange$KERNEL32.dll
                        • API String ID: 2574300362-896495449
                        • Opcode ID: f6e472de204293b899042bd0bca3fb713a86289f67ced4b3daf9e9f36bef45d7
                        • Instruction ID: b8a4efd2c7601d393e6865693a388da66cd8199ebd7907c6d8f397bd308f225c
                        • Opcode Fuzzy Hash: f6e472de204293b899042bd0bca3fb713a86289f67ced4b3daf9e9f36bef45d7
                        • Instruction Fuzzy Hash: 85D02E720042A17AF20593908C8CBEB6E1ADF49390B024498FA4127282DB328C4082A2
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,1000D2AF,?), ref: 1000E5AD
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E5B4
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: InterlockedExchange$KERNEL32.dll
                        • API String ID: 2574300362-896495449
                        • Opcode ID: 66cca24a373f8bccf9510449797d14a03f0ef159430a0306f2667c069828979a
                        • Instruction ID: 465ccf067edbdd59b3eb53a1b61bb9303e9e4eafa6cd5f272da5a7b4a4e3ecbd
                        • Opcode Fuzzy Hash: 66cca24a373f8bccf9510449797d14a03f0ef159430a0306f2667c069828979a
                        • Instruction Fuzzy Hash: 20C012724044706BE115D7D0CC4CC9F6E28EF483657018565FA1957250DB70DC80C6F5
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 1000283D
                        • GetProcAddress.KERNEL32(00000000), ref: 10002844
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$WaitForSingleObject
                        • API String ID: 2574300362-3889371928
                        • Opcode ID: d3afab7406923ccce619c7f53ec8d53eb42c8db2c000410bcd3f907516cfd657
                        • Instruction ID: 86423163b6c041e323ca761cdba1352f045bc25448ac2e0872825fa0eeda39f0
                        • Opcode Fuzzy Hash: d3afab7406923ccce619c7f53ec8d53eb42c8db2c000410bcd3f907516cfd657
                        • Instruction Fuzzy Hash: 5CC0C931008570ABE52597E49C4CD8A6A14EB493617014789F635561D0CB7098808760
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,74DF0BD0,1000974D), ref: 1000BBF3
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BBFA
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: CloseHandle$KERNEL32.dll
                        • API String ID: 2574300362-2295661983
                        • Opcode ID: 0470a471ef778f5a4f0875c051031e8035987bdddae29296fa6f6fd4d5a713d0
                        • Instruction ID: 71a75eba107be1fa7f35bc22cc11f2eb860450d8e127f70ecf74c7fc174c3b1f
                        • Opcode Fuzzy Hash: 0470a471ef778f5a4f0875c051031e8035987bdddae29296fa6f6fd4d5a713d0
                        • Instruction Fuzzy Hash: 0FC012754005619BD225EBE4DC4889B7A68FF4C3013414989F66187150CBF4DDC087A1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,?,1000AE5B), ref: 1000BCED
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BCF4
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$SetEvent
                        • API String ID: 2574300362-1240338101
                        • Opcode ID: 7e845474010858c51cbeb81fb8748a49539094e452202afe6b9d06160f956f74
                        • Instruction ID: d0fca89943742553d3a958ea99514f8d67f95a1582ee3db68f22447bd0f97b38
                        • Opcode Fuzzy Hash: 7e845474010858c51cbeb81fb8748a49539094e452202afe6b9d06160f956f74
                        • Instruction Fuzzy Hash: 79C00276404561ABE66AA7E1EC8C89B7A29EF4C3513018A99F62697150CBB5DC8087A0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 1000A48A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A491
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetTickCount$KERNEL32.dll
                        • API String ID: 2574300362-381038616
                        • Opcode ID: 1d0aff5e160d0188b1a05f8fd4d33ae2250fd2240afe3bd43899046bf254bafc
                        • Instruction ID: 69d4e34d5701a036605e1fa22f034677dc5ba7240c88984f0e32ae24fd997e10
                        • Opcode Fuzzy Hash: 1d0aff5e160d0188b1a05f8fd4d33ae2250fd2240afe3bd43899046bf254bafc
                        • Instruction Fuzzy Hash: 32C09B7440156197E711DBE09C8C94E3E2CFB4C34272186D1F62197154CB74C4C15754
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: BlockInputputchar
                        • String ID:
                        • API String ID: 212221266-0
                        • Opcode ID: d0c40fde479a2ac77fd0eefb49e819c914263974de65ed91e79539f181853983
                        • Instruction ID: bcae60638838201e75d5e396b352f3edd3d3fbe876f74dd5a81984333f12039e
                        • Opcode Fuzzy Hash: d0c40fde479a2ac77fd0eefb49e819c914263974de65ed91e79539f181853983
                        • Instruction Fuzzy Hash: F3412737B486849BD310DF58A842BAEFB65FBC5620F0082BFD84587740CB366914C7E1
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000CB36
                          • Part of subcall function 1000C340: RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?), ref: 1000C358
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000CB88
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000CB98
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000CBF6
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: ??2@??3@$Open
                        • String ID:
                        • API String ID: 2374869923-0
                        • Opcode ID: a9ab1b918e15f974b9df6159bc6cb97b660a4e7a2585d31fd390fdca0085edfd
                        • Instruction ID: 399480632b0bc5efd84cd499c26cb2b4aef188cf81daa96a5daa0e4e81883018
                        • Opcode Fuzzy Hash: a9ab1b918e15f974b9df6159bc6cb97b660a4e7a2585d31fd390fdca0085edfd
                        • Instruction Fuzzy Hash: 4831B1366047494BD708DF29DC52A6FB2DAEB88650F44452CF906D7381EB35FE0AC792
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000CC96
                          • Part of subcall function 1000C340: RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?), ref: 1000C358
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000CCE8
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000CCF8
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000CD52
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: ??2@??3@$Open
                        • String ID:
                        • API String ID: 2374869923-0
                        • Opcode ID: 2f25fd5e720aa9cab3d4030d25313d2690da9c75a393af0b07616f3da6d1cc91
                        • Instruction ID: e01c473f364dc3bdf89258c02f17adc81957c92e3fcdac4d77c90bb936f91be0
                        • Opcode Fuzzy Hash: 2f25fd5e720aa9cab3d4030d25313d2690da9c75a393af0b07616f3da6d1cc91
                        • Instruction Fuzzy Hash: 2931F276604B084BD308DF28CC51A6BB7E6FBC8640F44453DFA1A87381DB31EA09CB92
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000C9A6
                          • Part of subcall function 1000C340: RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?), ref: 1000C358
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000C9F8
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000CA08
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000CA62
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: ??2@??3@$Open
                        • String ID:
                        • API String ID: 2374869923-0
                        • Opcode ID: aae3b58483ccaa6e520bcad75a32c1209ee6f662ab4da20995c377e84611bd71
                        • Instruction ID: eea0e5a8ea9d9c84cb76cedbbef8a19c41a254cccb2e08925f8116ba8cfcd4ec
                        • Opcode Fuzzy Hash: aae3b58483ccaa6e520bcad75a32c1209ee6f662ab4da20995c377e84611bd71
                        • Instruction Fuzzy Hash: 5531E07660474C4BD708DF28C851A6BB3D5FBC9A44F44452CFA5687381DB35EE09C792
                        APIs
                        • ?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,?,?,?,?,?,?,?,?,?,000000FF,100052B8), ref: 10005322
                        • ??3@YAXPAX@Z.MSVCRT ref: 10005329
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000537F
                        • ??3@YAXPAX@Z.MSVCRT ref: 10005396
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: ??3@$D@2@@std@@D@std@@Tidy@?$basic_string@U?$char_traits@V?$allocator@
                        • String ID:
                        • API String ID: 3379573162-0
                        • Opcode ID: 41e59e46f8f8aa70387dda40c822bdfd0314e96149d3350878c62626ad5ed490
                        • Instruction ID: f90b1bacc28198c49dbbefc3f517bc8e4a0b2cda54f5eaebc2833e498af44e37
                        • Opcode Fuzzy Hash: 41e59e46f8f8aa70387dda40c822bdfd0314e96149d3350878c62626ad5ed490
                        • Instruction Fuzzy Hash: 79316575600B429BC300CF5AC980A4AF7E0FF48740F00462DE55A8B792DB72FA84CBD1
                        APIs
                        • ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z.MSVCP60(?,?,?,?,00000000,?,1000635E,?), ref: 100066F4
                        • ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z.MSVCP60(?,?,00000000,?,1000635E,?), ref: 10006705
                        • ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z.MSVCP60(?,?,00000000,?,1000635E,?), ref: 10006716
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000673F
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: D@2@@std@@D@std@@Refcnt@?$basic_string@U?$char_traits@V?$allocator@$??3@
                        • String ID:
                        • API String ID: 1648593004-0
                        • Opcode ID: 59f1b0d670d1a1cc55aa766f25f71db387d79b3ce56979a42751eaff6acdd965
                        • Instruction ID: 0d66392145157419a21775a2c7d86c6955f3a7b4f70b606196f5badc0afe4783
                        • Opcode Fuzzy Hash: 59f1b0d670d1a1cc55aa766f25f71db387d79b3ce56979a42751eaff6acdd965
                        • Instruction Fuzzy Hash: F2215074704A019FE719CF29C98092BBBE6EF49690710855DE85ECB755EB30FD50CBA0
                        APIs
                        • GetProcAddress.KERNEL32(?,BitBlt), ref: 1000E495
                        • SetRect.USER32(?,000000FF,?,000000FF,?), ref: 1000E4EF
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2012328299.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000007.00000002.2012309524.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012354803.000000001001B000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012377877.000000001001E000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012396008.0000000010020000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000007.00000002.2012415130.0000000010022000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_10000000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProcRect
                        • String ID: BitBlt
                        • API String ID: 4245370471-1846796307
                        • Opcode ID: 7a9c73e825b01b7318887443e287f68de443f5842346160bc2c2aa2d36657793
                        • Instruction ID: efef9cc2901e17b89c1c2283a89420657ccd7ca40561f4e11b8d1eeecd3c465f
                        • Opcode Fuzzy Hash: 7a9c73e825b01b7318887443e287f68de443f5842346160bc2c2aa2d36657793
                        • Instruction Fuzzy Hash: BE419F75A00B049FD714CF69D9C0A6ABBF6FF88354B208A2DE986D7B94D730F8018B50

                        Execution Graph

                        Execution Coverage:7.9%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:3.2%
                        Total number of Nodes:431
                        Total number of Limit Nodes:15
                        execution_graph 5671 10016850 calloc 5523 10002070 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress puts 5524 100020c0 5523->5524 5525 100020d4 Sleep ceil _ftol puts 5524->5525 5526 100020c8 5524->5526 5527 10002119 5525->5527 5528 10002129 putchar VirtualAlloc putchar 5527->5528 5529 1000211d 5527->5529 5532 10001f40 5528->5532 5533 10001f47 putchar putchar VirtualFree 5532->5533 5672 10016870 free 5673 10010c90 5674 10010ca0 LoadLibraryA 5673->5674 5675 100124a0 15 API calls 5682 100123d0 SetServiceStatus 5675->5682 5677 100125eb 5683 100123d0 SetServiceStatus 5677->5683 5679 100125f6 CreateThread FindCloseChangeNotification CreateThread 5680 10012623 5679->5680 5885 10013c00 11 API calls 5679->5885 5892 10013430 LoadLibraryA GetProcAddress _strrev 5679->5892 5684 100120d0 5680->5684 5682->5677 5683->5679 5709 10019890 5684->5709 5688 10012163 wsprintfA SetErrorMode 5726 10002220 5688->5726 5691 100121fe rand 5696 10012188 5691->5696 5693 10002ab0 14 API calls 5693->5696 5696->5691 5696->5693 5697 100122ae Sleep 5696->5697 5701 100122bd 5696->5701 5736 100024f0 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5696->5736 5752 10011cb0 8 API calls 5696->5752 5765 10009590 5696->5765 5697->5696 5697->5701 5698 100122ef LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5699 10012321 LoadLibraryA GetProcAddress 5698->5699 5699->5701 5700 1001237d 5702 10002ab0 14 API calls 5700->5702 5701->5696 5701->5698 5701->5700 5704 100096b0 6 API calls 5701->5704 5703 10012386 5702->5703 5770 100096b0 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5703->5770 5704->5701 5710 100120ef 10 API calls 5709->5710 5711 10011ee0 5710->5711 5712 10011efb 5711->5712 5713 100120b8 5712->5713 5714 10011f0c LoadLibraryA GetProcAddress 5712->5714 5713->5688 5715 10011f5a 5714->5715 5716 10011f77 GetProcAddress 5715->5716 5717 10011f6e 5715->5717 5718 10011fb4 5716->5718 5717->5688 5719 10011fd1 GetProcAddress 5718->5719 5720 10011fc8 5718->5720 5721 10012024 GetProcAddress LoadLibraryA GetProcAddress 5719->5721 5720->5688 5722 1001204a strstr 5721->5722 5724 10012072 strncpy atoi 5722->5724 5725 1001206b 5722->5725 5724->5713 5725->5688 5789 10001c80 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5726->5789 5729 10001c80 4 API calls 5730 1000225b 5729->5730 5731 10001c80 4 API calls 5730->5731 5732 10002267 5731->5732 5733 10001c80 4 API calls 5732->5733 5734 10002273 LoadLibraryA GetProcAddress WSAStartup putchar 5733->5734 5735 1000234c putchar 5734->5735 5735->5696 5737 10002ab0 14 API calls 5736->5737 5738 10002534 puts 5737->5738 5739 1000254d puts socket Sleep 5738->5739 5740 10002583 5739->5740 5741 1000258e putchar gethostbyname putchar 5739->5741 5740->5696 5742 100025b4 5741->5742 5743 100025bf puts htons Sleep 5741->5743 5742->5696 5744 100025ee LoadLibraryA GetProcAddress connect 5743->5744 5745 10002634 5744->5745 5746 1000263f putchar setsockopt 5744->5746 5745->5696 5748 100026e0 5746->5748 5749 1000266f putchar WSAIoctl putchar 5746->5749 5791 1000ff60 6 API calls 5748->5791 5749->5748 5751 100026fc 5751->5696 5753 10011d33 5752->5753 5794 10011bd0 5753->5794 5755 10011d38 RegCreateKeyExA RegQueryValueExA 5756 10011df2 5755->5756 5757 10011de5 RegCloseKey 5755->5757 5758 10011e03 getsockname GetSystemInfo 5756->5758 5757->5758 5824 100119c0 RegOpenKeyA RegQueryValueExA RegCloseKey 5758->5824 5760 10011e76 GlobalMemoryStatus 5825 10011a50 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5760->5825 5763 10002ba0 46 API calls 5764 10011ecb 5763->5764 5764->5696 5833 1000bae0 LoadLibraryA GetProcAddress 5765->5833 5767 100095ba 6 API calls 5768 10009611 CreateThread FindCloseChangeNotification 5767->5768 5768->5696 5835 10007490 8 API calls 5768->5835 5771 1000971c 5770->5771 5881 1000bbe0 LoadLibraryA GetProcAddress 5771->5881 5774 100023c0 6 API calls 5775 10002446 puts 5774->5775 5776 10002464 puts 5775->5776 5777 1000245d 5775->5777 5779 10002477 putchar 5776->5779 5778 10002ab0 14 API calls 5777->5778 5778->5776 5780 1000248b puts WSACleanup 5779->5780 5883 10001d30 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5780->5883 5783 10001d30 4 API calls 5784 100024b5 5783->5784 5785 10001d30 4 API calls 5784->5785 5786 100024c2 5785->5786 5787 10001d30 4 API calls 5786->5787 5788 100024ce 5787->5788 5788->5680 5790 10001cfb 5789->5790 5790->5729 5792 1001004a _beginthreadex 5791->5792 5793 1001007a FindCloseChangeNotification 5792->5793 5793->5751 5827 10011af0 11 API calls 5794->5827 5796 10011bda 5797 10011be1 5796->5797 5798 10011af0 14 API calls 5796->5798 5797->5755 5799 10011bf1 5798->5799 5800 10011c10 5799->5800 5801 10011bf8 5799->5801 5803 10011af0 14 API calls 5800->5803 5802 10011af0 14 API calls 5801->5802 5804 10011c02 5802->5804 5805 10011c1a 5803->5805 5804->5755 5806 10011c21 5805->5806 5807 10011af0 14 API calls 5805->5807 5806->5755 5808 10011c31 5807->5808 5809 10011c50 5808->5809 5810 10011c38 5808->5810 5811 10011af0 14 API calls 5809->5811 5812 10011af0 14 API calls 5810->5812 5813 10011c5a 5811->5813 5814 10011c42 5812->5814 5815 10011c61 5813->5815 5816 10011af0 14 API calls 5813->5816 5814->5755 5815->5755 5817 10011c71 5816->5817 5818 10011c78 5817->5818 5819 10011af0 14 API calls 5817->5819 5818->5755 5820 10011c88 5819->5820 5821 10011ca6 5820->5821 5822 10011af0 14 API calls 5820->5822 5821->5755 5823 10011c99 5822->5823 5823->5755 5824->5760 5826 10011ab8 5825->5826 5826->5763 5828 10011b74 Process32First 5827->5828 5829 10011bbb 5827->5829 5828->5829 5830 10011b8d 5828->5830 5829->5796 5830->5829 5831 10011b9e Process32Next 5830->5831 5831->5830 5832 10011bad FindCloseChangeNotification 5831->5832 5832->5796 5834 1000bb9d 5833->5834 5834->5767 5836 1000759c GetFileAttributesA 5835->5836 5838 100075d5 5836->5838 5839 100075de Sleep 5838->5839 5842 100075ec 5838->5842 5839->5839 5839->5842 5842->5838 5843 1000b500 6 API calls 5842->5843 5849 1000b740 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress GetProcAddress 5842->5849 5851 1000b060 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5843->5851 5845 1000b5f8 5845->5842 5846 1000b5f4 5846->5845 5847 1000b682 putchar GetProcAddress LoadLibraryA GetProcAddress putchar 5846->5847 5848 1000b6e5 5847->5848 5848->5842 5850 1000b7b0 5849->5850 5850->5842 5852 1000b0c3 5851->5852 5853 1000b0b7 LoadLibraryA 5851->5853 5868 1000b310 7 API calls 5852->5868 5853->5852 5856 1000b1c1 putchar MapViewOfFile putchar 5858 1000b260 5856->5858 5859 1000b20d 5856->5859 5857 1000b155 5860 1000b24d 5857->5860 5861 1000b16e LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5857->5861 5863 1000b2a0 5858->5863 5864 1000b264 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5858->5864 5859->5860 5862 1000b211 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5859->5862 5860->5846 5861->5860 5865 1000b1a5 5861->5865 5862->5860 5866 1000b244 5862->5866 5863->5846 5864->5863 5867 1000b297 5864->5867 5865->5846 5866->5860 5867->5863 5869 1000b3a8 AllocateAndInitializeSid 5868->5869 5877 1000b41f 5868->5877 5870 1000b3c4 GetLengthSid 5869->5870 5869->5877 5872 1000b3dc 5870->5872 5874 1000b3e9 InitializeAcl 5872->5874 5872->5877 5875 1000b3f7 AddAccessAllowedAce 5874->5875 5874->5877 5876 1000b40d SetSecurityDescriptorDacl 5875->5876 5875->5877 5876->5877 5878 1000b45e 5877->5878 5879 1000b465 FreeSid 5878->5879 5880 1000b0f5 putchar CreateFileMappingA putchar 5878->5880 5879->5880 5880->5856 5880->5857 5882 1000974d 5881->5882 5882->5774 5884 10001d6f 5883->5884 5884->5783 5886 10013c91 5885->5886 5887 10013ca3 strstr 5885->5887 5889 10013d37 5887->5889 5890 10013d49 strncpy 5887->5890 5891 10013dab 5890->5891 5893 1001349f 5892->5893 5895 100134b3 RegDeleteKeyA putchar 5893->5895 5899 1000a050 17 API calls 5893->5899 5904 100131c0 5893->5904 5897 10013557 5895->5897 5897->5893 5900 1000a117 putchar Process32Next 5899->5900 5901 1000a138 putchar FindCloseChangeNotification putchar 5899->5901 5900->5901 5903 1000a12c 5900->5903 5901->5893 5903->5900 5903->5901 5912 10012f30 putchar RegOpenKeyExA 5904->5912 5906 100131c5 5907 100131c9 5906->5907 5908 100131ce 5906->5908 5923 100129d0 6 API calls 5907->5923 5915 10013090 RegOpenKeyExA 5908->5915 5911 100131d3 Sleep 5911->5893 5913 10012ff0 5912->5913 5914 10012ffc putchar RegQueryValueExA RegCloseKey _stricmp 5912->5914 5913->5906 5914->5906 5916 100130cf RegQueryValueExA 5915->5916 5922 1001318d 5915->5922 5917 10013127 RegCloseKey 5916->5917 5918 100131a8 RegCloseKey 5916->5918 5919 1001314d 5917->5919 5917->5922 5918->5922 5920 10013153 _stricmp 5919->5920 5919->5922 5920->5919 5921 10013198 5920->5921 5921->5911 5922->5911 5924 10012ab9 5923->5924 5936 100128f0 5924->5936 5926 10012b0f rand sprintf 5941 10012950 5926->5941 5928 10012b50 sprintf RegCreateKeyExA 5930 10012bc2 RegSetValueExA 5928->5930 5931 10012be4 RegSetValueExA RegCloseKey 5930->5931 5932 100128f0 8 API calls 5931->5932 5933 10012c13 5932->5933 5934 10012950 8 API calls 5933->5934 5935 10012c26 5934->5935 5935->5908 5948 10012880 LoadLibraryA GetProcAddress 5936->5948 5939 10012922 RegSaveKeyA RegCloseKey 5939->5926 5940 1001291e 5940->5926 5942 10012880 5 API calls 5941->5942 5943 10012965 RegCreateKeyExA 5942->5943 5944 10012993 5943->5944 5945 10012999 RegRestoreKeyA 5943->5945 5944->5928 5946 100129b5 RegCloseKey 5945->5946 5947 100129af 5945->5947 5946->5928 5947->5928 5949 100128a3 OpenProcessToken 5948->5949 5950 100128e8 RegOpenKeyExA 5949->5950 5951 100128ae LookupPrivilegeValueA AdjustTokenPrivileges 5949->5951 5950->5939 5950->5940 5951->5950 5952 100199ba 5953 100199d6 5952->5953 5956 100199cd 5952->5956 5953->5956 5959 100199fe 5953->5959 5991 1001990f 5953->5991 5956->5959 5962 10013930 5956->5962 5957 10019a0a 5958 10019a1e 5957->5958 5957->5959 5960 1001990f 3 API calls 5957->5960 5958->5959 5961 1001990f 3 API calls 5958->5961 5960->5958 5961->5959 5963 10013be5 5962->5963 5964 10013948 12 API calls 5962->5964 5963->5957 5998 10013570 5964->5998 5967 10013a75 putchar 5968 10013aa9 _stricmp 5967->5968 5969 10013ae6 5968->5969 5970 10013b09 5968->5970 5971 1000b060 36 API calls 5969->5971 6000 10009dd0 6 API calls 5970->6000 5972 10013afb 5971->5972 5972->5957 5978 10013b42 6006 100126f0 OpenSCManagerA 5978->6006 5980 10013b79 5981 100129d0 24 API calls 5980->5981 5982 10013b81 5981->5982 6011 10012c40 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5982->6011 5984 10013b86 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5985 10013bc0 5984->5985 6030 100131e0 10 API calls 5985->6030 5989 10013be0 6037 10012780 6 API calls 5989->6037 5992 10019917 5991->5992 5993 1001994d 5992->5993 5994 10019938 malloc 5992->5994 5996 10019977 5992->5996 5993->5956 5994->5993 5995 10019951 _initterm 5994->5995 5995->5993 5996->5993 5997 100199a4 free 5996->5997 5997->5993 5999 100138f1 _fputchar 5998->5999 5999->5967 6001 10009ed4 6000->6001 6002 10012640 LoadLibraryA GetProcAddress 6001->6002 6003 100126d7 srand 6002->6003 6004 10012690 6002->6004 6003->5978 6004->6003 6005 1001269d strncpy _access 6004->6005 6005->6004 6007 10012709 6006->6007 6008 1001270b CreateServiceA 6006->6008 6007->5980 6009 10012742 6008->6009 6010 10012744 LockServiceDatabase ChangeServiceConfig2A UnlockServiceDatabase 6008->6010 6009->5980 6010->5980 6012 10012ca4 6011->6012 6013 100128f0 8 API calls 6012->6013 6014 10012d06 rand sprintf 6013->6014 6015 10012950 8 API calls 6014->6015 6016 10012d4a RegOpenKeyExA 6015->6016 6017 10012d71 RegQueryValueExA 6016->6017 6018 10012f12 6016->6018 6019 10012e79 6017->6019 6022 10012dd5 6017->6022 6018->5984 6020 10012eb5 RegSetValueExA RegCloseKey 6019->6020 6025 10012eeb 6020->6025 6021 10012e34 sprintf 6021->6020 6022->6021 6023 10012dfa _stricmp 6022->6023 6023->6022 6026 10012e63 RegCloseKey 6023->6026 6027 100128f0 8 API calls 6025->6027 6026->5984 6028 10012efd 6027->6028 6029 10012950 8 API calls 6028->6029 6029->6018 6031 10013370 6030->6031 6032 10013410 6031->6032 6033 10013385 rand 6031->6033 6036 10012840 OpenSCManagerA OpenServiceA StartServiceA CloseServiceHandle CloseServiceHandle 6032->6036 6033->6032 6034 100133bc 6033->6034 6034->6032 6035 100133d2 rand 6034->6035 6035->6034 6035->6035 6036->5989 6037->5963 5534 1000fec0 LoadLibraryA GetProcAddress 5535 1000ff11 5534->5535 5536 1000ff1c 5535->5536 5551 10010580 5535->5551 5540 10002710 5536->5540 5538 1000ff22 5541 1000271d 5540->5541 5542 100027fb 5541->5542 5543 10002756 putchar select putchar 5541->5543 5545 10002797 putchar recv putchar 5541->5545 5560 10002870 5541->5560 5542->5538 5543->5541 5544 10002807 5543->5544 5584 10002ab0 9 API calls 5544->5584 5545->5541 5547 1000281b 5545->5547 5550 10002ab0 14 API calls 5547->5550 5548 1000280f 5548->5538 5550->5542 5552 10010592 OpenDesktopA 5551->5552 5553 1001059b OpenInputDesktop 5551->5553 5554 100105a1 5552->5554 5553->5554 5555 100105a7 5554->5555 5665 10010500 LoadLibraryA GetProcAddress 5554->5665 5555->5536 5557 100105af 5558 100105c1 5557->5558 5559 100105b6 CloseDesktop 5557->5559 5558->5536 5559->5536 5561 100028a4 5560->5561 5562 100028bc 5560->5562 5563 10002ab0 14 API calls 5561->5563 5564 10002903 5562->5564 5567 100028d2 5562->5567 5566 100028a9 5563->5566 5619 10001d90 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5564->5619 5566->5541 5588 10002ba0 5567->5588 5569 100028f0 5569->5541 5570 10002949 _CxxThrowException 5571 10002912 5570->5571 5571->5566 5571->5570 5572 10001e30 24 API calls 5571->5572 5575 10002a75 _CxxThrowException 5571->5575 5580 10002a60 _CxxThrowException 5571->5580 5582 10001d90 14 API calls 5571->5582 5583 10002a46 ??3@YAXPAX ??3@YAXPAX 5571->5583 5623 10001e30 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress Sleep 5571->5623 5633 100021b0 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5571->5633 5572->5571 5574 100029b3 ??2@YAPAXI ??2@YAPAXI 5574->5571 5574->5575 5576 100021b0 19 API calls 5575->5576 5577 10002a95 5576->5577 5578 10002ba0 46 API calls 5577->5578 5579 10002aa0 5578->5579 5579->5541 5580->5575 5582->5571 5583->5571 5585 10002b45 putchar 5584->5585 5586 10002b57 putchar closesocket putchar 5585->5586 5587 10002b7b putchar 5586->5587 5587->5548 5589 100021b0 19 API calls 5588->5589 5590 10002bb7 5589->5590 5591 10002bc3 _ftol ??2@YAPAXI 5590->5591 5592 10002cf4 5590->5592 5594 10002c01 5591->5594 5595 10002bf7 5591->5595 5593 10001d90 14 API calls 5592->5593 5596 10002d04 5593->5596 5599 10002c33 5594->5599 5600 10002c1d ??3@YAXPAX 5594->5600 5595->5569 5597 100021b0 19 API calls 5596->5597 5598 10002d0e 5597->5598 5601 10001d90 14 API calls 5598->5601 5602 10001d90 14 API calls 5599->5602 5600->5569 5617 10002cc8 5601->5617 5603 10002c4e 5602->5603 5604 10001d90 14 API calls 5603->5604 5605 10002c5c 5604->5605 5606 10001d90 14 API calls 5605->5606 5607 10002c6a 5606->5607 5609 10001d90 14 API calls 5607->5609 5608 10002ccc 5637 10002d20 LoadLibraryA GetProcAddress 5608->5637 5610 10002c77 ??3@YAXPAX ??2@YAPAXI 5609->5610 5613 100021b0 19 API calls 5610->5613 5614 10002cae 5613->5614 5615 10001d90 14 API calls 5614->5615 5616 10002cbb 5615->5616 5616->5617 5618 10002cbf ??3@YAXPAX 5616->5618 5617->5608 5618->5617 5620 10001dcd 5619->5620 5645 10001f50 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 5620->5645 5622 10001de2 5622->5571 5625 10001e7d 5623->5625 5624 10001e8c 5624->5574 5625->5624 5626 10001f03 5625->5626 5627 10001eb3 Sleep 5625->5627 5656 10002070 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress puts 5626->5656 5655 10001f30 5627->5655 5629 10001ede memmove Sleep 5629->5626 5631 10001f12 putchar 5632 10001f20 5631->5632 5632->5574 5634 100021e8 5633->5634 5635 10002070 15 API calls 5634->5635 5636 100021fa 5635->5636 5636->5571 5641 10002dde 5637->5641 5642 10002d64 5637->5642 5638 10002cea 5638->5569 5639 10002de4 send 5639->5638 5639->5641 5640 10002d72 puts send Sleep 5640->5642 5641->5638 5641->5639 5642->5638 5642->5640 5643 10002db4 Sleep 5642->5643 5644 10002dd8 5642->5644 5643->5642 5644->5641 5646 10001f90 5645->5646 5647 10001fa4 ceil _ftol putchar 5646->5647 5648 10001f98 5646->5648 5649 10001fe9 5647->5649 5648->5622 5650 10002000 putchar 5649->5650 5651 10001ff3 5649->5651 5652 10001f40 5650->5652 5651->5622 5653 1000200e putchar putchar 5652->5653 5654 1000203d 5653->5654 5654->5622 5655->5629 5657 100020c0 5656->5657 5658 100020d4 Sleep ceil _ftol puts 5657->5658 5659 100020c8 5657->5659 5660 10002119 5658->5660 5659->5631 5661 10002129 putchar VirtualAlloc putchar 5660->5661 5662 1000211d 5660->5662 5663 10001f40 5661->5663 5662->5631 5664 10002156 putchar putchar VirtualFree 5663->5664 5664->5631 5666 10010521 GetThreadDesktop GetUserObjectInformationA 5665->5666 5667 10010556 SetThreadDesktop 5666->5667 5668 1001054d 5666->5668 5669 10010561 5667->5669 5670 1001056a CloseDesktop 5667->5670 5668->5557 5669->5557 5670->5557

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,?,?,?,75A8F1B0), ref: 1000A06A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A073
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot,?,?,?,75A8F1B0), ref: 1000A083
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A086
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First,?,?,?,75A8F1B0), ref: 1000A094
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A097
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next,?,?,?,75A8F1B0), ref: 1000A0A5
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A0A8
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA,?,?,?,75A8F1B0), ref: 1000A0B8
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A0BB
                        • putchar.MSVCRT ref: 1000A0D1
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,75A8F1B0), ref: 1000A0DA
                        • putchar.MSVCRT ref: 1000A0E0
                        • putchar.MSVCRT ref: 1000A0EC
                        • Process32First.KERNEL32(00000000,?,?,?,00000030), ref: 1000A0F7
                        • putchar.MSVCRT ref: 1000A0FB
                        • lstrcmpiA.KERNEL32(?,?,?,?,?,00000030), ref: 1000A111
                        • putchar.MSVCRT ref: 1000A119
                        • Process32Next.KERNEL32(00000000,?,?,?,?,?,00000030), ref: 1000A124
                        • putchar.MSVCRT ref: 1000A144
                        • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,00000030), ref: 1000A14A
                        • putchar.MSVCRT ref: 1000A150
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32lstrcmpi
                        • String ID: CloseHandle$CreateToolhelp32Snapshot$KERNEL32.dll$Process32First$Process32Next$lstrcmpiA
                        • API String ID: 786868071-2568122304
                        • Opcode ID: 31e5f829061dbba53c5d2c6fde3747c196ce944b40467f94ed6185f2e2a995e6
                        • Instruction ID: 14c29f076475eddc1fc17d839b90263275fdc630c602952802ceb7b6b34ae79f
                        • Opcode Fuzzy Hash: 31e5f829061dbba53c5d2c6fde3747c196ce944b40467f94ed6185f2e2a995e6
                        • Instruction Fuzzy Hash: C821847190435867E611EBE18C55F9F7E9CEF88788F010929F6449B180EB75DA44CBA3

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetVersionExA,74DEF550,74DF0BD0,00000000,00002342), ref: 10011CCA
                        • GetProcAddress.KERNEL32(00000000), ref: 10011CD3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetComputerNameA), ref: 10011CE1
                        • GetProcAddress.KERNEL32(00000000), ref: 10011CE4
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetSystemInfo), ref: 10011CF4
                        • GetProcAddress.KERNEL32(00000000), ref: 10011CF7
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalMemoryStatus), ref: 10011D05
                        • GetProcAddress.KERNEL32(00000000), ref: 10011D08
                        • RegCreateKeyExA.KERNELBASE(80000001,NetSubKey,00000000,00000000,00000000,00000001,00000000,?,?), ref: 10011DB3
                        • RegQueryValueExA.KERNELBASE(?,10020D00,00000000,?,00000000,?), ref: 10011DDB
                        • RegCloseKey.ADVAPI32(?), ref: 10011DEA
                        • getsockname.WS2_32(?,?,?), ref: 10011E35
                        • GetSystemInfo.KERNELBASE(?), ref: 10011E62
                        • GlobalMemoryStatus.KERNEL32(?), ref: 10011E8A
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$CloseCreateGlobalInfoMemoryQueryStatusSystemValuegetsockname
                        • String ID: $GetComputerNameA$GetSystemInfo$GetVersionExA$GlobalMemoryStatus$KERNEL32.dll$NetSubKey$f
                        • API String ID: 3727543535-2235311193
                        • Opcode ID: 2a237a0f92db840a1eb1ab9269a4e371118933cfe521fe5565239a92627a67a5
                        • Instruction ID: 494a88bb51f59abb848ea5efdb670c61c01dd5f1d335179065a96a5b25abebd3
                        • Opcode Fuzzy Hash: 2a237a0f92db840a1eb1ab9269a4e371118933cfe521fe5565239a92627a67a5
                        • Instruction Fuzzy Hash: A1512671508385ABD724DB64CC48BDFBBE9FBC8344F00491EF699A7240DBB4A948CB56

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043,?,?,?), ref: 100139CA
                        • GetProcAddress.KERNEL32(00000000), ref: 100139D1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 100139F4
                        • GetProcAddress.KERNEL32(00000000), ref: 100139FD
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetModuleFileNameA), ref: 10013A0C
                        • GetProcAddress.KERNEL32(00000000), ref: 10013A0F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ExpandEnvironmentStringsA), ref: 10013A1D
                        • GetProcAddress.KERNEL32(00000000), ref: 10013A20
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 10013A2F
                        • GetProcAddress.KERNEL32(00000000), ref: 10013A32
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent), ref: 10013A41
                        • GetProcAddress.KERNEL32(00000000), ref: 10013A44
                        • _fputchar.MSVCRT ref: 10013A60
                        • putchar.MSVCRT ref: 10013A77
                        • _stricmp.MSVCRT(c:\program files (x86)\iefg\nefghijkl.pic,C:\Program Files (x86)\Iefg\Nefghijkl.pic), ref: 10013AD9
                        • srand.MSVCRT ref: 10013B31
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetFileAttributesA), ref: 10013B96
                        • GetProcAddress.KERNEL32(00000000), ref: 10013B9F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CopyFileA), ref: 10013BAD
                        • GetProcAddress.KERNEL32(00000000), ref: 10013BB0
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateFileMappingA,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000,00000000,?,?,?,?,?,?,?,00000000,10019D88,000000FF), ref: 1000B08E
                          • Part of subcall function 1000B060: GetProcAddress.KERNEL32(00000000), ref: 1000B097
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(KERNEL32.dll,MapViewOfFile,?,?,?,?,?,?,?,00000000,10019D88,000000FF,?,10013AFB), ref: 1000B0A6
                          • Part of subcall function 1000B060: GetProcAddress.KERNEL32(00000000), ref: 1000B0A9
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(user32.dll,?,?,?,?,?,?,?,00000000,10019D88,000000FF,?,10013AFB), ref: 1000B0BC
                          • Part of subcall function 1000B060: putchar.MSVCRT ref: 1000B107
                          • Part of subcall function 1000B060: CreateFileMappingA.KERNEL32(000000FF,?,00000004,00000000,00000594,MyCreateMa), ref: 1000B12D
                          • Part of subcall function 1000B060: putchar.MSVCRT ref: 1000B147
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B17E
                          • Part of subcall function 1000B060: GetProcAddress.KERNEL32(00000000), ref: 1000B187
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: LibraryLoad$AddressProc$putchar$CreateFileMapping_fputchar_stricmpsrand
                        • String ID: #H$%SystemRoot%\System32\svchost.exe -k imgsvc$.$2$3$A$C$C:\Program Files (x86)\Iefg\Nefghijkl.pic$CopyFileA$Defghi Klmnopqr Tuv$DeleteFileA$E$ExpandEnvironmentStringsA$GetModuleFileNameA$GetTickCount$Glable__Wait$KERNEL32.dll$SetEvent$SetFileAttributesA$a$c:\program files (x86)\iefg\nefghijkl.pic$d$k$n$n$r$r$v
                        • API String ID: 3138787520-4205962335
                        • Opcode ID: 6a04d4f16884ee80b3e521182a11346bd3e4b94cfd7b2b84332c968a17cd9129
                        • Instruction ID: 4f160d8f796e639261b17b9a2e8e3a52c1c3899edaf954e4292ac0ec274278a5
                        • Opcode Fuzzy Hash: 6a04d4f16884ee80b3e521182a11346bd3e4b94cfd7b2b84332c968a17cd9129
                        • Instruction Fuzzy Hash: F571F871C00288ABEB01EBF48C49BDF7F65EF25310F044095F645AB252DBB5DA84CBA1

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,00000000,00000000,00000000,00000000,1001A0A6,000000FF,1001262C,00000000,00000000), ref: 10012103
                        • GetProcAddress.KERNEL32(00000000), ref: 1001210C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 1001211C
                        • GetProcAddress.KERNEL32(00000000), ref: 1001211F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,OpenEventA), ref: 1001212F
                        • GetProcAddress.KERNEL32(00000000), ref: 10012132
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetErrorMode), ref: 10012144
                        • GetProcAddress.KERNEL32(00000000), ref: 10012147
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 10012155
                        • GetProcAddress.KERNEL32(00000000), ref: 10012158
                          • Part of subcall function 10011EE0: LoadLibraryA.KERNEL32(WININET.dll,74DF0BD0,00000000), ref: 10011F1B
                          • Part of subcall function 10011EE0: GetProcAddress.KERNEL32(?,InternetOpenA), ref: 10011F37
                        • wsprintfA.USER32 ref: 10012172
                        • SetErrorMode.KERNELBASE(00000001), ref: 1001217D
                          • Part of subcall function 10002220: LoadLibraryA.KERNEL32(0000006B,00000043,74DEF550,74DF0BD0,00000000), ref: 100022FE
                          • Part of subcall function 10002220: GetProcAddress.KERNEL32(00000000), ref: 10002305
                          • Part of subcall function 10002220: WSAStartup.WS2_32(00000202,?), ref: 1000232E
                          • Part of subcall function 10002220: putchar.MSVCRT ref: 1000233C
                        • rand.MSVCRT ref: 100121FE
                        • Sleep.KERNELBASE(000003E8,?), ref: 100122B3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 100122F9
                        • GetProcAddress.KERNEL32(00000000), ref: 100122FC
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 1001230A
                        • GetProcAddress.KERNEL32(00000000), ref: 1001230D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1001232D
                        • GetProcAddress.KERNEL32(00000000), ref: 10012330
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$ErrorModeSleepStartupputcharrandwsprintf
                        • String ID: 115.230.124.27$CloseHandle$Dark Angel$GetTickCount$Global\Net_%d$Global\Net_4727562$KERNEL32.dll$OpenEventA$SetErrorMode$Sleep$WaitForSingleObject$kernel32.dll
                        • API String ID: 810434042-559348158
                        • Opcode ID: 7ecbfa4711ab2f435ed5951c03360d9941b5a2a6634c743f09c3a2236a6788e0
                        • Instruction ID: fcc21334dff26631f969f0527c6582dead7894640facd2b8009a9ff836c59d36
                        • Opcode Fuzzy Hash: 7ecbfa4711ab2f435ed5951c03360d9941b5a2a6634c743f09c3a2236a6788e0
                        • Instruction Fuzzy Hash: 56717474508385ABD721EFA4CC54BDFBBD8EF99384F00091DF689AB141DB74D9888B52

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateFileMappingA,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000,00000000,?,?,?,?,?,?,?,00000000,10019D88,000000FF), ref: 1000B08E
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B097
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,MapViewOfFile,?,?,?,?,?,?,?,00000000,10019D88,000000FF,?,10013AFB), ref: 1000B0A6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B0A9
                        • LoadLibraryA.KERNEL32(user32.dll,?,?,?,?,?,?,?,00000000,10019D88,000000FF,?,10013AFB), ref: 1000B0BC
                        • putchar.MSVCRT ref: 1000B107
                        • CreateFileMappingA.KERNEL32(000000FF,?,00000004,00000000,00000594,MyCreateMa), ref: 1000B12D
                        • putchar.MSVCRT ref: 1000B147
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B17E
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B187
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapFree), ref: 1000B196
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B199
                        • putchar.MSVCRT ref: 1000B1C3
                        • MapViewOfFile.KERNELBASE(000001A4,00000006,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 1000B1D6
                        • putchar.MSVCRT ref: 1000B1EA
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B221
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B22A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapFree), ref: 1000B239
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B23C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B274
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B27D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapFree), ref: 1000B28C
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B28F
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: LibraryLoad$AddressProc$putchar$File$CreateMappingView
                        • String ID: C:\Program Files (x86)\Iefg\Nefghijkl.pic$CreateFileMappingA$GetProcessHeap$HeapFree$KERNEL32.dll$MapViewOfFile$MyCreateMa$user32.dll
                        • API String ID: 1922508129-3157973371
                        • Opcode ID: 7e492b6e8b9d6e4992306b5917f6a6b9fde949bf62dd0f427e13445e883ef58d
                        • Instruction ID: 29cbbc573f5d2514381535938bdc377b1719c72bed2d94ebac81446ff90f7634
                        • Opcode Fuzzy Hash: 7e492b6e8b9d6e4992306b5917f6a6b9fde949bf62dd0f427e13445e883ef58d
                        • Instruction Fuzzy Hash: 36619372D00658ABEB00DFE4DC84F9EBBA8EF48761F114625FA15EB290D774DD408BA0

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000047), ref: 1000753F
                        • GetProcAddress.KERNEL32(00000000), ref: 10007548
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileAttributesA), ref: 10007557
                        • GetProcAddress.KERNEL32(00000000), ref: 1000755A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 10007569
                        • GetProcAddress.KERNEL32(00000000), ref: 1000756C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 1000757B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000757E
                        • GetFileAttributesA.KERNELBASE(?), ref: 100075C6
                        • Sleep.KERNELBASE(00000064), ref: 100075E0
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$AttributesFileSleep
                        • String ID: .$2$3$A$D$G$GetFileAttributesA$KERNEL32.dll$S$Sleep$\syslog.dat$c$d$i$k$lstrcatA$m$n$o$r$s
                        • API String ID: 2641551786-722792264
                        • Opcode ID: f63941be6667be7ac3821fdcb4d0eca9e252cea7e291b80ca1847c86cefd004b
                        • Instruction ID: 372f61bf8ddc8e2e157bfc7261c49d3b080176c7735ab3767f29fa06a8c0ca9b
                        • Opcode Fuzzy Hash: f63941be6667be7ac3821fdcb4d0eca9e252cea7e291b80ca1847c86cefd004b
                        • Instruction Fuzzy Hash: 56417361C082CD9DEB12DBF89C48BDEBF76AF32244F184185E184B7242C6B94749CB75

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetLastError,74DEF550,74DF0BD0,00002342), ref: 1000250E
                        • GetProcAddress.KERNEL32(00000000), ref: 10002517
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ResetEvent), ref: 10002526
                        • GetProcAddress.KERNEL32(00000000), ref: 10002529
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,74DF0BD0,?,?,00000000,?,10002534), ref: 10002AC9
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AD2
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,CancelIo,?,00000000,?,10002534), ref: 10002AE0
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AE3
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,00000000,?,10002534), ref: 10002AF3
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AF6
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B10
                          • Part of subcall function 10002AB0: setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10002B2D
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B35
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B47
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B59
                          • Part of subcall function 10002AB0: closesocket.WS2_32(?), ref: 10002B65
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B6D
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B7D
                        • puts.MSVCRT ref: 1000253F
                        • puts.MSVCRT ref: 10002559
                        • socket.WS2_32(00000002,00000001,00000006), ref: 10002564
                        • Sleep.KERNELBASE(00000000), ref: 10002578
                        • putchar.MSVCRT ref: 10002590
                        • gethostbyname.WS2_32(?), ref: 1000259D
                        • putchar.MSVCRT ref: 100025A7
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$puts$Sleepclosesocketgethostbynamesetsockoptsocket
                        • String ID: GetLastError$KERNEL32.dll$ResetEvent$WS2_32.DLL$`$connect
                        • API String ID: 1105669736-88818756
                        • Opcode ID: c71a65267bf01e9fd5f32f9d513c7bd29baf321e37ead7116212f747ebc85de4
                        • Instruction ID: 47a0d10ca22121f92eb261470907223e266d3fa5b4e9900af84d09adbfdfa9cb
                        • Opcode Fuzzy Hash: c71a65267bf01e9fd5f32f9d513c7bd29baf321e37ead7116212f747ebc85de4
                        • Instruction Fuzzy Hash: C0510472A00718BFE710DBB4DC89F9EBBA8EF49315F104155FA09EB290CBB1A9448795

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 100124B7
                        • GetProcAddress.KERNEL32(00000000), ref: 100124C0
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 100124CE
                        • GetProcAddress.KERNEL32(00000000), ref: 100124D1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 100124DF
                        • GetProcAddress.KERNEL32(00000000), ref: 100124E2
                        • LoadIconA.USER32 ref: 1001251C
                        • LoadCursorA.USER32(10000000,00007F8B), ref: 10012531
                        • GetStockObject.GDI32(00000002), ref: 1001253D
                        • RegisterClassA.USER32 ref: 1001255C
                        • LoadMenuA.USER32(10000000,00000066), ref: 1001256C
                        • CreateWindowExA.USER32(00000000,WIN32 Application,My Win32 Applaction,00CF0000,80000000,80000000,80000000,80000000,00000000,00000000), ref: 10012598
                        • strncpy.MSVCRT ref: 100125AF
                        • wcstombs.MSVCRT ref: 100125C2
                        • RegisterServiceCtrlHandlerA.ADVAPI32(Defghi Klmnopqr Tuv,10012430), ref: 100125D5
                          • Part of subcall function 100123D0: SetServiceStatus.SECHOST ref: 10012417
                        • CreateThread.KERNELBASE(00000000,00000000,10013C00,00000000,00000000,00000000), ref: 10012608
                        • FindCloseChangeNotification.KERNELBASE(00000000), ref: 1001260B
                        • CreateThread.KERNELBASE(00000000,00000000,10013430,00000000,00000000,00000000), ref: 1001261C
                          • Part of subcall function 100120D0: LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,00000000,00000000,00000000,00000000,1001A0A6,000000FF,1001262C,00000000,00000000), ref: 10012103
                          • Part of subcall function 100120D0: GetProcAddress.KERNEL32(00000000), ref: 1001210C
                          • Part of subcall function 100120D0: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 1001211C
                          • Part of subcall function 100120D0: GetProcAddress.KERNEL32(00000000), ref: 1001211F
                          • Part of subcall function 100120D0: LoadLibraryA.KERNEL32(KERNEL32.dll,OpenEventA), ref: 1001212F
                          • Part of subcall function 100120D0: GetProcAddress.KERNEL32(00000000), ref: 10012132
                          • Part of subcall function 100120D0: LoadLibraryA.KERNEL32(KERNEL32.dll,SetErrorMode), ref: 10012144
                          • Part of subcall function 100120D0: GetProcAddress.KERNEL32(00000000), ref: 10012147
                          • Part of subcall function 100120D0: LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 10012155
                          • Part of subcall function 100120D0: GetProcAddress.KERNEL32(00000000), ref: 10012158
                          • Part of subcall function 100120D0: wsprintfA.USER32 ref: 10012172
                          • Part of subcall function 100120D0: SetErrorMode.KERNELBASE(00000001), ref: 1001217D
                          • Part of subcall function 100120D0: rand.MSVCRT ref: 100121FE
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Load$AddressLibraryProc$Create$RegisterServiceThread$ChangeClassCloseCtrlCursorErrorFindHandlerIconMenuModeNotificationObjectStatusStockWindowrandstrncpywcstombswsprintf
                        • String ID: CloseHandle$CreateThread$Defghi Klmnopqr Tuv$KERNEL32.dll$My Win32 Applaction$Sleep$WIN32 Application$f
                        • API String ID: 3841359713-283643760
                        • Opcode ID: 01d6aa7b0e9c9adc5f2245e3cb1baa4392faf9fb211db9fc1d42855f5a29e4f2
                        • Instruction ID: 560bf95f47575eba756a5b58744a31685d7a1122a40e360d2fc0a2dd57ca84c5
                        • Opcode Fuzzy Hash: 01d6aa7b0e9c9adc5f2245e3cb1baa4392faf9fb211db9fc1d42855f5a29e4f2
                        • Instruction Fuzzy Hash: C44195B4A44354BBF310DBA48C89F5F7AA8EB98B04F204419F744BB1D0D7F4E4808B65

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043,759A9E20,?,74DF0F00), ref: 1000FFF1
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FFFA
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 10010009
                        • GetProcAddress.KERNEL32(00000000), ref: 1001000C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1001001B
                        • GetProcAddress.KERNEL32(00000000), ref: 1001001E
                        • _beginthreadex.MSVCRT ref: 10010066
                        • FindCloseChangeNotification.KERNELBASE(?), ref: 1001007E
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$ChangeCloseFindNotification_beginthreadex
                        • String ID: .$2$3$A$C$CloseHandle$E$KERNEL32.dll$WaitForSingleObject$a$d$k$n$n$r$r$v
                        • API String ID: 2686131470-4013608565
                        • Opcode ID: 4f298074024c17595d47c72bd98f3d82e2c697fd77346945051b57bf041a1f24
                        • Instruction ID: 93b32ab5de4703ae6f1ec44a9a2c4a623436cf1636124a67b927a84aedefec7c
                        • Opcode Fuzzy Hash: 4f298074024c17595d47c72bd98f3d82e2c697fd77346945051b57bf041a1f24
                        • Instruction Fuzzy Hash: C1419361C042CDAEDF01DBF8C848BDEBFB5AF26204F144189E544B7342C6B98A45C7B5

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 10013C1A
                        • GetProcAddress.KERNEL32(00000000), ref: 10013C23
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10013C33
                        • GetProcAddress.KERNEL32(00000000), ref: 10013C36
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 10013C46
                        • GetProcAddress.KERNEL32(00000000), ref: 10013C49
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateFileA), ref: 10013C57
                        • GetProcAddress.KERNEL32(00000000), ref: 10013C5A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ReadFile), ref: 10013C68
                        • GetProcAddress.KERNEL32(00000000), ref: 10013C6B
                        • CreateFileA.KERNELBASE(c:\NT_Path.jpg,80000000,00000001,00000000,00000003,00000080,00000000), ref: 10013C88
                        • strstr.MSVCRT ref: 10013D28
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$CreateFilestrstr
                        • String ID: CloseHandle$CreateFileA$DeleteFileA$KERNEL32.dll$ReadFile$Sleep$c:\NT_Path.jpg
                        • API String ID: 3751178582-1674106499
                        • Opcode ID: 0737d5972adfadde29a827fa96b72669720f97e7de01c4dfca1cc12e72f9fc24
                        • Instruction ID: 1babe2449e0d2d2bc05475167633330b2679202f1ae16dd96b98fb59404567fb
                        • Opcode Fuzzy Hash: 0737d5972adfadde29a827fa96b72669720f97e7de01c4dfca1cc12e72f9fc24
                        • Instruction Fuzzy Hash: 2041E3326043446BD320D6B4DC48BDFBBC5EBD8360F010A2DF795AB1C0DEB9E9488696

                        Control-flow Graph

                        APIs
                          • Part of subcall function 10001C80: LoadLibraryA.KERNEL32(kernel32.dll,74DEF550,?,00000000,74DF0BD0,00000000), ref: 10001CAC
                          • Part of subcall function 10001C80: GetProcAddress.KERNEL32(?,InitializeCriticalSection), ref: 10001CD8
                          • Part of subcall function 10001C80: LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10001CE6
                          • Part of subcall function 10001C80: GetProcAddress.KERNEL32(00000000), ref: 10001CED
                        • LoadLibraryA.KERNEL32(0000006B,00000043,74DEF550,74DF0BD0,00000000), ref: 100022FE
                        • GetProcAddress.KERNEL32(00000000), ref: 10002305
                        • WSAStartup.WS2_32(00000202,?), ref: 1000232E
                        • putchar.MSVCRT ref: 1000233C
                        • putchar.MSVCRT ref: 10002357
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$putchar$Startup
                        • String ID: .$2$3$A$C$E$Gh0s$a$d$k$n$n$r$r$v
                        • API String ID: 1415271762-3694356089
                        • Opcode ID: 246be07735fbafbdc6cfa98a1d98683731798cfbd75714db3880e71cb4c0338e
                        • Instruction ID: c765593f1228ab312f51a2440231554b2701b48cf444d5cd7ee0975be0ee5b9d
                        • Opcode Fuzzy Hash: 246be07735fbafbdc6cfa98a1d98683731798cfbd75714db3880e71cb4c0338e
                        • Instruction Fuzzy Hash: A45180718093C8DEEB02CBF8C9497DEBFB59F26204F184189E49567382C7B95608C776

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,74DEF550,74DF0BD0,00000000), ref: 10011B0C
                        • GetProcAddress.KERNEL32(00000000), ref: 10011B15
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot), ref: 10011B24
                        • GetProcAddress.KERNEL32(00000000), ref: 10011B27
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First), ref: 10011B35
                        • GetProcAddress.KERNEL32(00000000), ref: 10011B38
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next), ref: 10011B47
                        • GetProcAddress.KERNEL32(00000000), ref: 10011B4A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA), ref: 10011B59
                        • GetProcAddress.KERNEL32(00000000), ref: 10011B5C
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 10011B6C
                        • Process32First.KERNEL32(00000000,?), ref: 10011B86
                        • Process32Next.KERNEL32(00000000,00000128), ref: 10011BA6
                        • FindCloseChangeNotification.KERNELBASE(00000000), ref: 10011BAE
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                        • String ID: CloseHandle$CreateToolhelp32Snapshot$KERNEL32.dll$Process32First$Process32Next$lstrcmpiA
                        • API String ID: 2145313745-2568122304
                        • Opcode ID: 54dd4eeb168421093c2fb5c6fb9ba70261b7bb2e36105e4be8dbd006d9ac00a4
                        • Instruction ID: 33a7d0bff169a808deda72ae241a761edb1d2097b65121f844c3f43c11954401
                        • Opcode Fuzzy Hash: 54dd4eeb168421093c2fb5c6fb9ba70261b7bb2e36105e4be8dbd006d9ac00a4
                        • Instruction Fuzzy Hash: 7A212171D0125CB6DB11EBF58C48EDFBBA8EF48355F014595F608A7140DBB4DE808BA1

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10013446
                        • GetProcAddress.KERNEL32(00000000), ref: 1001344D
                        • _strrev.MSVCRT ref: 10013490
                          • Part of subcall function 1000A050: LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,?,?,?,75A8F1B0), ref: 1000A06A
                          • Part of subcall function 1000A050: GetProcAddress.KERNEL32(00000000), ref: 1000A073
                          • Part of subcall function 1000A050: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot,?,?,?,75A8F1B0), ref: 1000A083
                          • Part of subcall function 1000A050: GetProcAddress.KERNEL32(00000000), ref: 1000A086
                          • Part of subcall function 1000A050: LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First,?,?,?,75A8F1B0), ref: 1000A094
                          • Part of subcall function 1000A050: GetProcAddress.KERNEL32(00000000), ref: 1000A097
                          • Part of subcall function 1000A050: LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next,?,?,?,75A8F1B0), ref: 1000A0A5
                          • Part of subcall function 1000A050: GetProcAddress.KERNEL32(00000000), ref: 1000A0A8
                          • Part of subcall function 1000A050: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA,?,?,?,75A8F1B0), ref: 1000A0B8
                          • Part of subcall function 1000A050: GetProcAddress.KERNEL32(00000000), ref: 1000A0BB
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A0D1
                          • Part of subcall function 1000A050: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,75A8F1B0), ref: 1000A0DA
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A0E0
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A0EC
                          • Part of subcall function 1000A050: Process32First.KERNEL32(00000000,?,?,?,00000030), ref: 1000A0F7
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A0FB
                          • Part of subcall function 1000A050: lstrcmpiA.KERNEL32(?,?,?,?,?,00000030), ref: 1000A111
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A119
                          • Part of subcall function 1000A050: Process32Next.KERNEL32(00000000,?,?,?,?,?,00000030), ref: 1000A124
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A144
                          • Part of subcall function 1000A050: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,00000030), ref: 1000A14A
                          • Part of subcall function 1000A050: putchar.MSVCRT ref: 1000A150
                        • RegDeleteKeyA.ADVAPI32(80000002,?), ref: 10013542
                        • putchar.MSVCRT ref: 10013546
                        • Sleep.KERNELBASE(000007D0), ref: 10013566
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$Process32$ChangeCloseCreateDeleteFindFirstNextNotificationSleepSnapshotToolhelp32_strrevlstrcmpi
                        • String ID: .$D$Defghi Klmnopqr Tuv$KERNEL32.dll$M$S$SYSTEM\CurrentControlSet\Services\$Sleep$\Parameters$a$i$n$x
                        • API String ID: 4013010242-3428715818
                        • Opcode ID: 391fcfc8539eb9d5919a778e419801ff6ff3d8d8e1af6a8a892af190ae81f974
                        • Instruction ID: 656b8730f2840debe5b44b57a15900f3d9bc3f561e08d9fea14a6ea0d0f8655a
                        • Opcode Fuzzy Hash: 391fcfc8539eb9d5919a778e419801ff6ff3d8d8e1af6a8a892af190ae81f974
                        • Instruction Fuzzy Hash: 73314831D00548AADB15C6B88C0979FBF72EF55314F488299F926AB2C1CBB59F48C751

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree,?,?,00000000,74DEF550,?,100021FA,00000400,?,?,?,?), ref: 10002089
                        • GetProcAddress.KERNEL32(00000000), ref: 10002092
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualAlloc,?,100021FA,00000400,?,?,?,?), ref: 100020A2
                        • GetProcAddress.KERNEL32(00000000), ref: 100020A5
                        • puts.MSVCRT ref: 100020B4
                        • Sleep.KERNELBASE(00000000,?,?,100021FA,00000400,?,?,?,?), ref: 100020D6
                        • ceil.MSVCRT ref: 100020F8
                        • _ftol.MSVCRT ref: 100020FE
                        • puts.MSVCRT ref: 1000210D
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcputs$Sleep_ftolceil
                        • String ID: KERNEL32.dll$VirtualAlloc$VirtualFree
                        • API String ID: 709144826-854231263
                        • Opcode ID: 5378d1068792a0296754f2e6aa33abd89c9b70de50dba18f36d2c0b1eef24d53
                        • Instruction ID: 67b4ca322b55172d5b2b3f26809400ec8d34f7560449fec68a2835166f1cb84b
                        • Opcode Fuzzy Hash: 5378d1068792a0296754f2e6aa33abd89c9b70de50dba18f36d2c0b1eef24d53
                        • Instruction Fuzzy Hash: 3931D671A043189BE700EF74AC9575FBB94EB84750F05843AFA419B340EBB5E948CBA2

                        Control-flow Graph

                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,74DF0BD0,?,?,00000000,?,10002534), ref: 10002AC9
                        • GetProcAddress.KERNEL32(00000000), ref: 10002AD2
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CancelIo,?,00000000,?,10002534), ref: 10002AE0
                        • GetProcAddress.KERNEL32(00000000), ref: 10002AE3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,00000000,?,10002534), ref: 10002AF3
                        • GetProcAddress.KERNEL32(00000000), ref: 10002AF6
                        • putchar.MSVCRT ref: 10002B10
                        • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10002B2D
                        • putchar.MSVCRT ref: 10002B35
                        • putchar.MSVCRT ref: 10002B47
                        • putchar.MSVCRT ref: 10002B59
                        • closesocket.WS2_32(?), ref: 10002B65
                        • putchar.MSVCRT ref: 10002B6D
                        • putchar.MSVCRT ref: 10002B7D
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$closesocketsetsockopt
                        • String ID: CancelIo$InterlockedExchange$KERNEL32.dll$SetEvent
                        • API String ID: 3616939384-4182564124
                        • Opcode ID: 22cdaf30fb1c124b0a1bfa513ced311f00fc4bcbc434222ea9ac3985815e3075
                        • Instruction ID: 80e820570aa8316687aeadd10efe1906bfac7e14aa234264a32a53d59e8af479
                        • Opcode Fuzzy Hash: 22cdaf30fb1c124b0a1bfa513ced311f00fc4bcbc434222ea9ac3985815e3075
                        • Instruction Fuzzy Hash: 8D11C3706003046BE210E7B48C95F5FB69CEF84358F014928F7998B190DBB1E9488BA3
                        APIs
                          • Part of subcall function 1000BAE0: LoadLibraryA.KERNEL32(0000006B,00000043,74DEF550,?,00002342), ref: 1000BB74
                          • Part of subcall function 1000BAE0: GetProcAddress.KERNEL32(00000000), ref: 1000BB7B
                        • LoadLibraryA.KERNEL32(kernel32.dll,lstrcpyA,?,74DEF550,74DF0BD0,00000000,00002342,?,?), ref: 100095D8
                        • GetProcAddress.KERNEL32(00000000), ref: 100095E1
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 100095EF
                        • GetProcAddress.KERNEL32(00000000), ref: 100095F2
                        • LoadLibraryA.KERNEL32(kernel32.dll,CreateThread), ref: 10009602
                        • GetProcAddress.KERNEL32(00000000), ref: 10009605
                        • CreateThread.KERNELBASE ref: 1000966D
                        • FindCloseChangeNotification.KERNELBASE(00000000), ref: 10009670
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$ChangeCloseCreateFindNotificationThread
                        • String ID: 115.230.124.27$CloseHandle$CreateThread$kernel32.dll$lstrcpyA
                        • API String ID: 4261021063-3402205455
                        • Opcode ID: 9091bcc8e501bd56a2bc30e6ea4072968cb40d9c146612e1e15759d62e73b9ad
                        • Instruction ID: fe7ce33b4d86a413b075f2b16fa1947077f76fb4672d29feb2f1acfd94731923
                        • Opcode Fuzzy Hash: 9091bcc8e501bd56a2bc30e6ea4072968cb40d9c146612e1e15759d62e73b9ad
                        • Instruction Fuzzy Hash: 89218C71604784ABE310DB69CC40F9BBBE8EF88B54F01091CF259D7280C7B5EC408B66
                        APIs
                        • putchar.MSVCRT ref: 10012FC8
                        • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,000F003F,?,75A8F1B0), ref: 10012FE6
                        • putchar.MSVCRT ref: 10012FFE
                        • RegQueryValueExA.KERNELBASE ref: 10013050
                        • RegCloseKey.ADVAPI32(?), ref: 1001305B
                        • _stricmp.MSVCRT(?,C:\Program Files (x86)\Iefg\Nefghijkl.pic), ref: 1001306B
                        Strings
                        • \Parameters, xrefs: 10012F9A
                        • Defghi Klmnopqr Tuv, xrefs: 10012F69
                        • SYSTEM\CurrentControlSet\Services\, xrefs: 10012F47
                        • ServiceDll, xrefs: 1001303A
                        • C:\Program Files (x86)\Iefg\Nefghijkl.pic, xrefs: 10013065
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$CloseOpenQueryValue_stricmp
                        • String ID: C:\Program Files (x86)\Iefg\Nefghijkl.pic$Defghi Klmnopqr Tuv$SYSTEM\CurrentControlSet\Services\$ServiceDll$\Parameters
                        • API String ID: 2222881598-1181091016
                        • Opcode ID: fafd8fc2c1ee435cdd7456266d05dc10da5760be41d8e0e15c389fcccebb80f6
                        • Instruction ID: 172bcb438a44e1edeeddb3111f318fa3f9c130a51982fd021ea6d174d8f01146
                        • Opcode Fuzzy Hash: fafd8fc2c1ee435cdd7456266d05dc10da5760be41d8e0e15c389fcccebb80f6
                        • Instruction Fuzzy Hash: 073128312046042BE718CA78CC557AB7795FBC4320F904A3DF65A972D0DAB49A0DC792
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,?,?,?,00000000,?,00000000,?,?,?,?), ref: 10002D37
                        • GetProcAddress.KERNEL32(00000000), ref: 10002D3E
                        • puts.MSVCRT ref: 10002D77
                        • send.WS2_32(?,?,?,00000000), ref: 10002D8F
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 10002D99
                        • Sleep.KERNEL32(00000000), ref: 10002DC2
                        • send.WS2_32(?,?,?,00000000), ref: 10002DEF
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Sleepsend$AddressLibraryLoadProcputs
                        • String ID: KERNEL32.dll$Sleep
                        • API String ID: 506547598-534790634
                        • Opcode ID: e9db4176a47c9d4d603cf89a5d6947398456bd026460020f4cc68f733c8cd9a6
                        • Instruction ID: fb6095805535c0a94b1921df8d56cda95d35855f03679ee4b773a2e70032a466
                        • Opcode Fuzzy Hash: e9db4176a47c9d4d603cf89a5d6947398456bd026460020f4cc68f733c8cd9a6
                        • Instruction Fuzzy Hash: 86319A726043549BE300DF24CC88B0FBBE4FB88798F110A2EF998A7290D770DD458B92
                        APIs
                        • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,000F003F,00000000,?,?,?,75A8F1B0), ref: 100130C1
                        • RegQueryValueExA.KERNELBASE(?,imgsvc,00000000,00000007,?), ref: 10013119
                        • RegCloseKey.ADVAPI32(?), ref: 1001312C
                        • _stricmp.MSVCRT(?,Defghi Klmnopqr Tuv), ref: 10013159
                        • RegCloseKey.ADVAPI32(?), ref: 100131AD
                        Strings
                        • SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost, xrefs: 100130A3
                        • imgsvc, xrefs: 1001310B
                        • Defghi Klmnopqr Tuv, xrefs: 10013153
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Close$OpenQueryValue_stricmp
                        • String ID: Defghi Klmnopqr Tuv$SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost$imgsvc
                        • API String ID: 3475241718-1899898062
                        • Opcode ID: 9bf4d1f0bfeb4b7e54a4a3deed1d59b0a146391428f8cbc132b5b48e89963b7a
                        • Instruction ID: 21c96db37a89fab73345ab23cfc66b206060dc6afe70c1b6738f8fb2a5fb681c
                        • Opcode Fuzzy Hash: 9bf4d1f0bfeb4b7e54a4a3deed1d59b0a146391428f8cbc132b5b48e89963b7a
                        • Instruction Fuzzy Hash: DF3134362043066BE704CA64CC84BBBB7E4FB847A0F40892DF95197190DBB9ED0D87A1
                        APIs
                        • LoadLibraryA.KERNEL32(AVICAP32.dll,?,00000000,00000000), ref: 10011A65
                        • GetProcAddress.KERNEL32(?,capGetDriverDescriptionA), ref: 10011A91
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10011AA0
                        • GetProcAddress.KERNEL32(00000000), ref: 10011AA7
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: AVICAP32.dll$FreeLibrary$KERNEL32.dll$capGetDriverDescriptionA
                        • API String ID: 2574300362-2837770986
                        • Opcode ID: 32f65fddd331245a191edc55556fec79f9fbfc0edb3604ae48f742ba754f073f
                        • Instruction ID: e37c0a250960508e2cf7d0eb12f9adc44ae83a7f4b6d446a4907b195bf076639
                        • Opcode Fuzzy Hash: 32f65fddd331245a191edc55556fec79f9fbfc0edb3604ae48f742ba754f073f
                        • Instruction Fuzzy Hash: 4C11C672D00258BFDB119BF49C48BEEBF78EF1A311F004591FA55E7101D7748A458794
                        APIs
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$recvselect
                        • String ID:
                        • API String ID: 990658656-0
                        • Opcode ID: 9f136abbb7ba4cd4be2037d96fc9867f676b6e030023a6ffeaf2df9ac05be5e4
                        • Instruction ID: d5fbc5164cb0050960c893280cf0169d827a4e858c2d298e0a75bd7ae736d97d
                        • Opcode Fuzzy Hash: 9f136abbb7ba4cd4be2037d96fc9867f676b6e030023a6ffeaf2df9ac05be5e4
                        • Instruction Fuzzy Hash: FA312576B0021467EA10CA64DC86BEA7354EF453B0F0043A5FE19AB2D1CF71BD85C796
                        APIs
                        • RegOpenKeyA.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,?), ref: 100119F9
                        • RegQueryValueExA.KERNELBASE(?,~MHz,00000000,00000004,?,00000004), ref: 10011A20
                        • RegCloseKey.ADVAPI32(?), ref: 10011A34
                        Strings
                        • HARDWARE\DESCRIPTION\System\CentralProcessor\0, xrefs: 100119EF
                        • ~MHz, xrefs: 10011A1A
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID: HARDWARE\DESCRIPTION\System\CentralProcessor\0$~MHz
                        • API String ID: 3677997916-2226868861
                        • Opcode ID: d109830256526acac79d2669b2750e4d5475c000351bb180b780b94e8fe5af54
                        • Instruction ID: 1b8816a47789439313b26247d8e880e8f194f70c70f62c5fd10b935215d2600c
                        • Opcode Fuzzy Hash: d109830256526acac79d2669b2750e4d5475c000351bb180b780b94e8fe5af54
                        • Instruction Fuzzy Hash: 8A01D2F3800509BFEB05EAB4EE8CEBE7B3EFB51218F240245FA15D1204EA748A018618
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent), ref: 1000FEEB
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FEF2
                          • Part of subcall function 10010580: OpenDesktopA.USER32(?,00000000,00000000,400001CF), ref: 10010593
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressDesktopLibraryLoadOpenProc
                        • String ID: KERNEL32.dll$SetEvent
                        • API String ID: 2817197735-1240338101
                        • Opcode ID: 54c6dc6ae0a56f88ec01dd66ece30b45ad8f3537a7bfceda0149dba70bb2369e
                        • Instruction ID: e7479e4afdd57a121476432866be38c6927a37c84e4a5ae2cdeaf398eaadcd33
                        • Opcode Fuzzy Hash: 54c6dc6ae0a56f88ec01dd66ece30b45ad8f3537a7bfceda0149dba70bb2369e
                        • Instruction Fuzzy Hash: 4F01D676904644EBC305DF94DC41B6ABBB8FF4D760F10856EFA0997380C732E8018AA1
                        APIs
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: _inittermfreemalloc
                        • String ID:
                        • API String ID: 1678931842-0
                        • Opcode ID: 4826aa41c0d135ad612f102df0f8f2cfc280b3fa8cbd932fabf20ab1eb05881b
                        • Instruction ID: 80d6cc89804a1d343dceb3900cf50205ab3ae4d686d74f7b3d5aa89d170c6700
                        • Opcode Fuzzy Hash: 4826aa41c0d135ad612f102df0f8f2cfc280b3fa8cbd932fabf20ab1eb05881b
                        • Instruction Fuzzy Hash: 0A117C3AA062229FE714CB68DDD5BAA37F4EF14795B25001DF806CE560DB31E8C1DB42
                        APIs
                        • LoadLibraryA.KERNELBASE(AVICAP32.dll), ref: 10010CA5
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: AVICAP32.dll
                        • API String ID: 1029625771-3627695671
                        • Opcode ID: d3be5105ee97969a8b5013d22dedfdb0f6739b726ea0359097dd6c455374c091
                        • Instruction ID: 483190d4d815d7a8ed97327acb824650f34f9ee32a8b68e2df347c7a92b9d506
                        • Opcode Fuzzy Hash: d3be5105ee97969a8b5013d22dedfdb0f6739b726ea0359097dd6c455374c091
                        • Instruction Fuzzy Hash: 9FB0127C100054CAE211CB218D8404C3DE0E7583017204180FA4186160DB3080405E48
                        APIs
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: ServiceStatus
                        • String ID:
                        • API String ID: 3969395364-0
                        • Opcode ID: 1e380c226e8bac010c9884f58680cadcd472e31c655d08c40bea2a039aae6efd
                        • Instruction ID: 91031f8439e787f6d0322f39045579d0add35f76800206164c78d567fa01cae8
                        • Opcode Fuzzy Hash: 1e380c226e8bac010c9884f58680cadcd472e31c655d08c40bea2a039aae6efd
                        • Instruction Fuzzy Hash: 1BE02BB45083819FD304DF09C48861ABBE5FBC8348F408A5DF49893351D77896098F96
                        APIs
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: calloc
                        • String ID:
                        • API String ID: 2635317215-0
                        • Opcode ID: 09ae9c63475c707ba6ae00746ab880e588ca6fca68029c4cc2952aee58e42865
                        • Instruction ID: e3f7f51552fb82f29260b026b2252c96b64f7a0553025b69aa41e182a1cd44c8
                        • Opcode Fuzzy Hash: 09ae9c63475c707ba6ae00746ab880e588ca6fca68029c4cc2952aee58e42865
                        • Instruction Fuzzy Hash: C3B012FD604300BFDA04D714DC41C6BB398EFC4100FC1880CBC4842200D535E848C763
                        APIs
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: free
                        • String ID:
                        • API String ID: 1294909896-0
                        • Opcode ID: 58d49378fe346199629efb50e7927e62b5c1b87da4a256800de03e6571fb46d4
                        • Instruction ID: 97d2d2bcbf8b1ecbedd41155bd9cc5e255ad94a65fb793b6e9d94179e52cf0eb
                        • Opcode Fuzzy Hash: 58d49378fe346199629efb50e7927e62b5c1b87da4a256800de03e6571fb46d4
                        • Instruction Fuzzy Hash: 07A002AA5052016B8904D6A8D49584A67D89B85151B308859F1468A451CF34E4D06611
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: _errno$closesocketrecvsend$AddressLibraryLoadProcselect
                        • String ID: KERNEL32.dll$Sleep
                        • API String ID: 1399858170-534790634
                        • Opcode ID: 6425c14dfe906df5a6800cda3c848b47a740d38c2c1dbaa7dc22988aec0f8ee8
                        • Instruction ID: 536e2d17fff19771818ef1dbeab40d2e2893c603724d4b4ffa0eee882a97db77
                        • Opcode Fuzzy Hash: 6425c14dfe906df5a6800cda3c848b47a740d38c2c1dbaa7dc22988aec0f8ee8
                        • Instruction Fuzzy Hash: 67B124326047469BE725DF64C8546AFB3E6FFC8780F41092CF94697284EB74EA05CB92
                        APIs
                        • WSAStartup.WS2_32(00000202,?), ref: 10008B91
                        • socket.WS2_32(00000002,00000001,00000006), ref: 10008BA5
                        • htons.WS2_32 ref: 10008BDC
                        • bind.WS2_32(00000000,?,00000010), ref: 10008BF7
                        • listen.WS2_32(00000000,00000032), ref: 10008C0C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 10008C3A
                        • GetProcAddress.KERNEL32(00000000), ref: 10008C3D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10008C4D
                        • GetProcAddress.KERNEL32(00000000), ref: 10008C50
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 10008C60
                        • GetProcAddress.KERNEL32(00000000), ref: 10008C63
                        • accept.WS2_32(?,00000000,00000000), ref: 10008C70
                        • malloc.MSVCRT ref: 10008C7A
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$Startupacceptbindhtonslistenmallocsocket
                        • String ID: CloseHandle$CreateThread$KERNEL32.dll$Sleep
                        • API String ID: 1509308642-2798766653
                        • Opcode ID: 15e2145d41a7add9d71eee42f20d10d4938fa1070dc30a732e1c175cd3c734a6
                        • Instruction ID: 4125dde44bd3390e512ed2e381dfb989099af83267bc925b9e993e18bda46321
                        • Opcode Fuzzy Hash: 15e2145d41a7add9d71eee42f20d10d4938fa1070dc30a732e1c175cd3c734a6
                        • Instruction Fuzzy Hash: 1B319070508755ABF310EFB48C49F5F7AA8FF88794F018919FA98D61D0E7B0CA448B66
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalAlloc), ref: 1000DA77
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DA80
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalLock), ref: 1000DA8E
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DA91
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalUnlock), ref: 1000DA9F
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DAA2
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalFree), ref: 1000DAB2
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DAB5
                        • OpenClipboard.USER32(00000000), ref: 1000DABD
                        • EmptyClipboard.USER32 ref: 1000DAC7
                        • SetClipboardData.USER32(00000001,00000000), ref: 1000DB00
                        • CloseClipboard.USER32 ref: 1000DB0B
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressClipboardLibraryLoadProc$CloseDataEmptyOpen
                        • String ID: GlobalAlloc$GlobalFree$GlobalLock$GlobalUnlock$KERNEL32.dll
                        • API String ID: 2000847274-4090894824
                        • Opcode ID: 3ff70bc2301f1554a66030d495e1fbbecccf5e42fa3a4837cd27f3c46f3aae26
                        • Instruction ID: c9a865e8cd7b53e8cd4289a10b273ef3ddf4e211ea81a58aee16677e223bf4c8
                        • Opcode Fuzzy Hash: 3ff70bc2301f1554a66030d495e1fbbecccf5e42fa3a4837cd27f3c46f3aae26
                        • Instruction Fuzzy Hash: DD115E71A003596BDA10FBF54C9DE5F7E98EB98391F420825FA0597241CBB4DC45CBE1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 100030F9
                        • GetProcAddress.KERNEL32(00000000), ref: 10003102
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 10003112
                        • GetProcAddress.KERNEL32(00000000), ref: 10003115
                        • LoadLibraryA.KERNEL32(kernel32.dll,CreateThread), ref: 10003123
                        • GetProcAddress.KERNEL32(00000000), ref: 10003126
                          • Part of subcall function 10002E90: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,00000F9F,?,00000000,00000001,000000FF,?,759A3A20), ref: 10002EA6
                          • Part of subcall function 10002E90: GetProcAddress.KERNEL32(00000000), ref: 10002EAF
                          • Part of subcall function 10002E90: LoadLibraryA.KERNEL32(KERNEL32.dll,GetLocalTime,?,759A3A20), ref: 10002EBD
                          • Part of subcall function 10002E90: GetProcAddress.KERNEL32(00000000), ref: 10002EC0
                          • Part of subcall function 10002E90: rand.MSVCRT ref: 10002EDB
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$rand
                        • String ID: CloseHandle$CreateThread$KERNEL32.dll$Sleep$d$kernel32.dll
                        • API String ID: 237380613-3775327080
                        • Opcode ID: 4ae96b5764063fe0fd30d144a8f4fd4bbf111a2133cf967454821b8ec0adf22c
                        • Instruction ID: 2c3cc2a0dc10f2036430107a63b00fdf6efc69e616e14cc6763cf80ca043e02f
                        • Opcode Fuzzy Hash: 4ae96b5764063fe0fd30d144a8f4fd4bbf111a2133cf967454821b8ec0adf22c
                        • Instruction Fuzzy Hash: 98B1173094464166F721EF648C85FDBB7ADDBC57C1F158439FE08AB189EBB09882C365
                        APIs
                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,10013B79,?), ref: 100126FA
                        • CreateServiceA.ADVAPI32(00000000,Defghi Klmnopqr Tuv,Defghi Klmnopqr Tuvwxyab Defg,000F01FF,00000110,00000002,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 10012733
                        Strings
                        • Defghi Klmnopqr Tuv, xrefs: 1001272D
                        • %SystemRoot%\System32\svchost.exe -k imgsvc, xrefs: 1001274A
                        • Defghi Klmnopqr Tuvwxyab Defg, xrefs: 10012728
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: CreateManagerOpenService
                        • String ID: %SystemRoot%\System32\svchost.exe -k imgsvc$Defghi Klmnopqr Tuv$Defghi Klmnopqr Tuvwxyab Defg
                        • API String ID: 2847155433-1674046866
                        • Opcode ID: 408004e29d756af054d596597ba4a6f10a30462b1db8ee5df71916fe3a3cd9f1
                        • Instruction ID: 00c32f24480fc92c701013c1cae3101ad844515917da4fae02355e615b95faac
                        • Opcode Fuzzy Hash: 408004e29d756af054d596597ba4a6f10a30462b1db8ee5df71916fe3a3cd9f1
                        • Instruction Fuzzy Hash: 1C0131B9641321BBF315DB608CC9FA737E8EB58B51F20811DF70A9A1D0DFB4D8819A14
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcess,SeBackupPrivilege,00000000,10012B0F,?,00000000), ref: 1001288D
                        • GetProcAddress.KERNEL32(00000000), ref: 10012894
                        • OpenProcessToken.ADVAPI32(00000000), ref: 100128A4
                        • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 100128BA
                        • AdjustTokenPrivileges.ADVAPI32 ref: 100128E2
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Token$AddressAdjustLibraryLoadLookupOpenPrivilegePrivilegesProcProcessValue
                        • String ID: GetCurrentProcess$KERNEL32.dll
                        • API String ID: 3744282454-4253925734
                        • Opcode ID: 12e01aaf87c452ccac56fbd1ae4905b6a3ad3d734119d3f8a2be3a10543e5fe5
                        • Instruction ID: 399f003900c3477681107aebc0dedee38224b1348bc231ad5db4fd7a3fc13127
                        • Opcode Fuzzy Hash: 12e01aaf87c452ccac56fbd1ae4905b6a3ad3d734119d3f8a2be3a10543e5fe5
                        • Instruction Fuzzy Hash: 0CF01DB4504701BFF200EB94CC4EF6B7BA8FB88745F40C54CF6559A1A1EBB0E5488B66
                        APIs
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: bindsocket
                        • String ID:
                        • API String ID: 3370621091-0
                        • Opcode ID: d28e690bdc8995af4fabef8027ee3d2d544ab97fc7e8e45e03914b4ec68bb13a
                        • Instruction ID: d4360f446b917810da476e3f6c71a0b085145997d18cc9d9d8610bddb3e71e98
                        • Opcode Fuzzy Hash: d28e690bdc8995af4fabef8027ee3d2d544ab97fc7e8e45e03914b4ec68bb13a
                        • Instruction Fuzzy Hash: 5F115BB45183119FE310DF34C8456EABBE4FF88358F104A1DF8A887290E3B5CA498786
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043,?,?,?), ref: 1000B90D
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B914
                        • LoadLibraryA.KERNEL32(0000006B,00000047,?,?,?), ref: 1000B9CA
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B9D3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileSize,?,?,?), ref: 1000B9E1
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B9E4
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA,?,?,?), ref: 1000B9F3
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B9F6
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,?,?,?), ref: 1000BA05
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BA08
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ReadFile,?,?,?), ref: 1000BA5F
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BA62
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000BA84
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000BABB
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@??3@
                        • String ID: .$.$2$2$3$3$A$A$C$CloseHandle$D$F$G$GetFileSize$KERNEL32.dll$ReadFile$S$\syslog.dat$a$c$d$d$i$i$k$k$l$lstrcatA$m$n$n$o$r$r$r$s$t
                        • API String ID: 2249131349-359626717
                        • Opcode ID: 4733201cbe0f2bbfe68d5d8c59d910bc1d2cf76b7517bcd444ba0c7cb14f1294
                        • Instruction ID: c3753f9be564234374bb9c7df3f3830cc0d6c354f57712a3cfc289ca5a5c4f37
                        • Opcode Fuzzy Hash: 4733201cbe0f2bbfe68d5d8c59d910bc1d2cf76b7517bcd444ba0c7cb14f1294
                        • Instruction Fuzzy Hash: A181B561D082CCDEEB12DBF89C487DEBFB59F26304F180099E584BB242D6B94649C776
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 1001072A
                        • GetProcAddress.KERNEL32(00000000), ref: 10010731
                        • LoadLibraryA.KERNEL32(0000006B,00000057), ref: 100107C1
                        • GetProcAddress.KERNEL32(00000000), ref: 100107C4
                        • LoadLibraryA.KERNEL32(WININET.dll), ref: 100107E5
                        • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 10010807
                        • GetProcAddress.KERNEL32(?,InternetOpenUrlA), ref: 1001085A
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: .$.$2$2$3$3$A$C$CloseHandle$F$F$FreeLibrary$InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$KERNEL32.dll$Mozilla/4.0 (compatible)$W$WININET.dll$a$d$d$i$k$k$l$l$n$n$r$r$r$r$t$t
                        • API String ID: 2238633743-2195871832
                        • Opcode ID: fb7490f8328fd0eeafc5ad8e0a84fc214b2166a01aa151e33077b620e08e9f29
                        • Instruction ID: 064ae0b22e2dc2fc89c4f03eb4b3a95ce2c70a5a763ee6d1ff4b7896122789de
                        • Opcode Fuzzy Hash: fb7490f8328fd0eeafc5ad8e0a84fc214b2166a01aa151e33077b620e08e9f29
                        • Instruction Fuzzy Hash: 05B1D2B2D00288EEEB02DBF4D848BEDBF75EF26314F144195E584EB242D7B88A45C765
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1000F90C
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F915
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalReAlloc), ref: 1000F924
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F927
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000F936
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F939
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize), ref: 1000F948
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F94B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot), ref: 1000F95A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F95D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First), ref: 1000F96B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F96E
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next), ref: 1000F97D
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F980
                        • putchar.MSVCRT ref: 1000F9BB
                          • Part of subcall function 10012880: LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcess,SeBackupPrivilege,00000000,10012B0F,?,00000000), ref: 1001288D
                          • Part of subcall function 10012880: GetProcAddress.KERNEL32(00000000), ref: 10012894
                          • Part of subcall function 10012880: OpenProcessToken.ADVAPI32(00000000), ref: 100128A4
                          • Part of subcall function 10012880: LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 100128BA
                          • Part of subcall function 10012880: AdjustTokenPrivileges.ADVAPI32 ref: 100128E2
                        • putchar.MSVCRT ref: 1000F9C9
                        • putchar.MSVCRT ref: 1000F9DB
                        • LoadLibraryA.KERNEL32(PSAPI.dll), ref: 1000FA14
                        • putchar.MSVCRT ref: 1000FA2F
                        • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 1000FA41
                        • putchar.MSVCRT ref: 1000FA56
                        • putchar.MSVCRT ref: 1000FA6B
                        • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 1000FA7D
                        • putchar.MSVCRT ref: 1000FA98
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,OpenProcess), ref: 1000FAC3
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FAC6
                        • putchar.MSVCRT ref: 1000FAD0
                        • putchar.MSVCRT ref: 1000FAE9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000FB18
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$putchar$Token$AdjustLookupOpenPrivilegePrivilegesProcessValue
                        • String ID: CloseHandle$CreateToolhelp32Snapshot$EnumProcessModules$GetModuleFileNameExA$KERNEL32.dll$LocalAlloc$LocalReAlloc$LocalSize$OpenProcess$PSAPI.dll$Process32First$Process32Next$SeDebugPrivilege$lstrlenA
                        • API String ID: 1282036386-4294572421
                        • Opcode ID: 068ed740d02c226bf235d4334da4d22a11befcd8c803ff75e0a926c38fff2103
                        • Instruction ID: ed7dc757445082031164c41d5dad267c06107d1a5756ef0b0c6a9ce41469ecf1
                        • Opcode Fuzzy Hash: 068ed740d02c226bf235d4334da4d22a11befcd8c803ff75e0a926c38fff2103
                        • Instruction Fuzzy Hash: 6FA17FB1D00219ABEB11EBF4CC49AEFBBB9FF88344F114465E605AB240DB74DA448B91
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1000A659
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A662
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileSize), ref: 1000A671
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A674
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetFilePointer), ref: 1000A683
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A686
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 1000A709
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A710
                        • LoadLibraryA.KERNEL32(0000006B,00000057), ref: 1000A79A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A7A1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000A800
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A807
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000A824
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000A888
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@??3@
                        • String ID: .$.$2$2$3$3$A$C$CloseHandle$F$F$GetFileSize$KERNEL32.dll$SetFilePointer$W$a$d$d$i$k$k$l$l$lstrlenA$n$n$r$r$r$r$t$t
                        • API String ID: 2249131349-203027907
                        • Opcode ID: dab8b113ad70751e6eae44383678542ae7b1d57ddab95ac8afc5088dab92d69f
                        • Instruction ID: fe699898880f01a8b36b717f387e2983543c0f7d2eada66655982565652e3611
                        • Opcode Fuzzy Hash: dab8b113ad70751e6eae44383678542ae7b1d57ddab95ac8afc5088dab92d69f
                        • Instruction Fuzzy Hash: AD816262C042C8EEEB12DBF8D848BDDBF75EF26204F184189E584BB242D7B98645C775
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10001222
                        • GetProcAddress.KERNEL32(00000000), ref: 1000122B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,TerminateThread), ref: 1000123A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000123D
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 1000124C
                        • GetProcAddress.KERNEL32(00000000), ref: 1000124F
                        • puts.MSVCRT ref: 10001263
                        • GetProcAddress.KERNEL32(00000000,waveInReset), ref: 10001277
                        • Sleep.KERNEL32(00000000), ref: 1000128C
                        • puts.MSVCRT ref: 100012A1
                        • GetProcAddress.KERNEL32(00000000,waveInStop), ref: 100012B6
                        • Sleep.KERNEL32(00000000), ref: 100012CB
                        • puts.MSVCRT ref: 100012E0
                        • GetProcAddress.KERNEL32(00000000,waveInClose), ref: 100012F5
                        • Sleep.KERNEL32(00000000), ref: 1000130A
                        • puts.MSVCRT ref: 1000131F
                        • GetProcAddress.KERNEL32(00000000,waveInUnprepareHeader), ref: 10001333
                        • Sleep.KERNEL32(00000000), ref: 10001348
                        • puts.MSVCRT ref: 1000135D
                        • GetProcAddress.KERNEL32(00000000,waveOutReset), ref: 10001372
                        • Sleep.KERNEL32(00000000), ref: 10001387
                        • puts.MSVCRT ref: 1000139C
                        • GetProcAddress.KERNEL32(00000000,waveOutClose), ref: 100013B1
                        • Sleep.KERNEL32(00000000), ref: 100013C6
                        • puts.MSVCRT ref: 100013DB
                        • GetProcAddress.KERNEL32(00000000,waveOutUnprepareHeader), ref: 100013EF
                        • Sleep.KERNEL32(00000000), ref: 10001404
                        • ??3@YAXPAX@Z.MSVCRT ref: 10001487
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000148F
                        • ??3@YAXPAX@Z.MSVCRT ref: 10001498
                        • ??3@YAXPAX@Z.MSVCRT ref: 100014A1
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$Sleepputs$??3@$LibraryLoad
                        • String ID: CloseHandle$FreeLibrary$KERNEL32.dll$TerminateThread$kernel32.dll$waveInClose$waveInReset$waveInStop$waveInUnprepareHeader$waveOutClose$waveOutReset$waveOutUnprepareHeader
                        • API String ID: 1917019950-2982369931
                        • Opcode ID: 2dce0038590a55a4bda78d1a9dc3e1e9df238cbd6436296f17952de03bbe60e5
                        • Instruction ID: 26c20586eb7f091ceae6726055cc1af642dfef8f9a2f5fd2405fdc4243d67d6e
                        • Opcode Fuzzy Hash: 2dce0038590a55a4bda78d1a9dc3e1e9df238cbd6436296f17952de03bbe60e5
                        • Instruction Fuzzy Hash: 8581D1B2800609AFE711EBB4CC8CAAE7B7AFF4D325B154604FA42D7215DB74E9818B50
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,00000000,00000000,74DEF550), ref: 100131FC
                        • GetProcAddress.KERNEL32(00000000), ref: 10013205
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetFileAttributesA), ref: 10013214
                        • GetProcAddress.KERNEL32(00000000), ref: 10013217
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetFilePointer), ref: 10013226
                        • GetProcAddress.KERNEL32(00000000), ref: 10013229
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 100132AC
                        • GetProcAddress.KERNEL32(00000000), ref: 100132B3
                        • LoadLibraryA.KERNEL32(0000006B,00000057), ref: 1001333D
                        • GetProcAddress.KERNEL32(00000000), ref: 10013344
                        • rand.MSVCRT ref: 100133A5
                        • rand.MSVCRT ref: 100133D2
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$rand
                        • String ID: .$.$2$2$3$3$A$C$CloseHandle$F$F$KERNEL32.dll$SetFileAttributesA$SetFilePointer$W$a$d$d$i$k$k$l$l$n$n$r$r$r$r$t$t
                        • API String ID: 237380613-1450536158
                        • Opcode ID: fcb331f0d57d39ce57a5e03f5e326d309c8603a9e7d80ba35128e688db30a1a5
                        • Instruction ID: e4958f366cd472ed21702a7bfc4c057534074140b614f248dc7e9797ebaf45da
                        • Opcode Fuzzy Hash: fcb331f0d57d39ce57a5e03f5e326d309c8603a9e7d80ba35128e688db30a1a5
                        • Instruction Fuzzy Hash: 74718361D042C8EEEB12DBF8CC487DEBF75AF26204F144199E680BB282C7B94A45C775
                        APIs
                        • LoadLibraryA.KERNEL32(user32.dll), ref: 1000AACA
                        • GetProcAddress.KERNEL32(00000000,ImmGetContext), ref: 1000AAF4
                        • GetProcAddress.KERNEL32(00000000,ImmGetCompositionStringA), ref: 1000AB1D
                        • GetProcAddress.KERNEL32(00000000,00000049), ref: 1000AB8A
                        • GetProcAddress.KERNEL32(75BD0000,00000043), ref: 1000ABEE
                        • GetProcAddress.KERNEL32(75BD0000,00000047), ref: 1000AC78
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 1000AC95
                        • GetProcAddress.KERNEL32(00000000), ref: 1000AC9C
                        • putchar.MSVCRT ref: 1000ADBD
                          • Part of subcall function 1000A8A0: GetProcAddress.KERNEL32(75BD0000,GetActiveWindow), ref: 1000A904
                          • Part of subcall function 1000A8A0: GetProcAddress.KERNEL32(75BD0000,GetWindowTextA), ref: 1000A93D
                          • Part of subcall function 1000A8A0: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 1000A960
                          • Part of subcall function 1000A8A0: GetProcAddress.KERNEL32(00000000), ref: 1000A969
                          • Part of subcall function 1000A8A0: LoadLibraryA.KERNEL32(KERNEL32.dll,GetLocalTime), ref: 1000A98A
                          • Part of subcall function 1000A8A0: GetProcAddress.KERNEL32(00000000), ref: 1000A98D
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad$putchar
                        • String ID: #H$A$C$C$E$G$H$I$ImmGetCompositionStringA$ImmGetContext$K$KERNEL32.dll$N$N$R$T$[$a$a$a$e$k$l$lstrcatA$m$n$o$s$t$user32.dll$x$x$y
                        • API String ID: 4073541567-3865136633
                        • Opcode ID: d8f000c34229ee0795fb54f437139a4d4c6ea5dfa880a379e5fefd71b1a0383e
                        • Instruction ID: 9329f6329972e31b170709e223eb3470df1ceecf52300e58e40714d78a339caa
                        • Opcode Fuzzy Hash: d8f000c34229ee0795fb54f437139a4d4c6ea5dfa880a379e5fefd71b1a0383e
                        • Instruction Fuzzy Hash: 0DB1D371C04288DFEB01CBB8D888BDEBFB1EF26315F188159E545AB342D7B88945CB65
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000499C
                        • GetProcAddress.KERNEL32(00000000), ref: 100049A5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetPrivateProfileSectionNamesA), ref: 100049B5
                        • GetProcAddress.KERNEL32(00000000), ref: 100049B8
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 100049C8
                        • GetProcAddress.KERNEL32(00000000), ref: 100049CB
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 100049D9
                        • GetProcAddress.KERNEL32(00000000), ref: 100049DC
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetWindowsDirectoryA), ref: 100049EC
                        • GetProcAddress.KERNEL32(00000000), ref: 100049EF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpA), ref: 100049FF
                        • GetProcAddress.KERNEL32(00000000), ref: 10004A02
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetPrivateProfileStringA), ref: 10004A12
                        • GetProcAddress.KERNEL32(00000000), ref: 10004A15
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetVersionExA), ref: 10004A25
                        • GetProcAddress.KERNEL32(00000000), ref: 10004A28
                        • strchr.MSVCRT ref: 10004A4C
                        • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000023,00000000), ref: 10004A86
                        • wsprintfA.USER32 ref: 10004AA6
                        • ??2@YAPAXI@Z.MSVCRT ref: 10004AF4
                        • ??3@YAXPAX@Z.MSVCRT ref: 10004CAD
                        • ??3@YAXPAX@Z.MSVCRT ref: 10004CB3
                        • ??3@YAXPAX@Z.MSVCRT ref: 10004CB9
                        • ??3@YAXPAX@Z.MSVCRT ref: 10004CF3
                          • Part of subcall function 100048A0: wsprintfA.USER32 ref: 1000490C
                          • Part of subcall function 100048A0: LsaFreeMemory.ADVAPI32(?), ref: 1000493A
                          • Part of subcall function 100048A0: LsaFreeMemory.ADVAPI32(?), ref: 10004964
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??3@$FreeMemorywsprintf$??2@FolderPathSpecialstrchr
                        • String ID: %s\%s$Device$DialParamsUID$Documents and Settings\$GetPrivateProfileSectionNamesA$GetPrivateProfileStringA$GetVersionExA$GetWindowsDirectoryA$KERNEL32.dll$Microsoft\Network\Connections\pbk\rasphone.pbk$PhoneNumber$\Application Data\Microsoft\Network\Connections\pbk\rasphone.pbk$lstrcatA$lstrcmpA$lstrcpyA$lstrlenA
                        • API String ID: 2638624708-985675920
                        • Opcode ID: beace84667f98d00e8a91dfd5db565bbfa341decb6f359f0c3c61f455fbb9585
                        • Instruction ID: 20e6396873381d7c0e0433becb7a9987db1ab73e03b2a8fddb770d20359ecc82
                        • Opcode Fuzzy Hash: beace84667f98d00e8a91dfd5db565bbfa341decb6f359f0c3c61f455fbb9585
                        • Instruction Fuzzy Hash: 64917CB1504385AFE720DB64CC84F9FB7E9EFC8344F01492DB68997240DB74E9458B66
                        APIs
                          • Part of subcall function 1000BAE0: LoadLibraryA.KERNEL32(0000006B,00000043,74DEF550,?,00002342), ref: 1000BB74
                          • Part of subcall function 1000BAE0: GetProcAddress.KERNEL32(00000000), ref: 1000BB7B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,?), ref: 1000EC3A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000EC43
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetStartupInfoA), ref: 1000EC52
                        • GetProcAddress.KERNEL32(00000000), ref: 1000EC55
                        • LoadLibraryA.KERNEL32(0000006B,00000047), ref: 1000ECF6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000ECFD
                        • LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1000ED15
                        • GetProcAddress.KERNEL32(00000000,CreatePipe), ref: 1000EDB7
                        • putchar.MSVCRT ref: 1000EE5A
                        • putchar.MSVCRT ref: 1000EE6B
                        • putchar.MSVCRT ref: 1000EE9C
                        • putchar.MSVCRT ref: 1000EEB2
                        • putchar.MSVCRT ref: 1000EEE6
                        • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 1000EEF6
                        • putchar.MSVCRT ref: 1000EF32
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProcputchar$LibraryLoad
                        • String ID: .$2$3$A$CloseHandle$CreatePipe$CreateProcessA$D$D$G$GetStartupInfoA$KERNEL32.dll$Kernel32.dll$S$\cmd.exe$c$d$i$k$m$n$o$r$s
                        • API String ID: 1002352977-1435807317
                        • Opcode ID: 004a8128b56c0a7b52f536146c59eb240084d3426222fa010a4b01d9e2f4754e
                        • Instruction ID: 6b6c853a8edd7db5b04c1d145f315ee90d9778b60e687b4d3239c5aa7e7c3961
                        • Opcode Fuzzy Hash: 004a8128b56c0a7b52f536146c59eb240084d3426222fa010a4b01d9e2f4754e
                        • Instruction Fuzzy Hash: 33D19C71D003989FEB11CFA8CC84BDEBBB5EF19300F14416AE505AB385DBB4AA44CB65
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000052), ref: 10005D51
                        • GetProcAddress.KERNEL32(00000000), ref: 10005D58
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindFirstFileA), ref: 10005D7B
                        • GetProcAddress.KERNEL32(00000000), ref: 10005D84
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindNextFileA), ref: 10005D93
                        • GetProcAddress.KERNEL32(00000000), ref: 10005D96
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindClose), ref: 10005DA5
                        • GetProcAddress.KERNEL32(00000000), ref: 10005DA8
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 10005DB7
                        • GetProcAddress.KERNEL32(00000000), ref: 10005DBA
                        • wsprintfA.USER32 ref: 10005E0E
                        • wsprintfA.USER32 ref: 10005E5C
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$wsprintf
                        • String ID: %s\$%s\$%s\%s$.$.$.$2$3$A$D$DeleteFileA$FindClose$FindFirstFileA$FindNextFileA$KERNEL32.dll$R$c$d$i$k$m$n$r$t$v$y
                        • API String ID: 2290142023-2069858983
                        • Opcode ID: 7029d3975995faa2dcd8a658e12b7de61dfae0326ac39237c9215672ac86e5ad
                        • Instruction ID: e421bdb628c906eaad545b3452baa4c9121083f3eafd901147b42c9b123696e0
                        • Opcode Fuzzy Hash: 7029d3975995faa2dcd8a658e12b7de61dfae0326ac39237c9215672ac86e5ad
                        • Instruction Fuzzy Hash: 0561A471C042C8AEEB11DBF8DC48AEEBF79EF26214F044589E544A7242D7B94B44C775
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 10006A5C
                        • GetProcAddress.KERNEL32(00000000), ref: 10006A65
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetFilePointer), ref: 10006A74
                        • GetProcAddress.KERNEL32(00000000), ref: 10006A77
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 10006AFA
                        • GetProcAddress.KERNEL32(00000000), ref: 10006B01
                        • LoadLibraryA.KERNEL32(0000006B,00000057), ref: 10006B8B
                        • GetProcAddress.KERNEL32(00000000), ref: 10006B92
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .$.$2$2$3$3$A$C$CloseHandle$F$F$KERNEL32.dll$SetFilePointer$W$a$d$d$i$k$k$l$l$n$n$p$r$r$r$r$t$t
                        • API String ID: 2574300362-369838978
                        • Opcode ID: 416ee21cdec2a33fad3c0efd519d7c9f1643e93d97ac3961679d5668f6e05687
                        • Instruction ID: 1e4161e908d3f57539f6daf96cfd781ace7ba9dabb0536a5f1e30b0409eac641
                        • Opcode Fuzzy Hash: 416ee21cdec2a33fad3c0efd519d7c9f1643e93d97ac3961679d5668f6e05687
                        • Instruction Fuzzy Hash: 76614F71C082C8EEEB12CBE8D848BDDBF75AF26304F184189E5846B382C3B95609C775
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection), ref: 10008817
                        • GetProcAddress.KERNEL32(00000000), ref: 10008820
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection), ref: 1000882E
                        • GetProcAddress.KERNEL32(00000000), ref: 10008831
                        • malloc.MSVCRT ref: 10008861
                        • malloc.MSVCRT ref: 1000886E
                        • malloc.MSVCRT ref: 10008879
                        • recv.WS2_32 ref: 100088E2
                        • send.WS2_32 ref: 10008972
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,?,?,?,?,00005000,00000000), ref: 100089A4
                        • GetProcAddress.KERNEL32(00000000), ref: 100089A7
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread,?,?,?,?,?,?,?,00005000,00000000), ref: 100089BA
                        • GetProcAddress.KERNEL32(00000000), ref: 100089BD
                        • getpeername.WS2_32(?,?,?), ref: 100089CE
                        • inet_addr.WS2_32(?), ref: 100089DF
                        • inet_addr.WS2_32(00000000), ref: 100089F5
                        • htons.WS2_32(?), ref: 10008A00
                        • send.WS2_32(00000000), ref: 10008A42
                          • Part of subcall function 100085C0: htons.WS2_32 ref: 100085E3
                          • Part of subcall function 100085C0: inet_addr.WS2_32(?), ref: 100085F9
                          • Part of subcall function 100085C0: inet_addr.WS2_32(?), ref: 10008617
                          • Part of subcall function 100085C0: socket.WS2_32(00000002,00000001,00000006), ref: 10008623
                          • Part of subcall function 100085C0: setsockopt.WS2_32 ref: 1000864E
                          • Part of subcall function 100085C0: connect.WS2_32(?,?,00000010), ref: 1000865E
                          • Part of subcall function 100085C0: closesocket.WS2_32 ref: 1000866C
                        • send.WS2_32(-0000005B,?,00000008,00000000), ref: 10008AE8
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 10008B0E
                        • GetProcAddress.KERNEL32(00000000), ref: 10008B11
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 10008B1F
                        • GetProcAddress.KERNEL32(00000000), ref: 10008B22
                          • Part of subcall function 100083B0: gethostbyname.WS2_32(?), ref: 100083B5
                        • closesocket.WS2_32 ref: 10008B49
                        • closesocket.WS2_32(?), ref: 10008B4F
                        • free.MSVCRT(?), ref: 10008B58
                        • free.MSVCRT(?), ref: 10008B5F
                        • free.MSVCRT(?), ref: 10008B66
                        • free.MSVCRT(?), ref: 10008B6D
                          • Part of subcall function 10007EE0: LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 10007EFA
                          • Part of subcall function 10007EE0: GetProcAddress.KERNEL32(00000000), ref: 10007F03
                          • Part of subcall function 10007EE0: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 10007F13
                          • Part of subcall function 10007EE0: GetProcAddress.KERNEL32(00000000), ref: 10007F16
                          • Part of subcall function 10007EE0: LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection), ref: 10007F26
                          • Part of subcall function 10007EE0: GetProcAddress.KERNEL32(00000000), ref: 10007F29
                          • Part of subcall function 10007EE0: LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection), ref: 10007F37
                          • Part of subcall function 10007EE0: GetProcAddress.KERNEL32(00000000), ref: 10007F3A
                          • Part of subcall function 10007EE0: send.WS2_32(?,HTTP/1.0 200 OK,?,00000000), ref: 1000800B
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$freeinet_addrsend$closesocketmalloc$htons$connectgethostbynamegetpeernamerecvsetsockoptsocket
                        • String ID: CreateThread$EnterCriticalSection$KERNEL32.dll$LeaveCriticalSection$WaitForSingleObject$[
                        • API String ID: 2190144742-4023625534
                        • Opcode ID: fa257dd73039a14c97b553c7013e5d380b94430b2c7dbbb0dc0c0730267c3c11
                        • Instruction ID: 71d1ebbffbc4392aa6c1a54c1b7c41268db957bde06741065b4df84323e1aa41
                        • Opcode Fuzzy Hash: fa257dd73039a14c97b553c7013e5d380b94430b2c7dbbb0dc0c0730267c3c11
                        • Instruction Fuzzy Hash: 0EA1BDB0508740ABE340DB64CC85F6BBBE9FF88794F10491DF68593281DBB4ED458BA2
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000047,74DEF550,74DF0BD0,00000001), ref: 1000B5A6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B5AD
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 1000B5D0
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B5D9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 1000B5E7
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B5EA
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateFileMappingA,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000,00000000,?,?,?,?,?,?,?,00000000,10019D88,000000FF), ref: 1000B08E
                          • Part of subcall function 1000B060: GetProcAddress.KERNEL32(00000000), ref: 1000B097
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(KERNEL32.dll,MapViewOfFile,?,?,?,?,?,?,?,00000000,10019D88,000000FF,?,10013AFB), ref: 1000B0A6
                          • Part of subcall function 1000B060: GetProcAddress.KERNEL32(00000000), ref: 1000B0A9
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(user32.dll,?,?,?,?,?,?,?,00000000,10019D88,000000FF,?,10013AFB), ref: 1000B0BC
                          • Part of subcall function 1000B060: putchar.MSVCRT ref: 1000B107
                          • Part of subcall function 1000B060: CreateFileMappingA.KERNEL32(000000FF,?,00000004,00000000,00000594,MyCreateMa), ref: 1000B12D
                          • Part of subcall function 1000B060: putchar.MSVCRT ref: 1000B147
                          • Part of subcall function 1000B060: LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B17E
                          • Part of subcall function 1000B060: GetProcAddress.KERNEL32(00000000), ref: 1000B187
                        • putchar.MSVCRT ref: 1000B68E
                        • GetProcAddress.KERNEL32(75BD0000,SetWindowsHookExA), ref: 1000B6A9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileAttributesA), ref: 1000B6B8
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B6BF
                        • putchar.MSVCRT ref: 1000B6D0
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$putchar$CreateFileMapping
                        • String ID: #H$.$2$3$A$D$G$GetFileAttributesA$GetTickCount$K$KERNEL32.dll$S$SetWindowsHookExA$\syslog.dat$c$d$i$k$lstrcatA$m$n$o$r$s
                        • API String ID: 3041509725-1534753197
                        • Opcode ID: c0506df1eb36be90c60e9df97dfc9f6a4b71a08f2c0bb025c8629eea346a2b82
                        • Instruction ID: 7bb24e255123807198f3e59c8143dc0489b4576930567646d8ce909a54256b0a
                        • Opcode Fuzzy Hash: c0506df1eb36be90c60e9df97dfc9f6a4b71a08f2c0bb025c8629eea346a2b82
                        • Instruction Fuzzy Hash: C4613576C08388DEEB01CBB8CC88BDEBF75EB2A354F184185D544A7342C3B58A45C7A5
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 10005ECC
                        • GetProcAddress.KERNEL32(00000000), ref: 10005ED5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree), ref: 10005EE4
                        • GetProcAddress.KERNEL32(00000000), ref: 10005EE7
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileSize), ref: 10005EF6
                        • GetProcAddress.KERNEL32(00000000), ref: 10005EF9
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 10005F08
                        • GetProcAddress.KERNEL32(00000000), ref: 10005F0B
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 10005F8E
                        • GetProcAddress.KERNEL32(00000000), ref: 10005F95
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 10005FB2
                        • GetProcAddress.KERNEL32(00000000), ref: 10005FB9
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .$2$3$A$C$CloseHandle$F$GetFileSize$KERNEL32.dll$LocalAlloc$LocalFree$a$d$i$k$kernel32.dll$l$lstrlenA$n$r$r$t
                        • API String ID: 2574300362-3506522646
                        • Opcode ID: 814e71e19dab9cc40bcb0da0327889806179cb21502255d82f6457ca8b94e039
                        • Instruction ID: 5e49c3b4e0a519e3fe84e3198b03eddbfbe54d7449a10c0bbcd858f2b94fc8ff
                        • Opcode Fuzzy Hash: 814e71e19dab9cc40bcb0da0327889806179cb21502255d82f6457ca8b94e039
                        • Instruction Fuzzy Hash: 5C519171D04288AEDB01DBF8DC48AEEBFB6EF59310F044159EA45AB381C7B98A44C775
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 100060BC
                        • GetProcAddress.KERNEL32(00000000), ref: 100060C5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetFilePointer), ref: 100060D4
                        • GetProcAddress.KERNEL32(00000000), ref: 100060D7
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ReadFile), ref: 100060E6
                        • GetProcAddress.KERNEL32(00000000), ref: 100060E9
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 1000616C
                        • GetProcAddress.KERNEL32(00000000), ref: 10006173
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 10006196
                        • GetProcAddress.KERNEL32(00000000), ref: 1000619F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree), ref: 100061AD
                        • GetProcAddress.KERNEL32(00000000), ref: 100061B0
                          • Part of subcall function 10006280: ?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,00000000,1000626E), ref: 1000629D
                          • Part of subcall function 10006280: ??3@YAXPAX@Z.MSVCRT ref: 100062A4
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??3@D@2@@std@@D@std@@Tidy@?$basic_string@U?$char_traits@V?$allocator@
                        • String ID: .$2$3$A$C$CloseHandle$F$KERNEL32.dll$LocalAlloc$LocalFree$ReadFile$SetFilePointer$a$d$i$k$l$n$r$r$t
                        • API String ID: 3930180597-656559191
                        • Opcode ID: ec3562c76cf02b6856c9bee384952842a4c3ff7b6c421bb19793b3f923da77ac
                        • Instruction ID: 78a80e282135f81af03c7fdf581fc6e5c74b732e9572507f890dce5143d03e5d
                        • Opcode Fuzzy Hash: ec3562c76cf02b6856c9bee384952842a4c3ff7b6c421bb19793b3f923da77ac
                        • Instruction Fuzzy Hash: CC51E272D04288AEEB01DBF8DC48BDEBFB9EF29310F14415AE644A7281C7B59904C7B5
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,?,?,?,00000000), ref: 10005A3E
                        • GetProcAddress.KERNEL32(00000000), ref: 10005A47
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindClose,?,?,00000000), ref: 10005A57
                        • GetProcAddress.KERNEL32(00000000), ref: 10005A5A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree,?,?,00000000), ref: 10005A6A
                        • GetProcAddress.KERNEL32(00000000), ref: 10005A6D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindNextFileA,?,?,00000000), ref: 10005A7D
                        • GetProcAddress.KERNEL32(00000000), ref: 10005A80
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalReAlloc,?,?,00000000), ref: 10005A90
                        • GetProcAddress.KERNEL32(00000000), ref: 10005A93
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindFirstFileA,?,?,00000000), ref: 10005AA3
                        • GetProcAddress.KERNEL32(00000000), ref: 10005AA6
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc,?,?,00000000), ref: 10005AB4
                        • GetProcAddress.KERNEL32(00000000), ref: 10005AB7
                        • putchar.MSVCRT ref: 10005AD7
                        • sprintf.MSVCRT ref: 10005B1B
                        • putchar.MSVCRT ref: 10005B23
                        • putchar.MSVCRT ref: 10005B3F
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?), ref: 10005B8F
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$putchar$Sleepsprintf
                        • String ID: %$.$FindClose$FindFirstFileA$FindNextFileA$KERNEL32.dll$LocalAlloc$LocalFree$LocalReAlloc$\$h$lstrlenA$s
                        • API String ID: 2618214712-3160943981
                        • Opcode ID: 8a69a945e8b0324ef820fab0aa294c9ce6098a293f04ac7549e39045fe80e8c3
                        • Instruction ID: f0a3fdec2b8c62b2eb02954bf6e4918d43d4f4ef5ffc7c2ff0cb3d43c87bd9e5
                        • Opcode Fuzzy Hash: 8a69a945e8b0324ef820fab0aa294c9ce6098a293f04ac7549e39045fe80e8c3
                        • Instruction Fuzzy Hash: 98713771908385ABE710DFB48C84A9FBFE5EF99384F404919F98897381D77AD908CB52
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 10010A64
                        • GetProcAddress.KERNEL32(00000000), ref: 10010A6B
                        • LoadLibraryA.KERNEL32(user32.dll), ref: 10010A83
                        • GetProcAddress.KERNEL32(00000000,CreateWindowExA), ref: 10010ADC
                        • putchar.MSVCRT ref: 10010B25
                        • LoadLibraryA.KERNEL32(AVICAP32.dll), ref: 10010B33
                        • GetProcAddress.KERNEL32(?,capCreateCaptureWindowA), ref: 10010B5F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10010B6E
                        • GetProcAddress.KERNEL32(00000000), ref: 10010B75
                        • putchar.MSVCRT ref: 10010BA7
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$putchar
                        • String ID: #32770$.$2$3$A$AVICAP32.dll$C$CVideoCap$CreateWindowExA$E$FreeLibrary$KERNEL32.dll$a$capCreateCaptureWindowA$d$k$n$n$r$r$user32.dll$v
                        • API String ID: 3860417020-205541454
                        • Opcode ID: 1fda7fcb7310f91f9d791d4c50a1b535213b48f83bce2a18f9c0ddce62f842cc
                        • Instruction ID: 2b6a0a263e35625f7b0ea68b9bb34738d6ea2ab0089d603b41eabc5278580cc7
                        • Opcode Fuzzy Hash: 1fda7fcb7310f91f9d791d4c50a1b535213b48f83bce2a18f9c0ddce62f842cc
                        • Instruction Fuzzy Hash: 5D51D7B2C04388EEEB01DBF48C487EEBF75EB26314F184199E581A7242D7B49A44C765
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1000AE1B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000AE24
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 1000AE33
                        • GetProcAddress.KERNEL32(00000000), ref: 1000AE36
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileAttributesA), ref: 1000AE45
                        • GetProcAddress.KERNEL32(00000000), ref: 1000AE48
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 1000AF19
                        • GetProcAddress.KERNEL32(00000000), ref: 1000AF20
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 1000B000
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B007
                          • Part of subcall function 1000BCE0: LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,?,1000AE5B), ref: 1000BCED
                          • Part of subcall function 1000BCE0: GetProcAddress.KERNEL32(00000000), ref: 1000BCF4
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .$2$3$A$C$CloseHandle$DeleteFileA$F$GetFileAttributesA$KERNEL32.dll$a$d$i$k$l$n$r$r$t
                        • API String ID: 2574300362-2960528897
                        • Opcode ID: 8310ebebaab0a4ffea15ff650fa727fb6eaf9aa96c5ca2260bfd54d23a74b2d1
                        • Instruction ID: af3d1c7a9db6ed9d969a3bc51e197d86f18dc4c2231b05834efbddafcb9e954d
                        • Opcode Fuzzy Hash: 8310ebebaab0a4ffea15ff650fa727fb6eaf9aa96c5ca2260bfd54d23a74b2d1
                        • Instruction Fuzzy Hash: A4716661C083C9DEEB02DBF488487EEBF759F26254F184189E584AB342D6B98B44C765
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10003F76
                        • GetProcAddress.KERNEL32(00000000), ref: 10003F7D
                        • WSASocketA.WS2_32(00000002,00000003,000000FF,00000000,00000000,00000001), ref: 10003FD0
                        • setsockopt.WS2_32(00000000,00000000,00000002,?,00000004), ref: 10003FF8
                        • setsockopt.WS2_32(00000000,0000FFFF,00001005,?,00000004), ref: 1000401B
                        • htons.WS2_32(?), ref: 10004039
                        • putchar.MSVCRT ref: 100040A7
                          • Part of subcall function 10002E90: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,00000F9F,?,00000000,00000001,000000FF,?,759A3A20), ref: 10002EA6
                          • Part of subcall function 10002E90: GetProcAddress.KERNEL32(00000000), ref: 10002EAF
                          • Part of subcall function 10002E90: LoadLibraryA.KERNEL32(KERNEL32.dll,GetLocalTime,?,759A3A20), ref: 10002EBD
                          • Part of subcall function 10002E90: GetProcAddress.KERNEL32(00000000), ref: 10002EC0
                          • Part of subcall function 10002E90: rand.MSVCRT ref: 10002EDB
                        • sprintf.MSVCRT ref: 100040FD
                        • putchar.MSVCRT ref: 10004105
                        • htons.WS2_32(00000028), ref: 1000410C
                        • inet_addr.WS2_32(00000000), ref: 1000411C
                        • rand.MSVCRT ref: 1000412D
                        • htons.WS2_32 ref: 1000413C
                        • htons.WS2_32(00000050), ref: 10004144
                        • rand.MSVCRT ref: 1000414A
                        • htonl.WS2_32 ref: 1000415A
                        • rand.MSVCRT ref: 10004163
                        • rand.MSVCRT ref: 10004174
                        • htons.WS2_32(00000200), ref: 10004196
                        • htons.WS2_32(00000014), ref: 100041A4
                        • sendto.WS2_32(?,?,00000028,00000000,00000002,00000010), ref: 1000425A
                        • closesocket.WS2_32(00000000), ref: 10004274
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: htons$rand$AddressLibraryLoadProc$putcharsetsockopt$Socketclosesockethtonlinet_addrsendtosprintf
                        • String ID: %d.%d.%d.%d $@$E$KERNEL32.dll$P$Sleep
                        • API String ID: 1474472973-3411789409
                        • Opcode ID: 3f09ce8a70a3ea506fb5c4b653835838d3c4346daa56f714e763525c6b6cc919
                        • Instruction ID: b404f13c9fa55964b40efd114664ec3b1ba1ed1ae6d1d6a25e2d4a8b32c3f009
                        • Opcode Fuzzy Hash: 3f09ce8a70a3ea506fb5c4b653835838d3c4346daa56f714e763525c6b6cc919
                        • Instruction Fuzzy Hash: 7E91A471E00659ABEB10CBE4CC44BEEB7B5EF88310F01815AF605B7290DBB45A45CB69
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 100068ED
                        • GetProcAddress.KERNEL32(00000000), ref: 100068F4
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindFirstFileA), ref: 10006917
                        • GetProcAddress.KERNEL32(00000000), ref: 10006920
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindClose), ref: 1000692E
                        • GetProcAddress.KERNEL32(00000000), ref: 10006931
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 10006940
                        • GetProcAddress.KERNEL32(00000000), ref: 10006943
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .$2$3$A$C$CloseHandle$F$FindClose$FindFirstFileA$KERNEL32.dll$a$d$i$k$l$n$p$r$r$t
                        • API String ID: 2574300362-4201145984
                        • Opcode ID: ccc6c8c4a033493e654936f70fff0c982460fde7f13037d03d426d3ce7837c32
                        • Instruction ID: c1f36126daed844e2bd13afaa6a9b1fda5f0f6d983b26dab4df2b2b2cb828ad6
                        • Opcode Fuzzy Hash: ccc6c8c4a033493e654936f70fff0c982460fde7f13037d03d426d3ce7837c32
                        • Instruction Fuzzy Hash: 0F51C371C082889EEB11CBF8CC487DEBFBAEF1A354F1541AAE544B7381C6754A44CBA1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,?,%SystemRoot%\System32\svchost.exe -k imgsvc,00000000), ref: 100129EC
                        • GetProcAddress.KERNEL32(00000000), ref: 100129F5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetWindowsDirectoryA), ref: 10012A04
                        • GetProcAddress.KERNEL32(00000000), ref: 10012A07
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 10012A16
                        • GetProcAddress.KERNEL32(00000000), ref: 10012A19
                          • Part of subcall function 100128F0: RegOpenKeyExA.ADVAPI32(80000002,10012B0F,00000000,000F003F,00000000,00000000), ref: 10012914
                        • rand.MSVCRT ref: 10012B22
                        • sprintf.MSVCRT ref: 10012B3E
                          • Part of subcall function 10012950: RegCreateKeyExA.ADVAPI32(80000002,?,00000000,00000000,00000000,000F003F,00000000,?,?,SeRestorePrivilege,00000000,00000000), ref: 10012989
                        • sprintf.MSVCRT ref: 10012B85
                        • RegCreateKeyExA.ADVAPI32(80000002,00000000,00000000,00000000,00000000,000F003F,00000000,10013B81,?), ref: 10012BB2
                        • RegSetValueExA.ADVAPI32(10013B81,ServiceDll,00000000,00000002,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000), ref: 10012BDB
                        • RegSetValueExA.ADVAPI32(10013B81,ServiceMain,00000000,00000001,DarkAngle,00000000), ref: 10012BF7
                        • RegCloseKey.ADVAPI32(10013B81), ref: 10012BFD
                          • Part of subcall function 100128F0: RegSaveKeyA.ADVAPI32(00000000,?,00000000), ref: 1001292E
                          • Part of subcall function 100128F0: RegCloseKey.ADVAPI32 ref: 10012939
                          • Part of subcall function 10012950: RegRestoreKeyA.ADVAPI32(?,?,00000008,?,?,SeRestorePrivilege,00000000,00000000), ref: 100129A5
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$CloseCreateValuesprintf$OpenRestoreSaverand
                        • String ID: %SystemRoot%\System32\svchost.exe -k imgsvc$%s\Parameters$C:\Program Files (x86)\Iefg\Nefghijkl.pic$DarkAngle$Defghi Klmnopqr Tuv$DeleteFileA$GetWindowsDirectoryA$KERNEL32.dll$Net-Temp.ini$SOFTWARE\%d$SYSTEM\CurrentControlSet\Services\$ServiceDll$ServiceMain$lstrlenA
                        • API String ID: 3067452301-1579056387
                        • Opcode ID: 5e2dcec9016884e4dd9fdb390e7b0370be652425965f823c056d42ea74019157
                        • Instruction ID: e00e8cb64f4c6072ab9c1a23f5d654da855fec7f3f6e2340159532770a766d6a
                        • Opcode Fuzzy Hash: 5e2dcec9016884e4dd9fdb390e7b0370be652425965f823c056d42ea74019157
                        • Instruction Fuzzy Hash: 2F61087290411CABEB24D6B4CC84FEEB779FB98310F504599F619E72C1DAB49F448B90
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10003DAC
                        • GetProcAddress.KERNEL32(00000000), ref: 10003DB5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 10003DC4
                        • GetProcAddress.KERNEL32(00000000), ref: 10003DC7
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 10003DD6
                        • GetProcAddress.KERNEL32(00000000), ref: 10003DD9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapAlloc), ref: 10003DE8
                        • GetProcAddress.KERNEL32(00000000), ref: 10003DEB
                        • putchar.MSVCRT ref: 10003E19
                        • WSASocketA.WS2_32(00000002,00000003,00000001,00000000,00000000,00000001), ref: 10003E2A
                        • putchar.MSVCRT ref: 10003E37
                        • putchar.MSVCRT ref: 10003E47
                        • setsockopt.WS2_32(00000000,0000FFFF,00001005,000007D0,00000004), ref: 10003E5D
                        • putchar.MSVCRT ref: 10003E6E
                        • putchar.MSVCRT ref: 10003E95
                        • putchar.MSVCRT ref: 10003E99
                          • Part of subcall function 10003CE0: LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcessId,00000000,00000000,?,759A3A20), ref: 10003CF4
                          • Part of subcall function 10003CE0: GetProcAddress.KERNEL32(00000000), ref: 10003CFB
                        • putchar.MSVCRT ref: 10003ED4
                        • putchar.MSVCRT ref: 10003EED
                        • putchar.MSVCRT ref: 10003EFA
                        • putchar.MSVCRT ref: 10003F0D
                        • sendto.WS2_32(?,00000000,00001000,00000000,00000002,00000010), ref: 10003F24
                        • putchar.MSVCRT ref: 10003F39
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$Socketsendtosetsockopt
                        • String ID: GetProcessHeap$GetTickCount$HeapAlloc$KERNEL32.dll$Sleep
                        • API String ID: 1979888943-4163489220
                        • Opcode ID: fe84f7a7f3504693ec86f6f9e7fd4984daf656ff8b729c2d76e71ae478caab0a
                        • Instruction ID: d8b2a23f1b5aa275b36c3b20c659598076b870ec2c7065d804e5c9a86020f4dc
                        • Opcode Fuzzy Hash: fe84f7a7f3504693ec86f6f9e7fd4984daf656ff8b729c2d76e71ae478caab0a
                        • Instruction Fuzzy Hash: 7741B870D4031566FB11EBB48C4AF9F7A68EF04790F104525FA18BB2C0DBB5EA4587A5
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000047,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000,00000000), ref: 10009E7F
                        • GetProcAddress.KERNEL32(00000000), ref: 10009E88
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 10009E97
                        • GetProcAddress.KERNEL32(00000000), ref: 10009E9A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 10009EA9
                        • GetProcAddress.KERNEL32(00000000), ref: 10009EAC
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .$2$3$A$C:\Program Files (x86)\Iefg\Nefghijkl.pic$D$DeleteFileA$G$KERNEL32.dll$S$\syslog.dat$c$d$i$k$lstrcatA$m$n$o$r$s
                        • API String ID: 2574300362-3715464787
                        • Opcode ID: fa8a19f212d2fcd1c4d1634fd57d9ae3dd0214f5043d9a2d77bdf9856f59861e
                        • Instruction ID: 4ad72c690fa17962c3dcba22dc931db9df0c44411c51ac2556327c57442147e5
                        • Opcode Fuzzy Hash: fa8a19f212d2fcd1c4d1634fd57d9ae3dd0214f5043d9a2d77bdf9856f59861e
                        • Instruction Fuzzy Hash: 1A412C62C092CDDDEF02DAF898486EEBF759F36214F084089D584B7242C6B94749C7B6
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putcharputs$AddressLibraryLoadProcSleephtonsstrncpystrstr
                        • String ID: %s%d%s$KERNEL32.dll$Sleep
                        • API String ID: 2958156663-2995088633
                        • Opcode ID: 0cb56cc7fe6907f04ab35d11660649744051a8c3f397de19fb852a6c0b0b92b6
                        • Instruction ID: 168d7be28b35332b9f9161e35b4e69393db29f7bf9a6b91ba67c704e73bbf590
                        • Opcode Fuzzy Hash: 0cb56cc7fe6907f04ab35d11660649744051a8c3f397de19fb852a6c0b0b92b6
                        • Instruction Fuzzy Hash: 4861AF716043449BE325CB68CC45BAFB7E5FFC8314F004A2DF69A97290DB71EA048B96
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetLastError), ref: 10005566
                        • GetProcAddress.KERNEL32(00000000), ref: 1000556F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000557E
                        • GetProcAddress.KERNEL32(00000000), ref: 10005581
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 1000558F
                        • GetProcAddress.KERNEL32(00000000), ref: 10005592
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateDirectoryA), ref: 100055A1
                        • GetProcAddress.KERNEL32(00000000), ref: 100055A4
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileAttributesA), ref: 100055B3
                        • GetProcAddress.KERNEL32(00000000), ref: 100055B6
                        • putchar.MSVCRT ref: 100055C4
                        • malloc.MSVCRT ref: 100055D5
                        • CharNextA.USER32(00000002), ref: 10005616
                        • CharNextA.USER32(00000002), ref: 10005634
                        • Sleep.KERNEL32(00000000), ref: 10005685
                        • Sleep.KERNEL32(00000000), ref: 10005692
                        • Sleep.KERNEL32(00000000), ref: 100056A0
                        • CharNextA.USER32(00000000), ref: 100056B3
                        • free.MSVCRT(00000000), ref: 100056C8
                        • free.MSVCRT(00000000), ref: 100056F3
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$CharNextSleep$free$mallocputchar
                        • String ID: CreateDirectoryA$GetFileAttributesA$GetLastError$KERNEL32.dll$lstrcpyA$lstrlenA
                        • API String ID: 249963510-2317385273
                        • Opcode ID: 69916e5d83d05739c4321cd0b6896549d1bacec5b8c465742fbf2142d6727869
                        • Instruction ID: 557be350d942e752aa57783df1badedd499570618447fe4f91bd789467dddb39
                        • Opcode Fuzzy Hash: 69916e5d83d05739c4321cd0b6896549d1bacec5b8c465742fbf2142d6727869
                        • Instruction Fuzzy Hash: F251C370C00699AFEB11DF688C44BAFBFE8EF097D1F90416AE991A7240C7764841CFA5
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000FCAA
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FCB3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalReAlloc), ref: 1000FCC3
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FCC6
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000FCD6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FCD9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize), ref: 1000FCE9
                        • GetProcAddress.KERNEL32(00000000), ref: 1000FCEC
                        • putchar.MSVCRT ref: 1000FD03
                        • putchar.MSVCRT ref: 1000FD14
                        • GetWindowTextA.USER32(?,?,00000400), ref: 1000FD2B
                        • putchar.MSVCRT ref: 1000FD33
                        • IsWindowVisible.USER32(?), ref: 1000FD39
                        • putchar.MSVCRT ref: 1000FD5C
                        • putchar.MSVCRT ref: 1000FD71
                        • putchar.MSVCRT ref: 1000FD84
                        • putchar.MSVCRT ref: 1000FD92
                        • putchar.MSVCRT ref: 1000FDA6
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 1000FDB6
                        • putchar.MSVCRT ref: 1000FDBE
                        • putchar.MSVCRT ref: 1000FDE6
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$Window$ProcessTextThreadVisible
                        • String ID: KERNEL32.dll$LocalAlloc$LocalReAlloc$LocalSize$lstrlenA
                        • API String ID: 2271292106-2047254388
                        • Opcode ID: f2b4c3575cd06d63b26912efc34f8718c9f894f5c1bcd9a0c5cbd3f5eb597988
                        • Instruction ID: 2927bf0af80553ea17337698c1c35489f7fa34f6b5e95938d6431d495437883f
                        • Opcode Fuzzy Hash: f2b4c3575cd06d63b26912efc34f8718c9f894f5c1bcd9a0c5cbd3f5eb597988
                        • Instruction Fuzzy Hash: 3C41E9B19003446BE600EBB0CC45F9F76D8FF88744F400829FB4997240DBB9EA49CBA6
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetPrivateProfileSectionNamesA), ref: 1000437C
                        • GetProcAddress.KERNEL32(00000000), ref: 10004385
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 10004395
                        • GetProcAddress.KERNEL32(00000000), ref: 10004398
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 100043A6
                        • GetProcAddress.KERNEL32(00000000), ref: 100043A9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetWindowsDirectoryA), ref: 100043B9
                        • GetProcAddress.KERNEL32(00000000), ref: 100043BC
                        • strchr.MSVCRT ref: 100043DE
                        • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000023,00000000), ref: 10004412
                        • wsprintfA.USER32 ref: 10004432
                        • ??2@YAPAXI@Z.MSVCRT ref: 10004450
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 10004474
                        • GetProcAddress.KERNEL32(00000000), ref: 10004477
                        • ??3@YAXPAX@Z.MSVCRT ref: 100044CF
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@??3@FolderPathSpecialstrchrwsprintf
                        • String ID: %s\%s$Documents and Settings\$GetPrivateProfileSectionNamesA$GetWindowsDirectoryA$KERNEL32.dll$Microsoft\Network\Connections\pbk\rasphone.pbk$\Application Data\Microsoft\Network\Connections\pbk\rasphone.pbk$lstrcatA$lstrcpyA$lstrlenA
                        • API String ID: 812189891-1601105468
                        • Opcode ID: ef28d3a75b835e2d6c25e982900ad4b4ae17aaace8f00d93c161162db9a7ae95
                        • Instruction ID: e1f63756d64357b9da769824cd5ecf0ac8a268a32ab31ee415926941e61f39f9
                        • Opcode Fuzzy Hash: ef28d3a75b835e2d6c25e982900ad4b4ae17aaace8f00d93c161162db9a7ae95
                        • Instruction Fuzzy Hash: F4417F704043456BE300DFA4CC84F9FBBE9EF88388F404918F6889B241DB74DA858BA6
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 100057EF
                        • GetProcAddress.KERNEL32(00000000), ref: 100057F8
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 10005807
                        • GetProcAddress.KERNEL32(00000000), ref: 1000580A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetDriveTypeA), ref: 10005819
                        • GetProcAddress.KERNEL32(00000000), ref: 1000581C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetDiskFreeSpaceExA), ref: 1000582B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000582E
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetVolumeInformationA), ref: 1000583D
                        • GetProcAddress.KERNEL32(00000000), ref: 10005840
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetLogicalDriveStringsA), ref: 1000584F
                        • GetProcAddress.KERNEL32(00000000), ref: 10005852
                        • LoadLibraryA.KERNEL32(Shell32.dll), ref: 10005885
                        • GetProcAddress.KERNEL32(?,SHGetFileInfoA), ref: 100058A7
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: FreeLibrary$GetDiskFreeSpaceExA$GetDriveTypeA$GetLogicalDriveStringsA$GetVolumeInformationA$KERNEL32.dll$SHGetFileInfoA$Shell32.dll$g$lstrlenA
                        • API String ID: 2574300362-199167966
                        • Opcode ID: a26df80974d43fa6dc987d3bb79957ae327a9cfef5622b8e0044232025d6494d
                        • Instruction ID: 73a4dabb4e15416b3ab34be8909a01cdcade15f9ac6774e641ce18a4f71022ee
                        • Opcode Fuzzy Hash: a26df80974d43fa6dc987d3bb79957ae327a9cfef5622b8e0044232025d6494d
                        • Instruction Fuzzy Hash: 32612AB1D0025CAFDF11DFA4CC48AEEBBBAEF89340F104565E949A7240DB759E85CB60
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 100039FC
                        • GetProcAddress.KERNEL32(00000000), ref: 10003A05
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10003A14
                        • GetProcAddress.KERNEL32(00000000), ref: 10003A17
                        • LoadLibraryA.KERNEL32(WININET.dll), ref: 10003A45
                        • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 10003A6B
                        • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 10003A91
                        • GetProcAddress.KERNEL32(?,InternetOpenUrlA), ref: 10003AB7
                        • puts.MSVCRT ref: 10003AD3
                        • puts.MSVCRT ref: 10003AEF
                        • puts.MSVCRT ref: 10003B0E
                        • puts.MSVCRT ref: 10003B1C
                        • puts.MSVCRT ref: 10003B2D
                        • puts.MSVCRT ref: 10003B40
                        • Sleep.KERNEL32(00000000), ref: 10003B4E
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: puts$AddressProc$LibraryLoad$Sleep
                        • String ID: FreeLibrary$InternetCloseHandle$InternetOpenA$InternetOpenUrlA$KERNEL32.dll$Sleep$User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET4.0C; .NET4.0E)$WININET.dll
                        • API String ID: 718009383-1913245550
                        • Opcode ID: 3511f568b730a8031ee973775ed48d7f3e489b130b323fd6d2c71f81849f94ba
                        • Instruction ID: 924f37bafe39c2e4b45789eb26d058000e75dd64711b790dfaaed26ad31c8fea
                        • Opcode Fuzzy Hash: 3511f568b730a8031ee973775ed48d7f3e489b130b323fd6d2c71f81849f94ba
                        • Instruction Fuzzy Hash: DA41F9B280021CBBE701EBB49C8DFAE3E29EF45315F254561FA15EB240DBB4DD808655
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetWindowsDirectoryA,?,%SystemRoot%\System32\svchost.exe -k imgsvc,?,00000000), ref: 10012C5A
                        • GetProcAddress.KERNEL32(00000000), ref: 10012C63
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA,?,00000000), ref: 10012C71
                        • GetProcAddress.KERNEL32(00000000), ref: 10012C74
                          • Part of subcall function 100128F0: RegOpenKeyExA.ADVAPI32(80000002,10012B0F,00000000,000F003F,00000000,00000000), ref: 10012914
                        • rand.MSVCRT ref: 10012D1B
                        • sprintf.MSVCRT ref: 10012D32
                          • Part of subcall function 10012950: RegCreateKeyExA.ADVAPI32(80000002,?,00000000,00000000,00000000,000F003F,00000000,?,?,SeRestorePrivilege,00000000,00000000), ref: 10012989
                        • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,000F003F,?,?,?,?,?,?,?,00000000), ref: 10012D63
                        • RegQueryValueExA.ADVAPI32(?,imgsvc,00000000,00000007,?,?), ref: 10012DC7
                        • _stricmp.MSVCRT(?,Defghi Klmnopqr Tuv), ref: 10012E00
                        • sprintf.MSVCRT ref: 10012E58
                        • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000000), ref: 10012E68
                        • RegSetValueExA.ADVAPI32(?,imgsvc,00000000,00000007,?), ref: 10012ECC
                        • RegCloseKey.ADVAPI32(?), ref: 10012ED7
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressCloseLibraryLoadOpenProcValuesprintf$CreateQuery_stricmprand
                        • String ID: %SystemRoot%\System32\svchost.exe -k imgsvc$Defghi Klmnopqr Tuv$DeleteFileA$GetWindowsDirectoryA$KERNEL32.dll$Net-Temp.ini$SOFTWARE\%d$SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost$imgsvc
                        • API String ID: 2902347649-1402337471
                        • Opcode ID: df8fa34393e07bcb81fc3157e8526984354098efb7a937787631a095da1de716
                        • Instruction ID: 843dde04a7dc20ce44473425e03c3e070b7d9fe7c5225e61fbf22f28b5134668
                        • Opcode Fuzzy Hash: df8fa34393e07bcb81fc3157e8526984354098efb7a937787631a095da1de716
                        • Instruction Fuzzy Hash: A571E076608345ABE724CA74CC44BAB77E5FBC8350F404A2DF659972C0DBB8E9098762
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,?,?), ref: 10006471
                        • GetProcAddress.KERNEL32(00000000), ref: 1000647A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindClose), ref: 10006488
                        • GetProcAddress.KERNEL32(00000000), ref: 1000648B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindNextFileA), ref: 1000649B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000649E
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindFirstFileA), ref: 100064AE
                        • GetProcAddress.KERNEL32(00000000), ref: 100064B1
                        • wsprintfA.USER32 ref: 10006504
                        • wsprintfA.USER32 ref: 10006550
                        • wsprintfA.USER32 ref: 10006571
                        • ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000001), ref: 100065A6
                        • ??2@YAPAXI@Z.MSVCRT ref: 100065E8
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000664F
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$wsprintf$??2@??3@D@2@@std@@D@std@@Grow@?$basic_string@U?$char_traits@V?$allocator@
                        • String ID: %s%s%s$%s%s*.*$.$FindClose$FindFirstFileA$FindNextFileA$KERNEL32.dll$lstrlenA
                        • API String ID: 1051829685-4185473705
                        • Opcode ID: 40d6a69a410f8a4008f87e46fa74277f2d55c6ef92f2220bb7b6a495cfa671bd
                        • Instruction ID: 56a734af7b99267e499c2eb78b03cd318febd9cc107b854223aadbb49d82d025
                        • Opcode Fuzzy Hash: 40d6a69a410f8a4008f87e46fa74277f2d55c6ef92f2220bb7b6a495cfa671bd
                        • Instruction Fuzzy Hash: 7561E2B18083849BD720DF64CC44AAFBBE9FF88744F504A1DF58997280DB75E944CB92
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043), ref: 10001094
                        • GetProcAddress.KERNEL32(00000000), ref: 1000109B
                        • LoadLibraryA.KERNEL32(WINMM.dll), ref: 100010B3
                        • ??2@YAPAXI@Z.MSVCRT ref: 10001119
                        • ??2@YAPAXI@Z.MSVCRT ref: 10001133
                        • ??2@YAPAXI@Z.MSVCRT ref: 10001144
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000114E
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: ??2@$LibraryLoad$AddressProc
                        • String ID: .$2$3$A$C$E$WINMM.dll$a$d$k$n$n$r$r$v
                        • API String ID: 1878065171-3858805395
                        • Opcode ID: 3e1d99bc5b267fd6550d7bc06a530206c33219135d45aa3c8a60a47f63e6e427
                        • Instruction ID: 309269514b4cbd4aaa70d75ce1d203b49880823388a5057a75443779e6c1f287
                        • Opcode Fuzzy Hash: 3e1d99bc5b267fd6550d7bc06a530206c33219135d45aa3c8a60a47f63e6e427
                        • Instruction Fuzzy Hash: 415180B1C04388DEDB01CFA8C4486DEBFB5FF26308F244199D585AB352D7B98A45CB69
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 1000D6F9
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D6FC
                        • LoadLibraryA.KERNEL32(USER32.dll), ref: 1000D70A
                        • GetProcAddress.KERNEL32(?,SystemParametersInfoA), ref: 1000D732
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 1000D741
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D748
                        • putchar.MSVCRT ref: 1000D7AA
                        • putchar.MSVCRT ref: 1000D7BC
                        • SendMessageA.USER32(0000FFFF,00000112,0000F170,00000002), ref: 1000D7D2
                        • SendMessageA.USER32(0000FFFF,00000112,0000F170,000000FF), ref: 1000D806
                          • Part of subcall function 1000D1B0: LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,10019F21,000000FF,1000D365,?,?,?,?,?,?,10019F30,000000FF), ref: 1000D1D3
                          • Part of subcall function 1000D1B0: GetProcAddress.KERNEL32(00000000), ref: 1000D1DA
                          • Part of subcall function 1000D1B0: CloseHandle.KERNEL32(?,?,?,10019F21,000000FF,1000D365,?,?,?,?,?,?,10019F30,000000FF), ref: 1000D1F0
                          • Part of subcall function 1000D1B0: ??2@YAPAXI@Z.MSVCRT ref: 1000D214
                        • putchar.MSVCRT ref: 1000D815
                        • BlockInput.USER32(?), ref: 1000D820
                        • putchar.MSVCRT ref: 1000D827
                          • Part of subcall function 1000DC00: GetSystemMetrics.USER32(00000000), ref: 1000DC17
                          • Part of subcall function 1000DC00: GetSystemMetrics.USER32(00000001), ref: 1000DC20
                        • putchar.MSVCRT ref: 1000D857
                        • BlockInput.USER32(00000000), ref: 1000D85E
                        • putchar.MSVCRT ref: 1000D865
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$BlockInputMessageMetricsSendSystem$??2@CloseHandle
                        • String ID: FreeLibrary$KERNEL32.dll$Sleep$SystemParametersInfoA$USER32.dll
                        • API String ID: 156896458-2574534853
                        • Opcode ID: 6ad4caa4a72ea1d6fa06f2a6f772722edae5b10b5efbb9bca433753bfea0674e
                        • Instruction ID: 9b8b6079bdd9514dce4b362ff33d1f8dcbca8275ca3db87eaf026189e79874b8
                        • Opcode Fuzzy Hash: 6ad4caa4a72ea1d6fa06f2a6f772722edae5b10b5efbb9bca433753bfea0674e
                        • Instruction Fuzzy Hash: 44410F75A4030477FB00FBB44C97BAE3B19DF05790F1040B6FA46AB2C6DEB0E94586A1
                        APIs
                        • IsWindow.USER32(?), ref: 10010ED6
                        • SendMessageA.USER32(?,00000409,00000000,00000000), ref: 10010EEE
                        • IsWindow.USER32(?), ref: 10010EF4
                        • SendMessageA.USER32(?,00000402,00000000,10010BE0), ref: 10010F0A
                        • IsWindow.USER32(?), ref: 10010F10
                        • SendMessageA.USER32(?,00000405,00000000,Function_00010BF0), ref: 10010F26
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: MessageSendWindow
                        • String ID:
                        • API String ID: 701072176-0
                        • Opcode ID: 6525c0767e4b7ad584db84ae01d08633f965776642d849c279cfdd0c403f51fa
                        • Instruction ID: 07b4332cc4033d2887b8d39bac4ef4e67846ece46a0ab40e7f2c02d166cf3a63
                        • Opcode Fuzzy Hash: 6525c0767e4b7ad584db84ae01d08633f965776642d849c279cfdd0c403f51fa
                        • Instruction Fuzzy Hash: 8D51C1717403056AE234DB65EC82F67B3E8EF88B50F01891DFA818F680C6B1F885CB65
                        APIs
                          • Part of subcall function 1000EA70: ReleaseDC.USER32(?,?), ref: 1000EA8A
                          • Part of subcall function 1000EA70: GetDesktopWindow.USER32 ref: 1000EA90
                          • Part of subcall function 1000EA70: GetDC.USER32(00000000), ref: 1000EA9D
                        • GetCursorPos.USER32(?), ref: 1000E234
                        • GetCursorInfo.USER32(?,?,00000008,?,?), ref: 1000E252
                        • LoadLibraryA.KERNEL32(User32.dll,?,?), ref: 1000E28D
                        • GetProcAddress.KERNEL32(?,DestroyCursor), ref: 1000E2B9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary,?,?), ref: 1000E2C5
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E2CC
                        • DestroyCursor.USER32(?), ref: 1000E2DF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,?,00000001,?,?), ref: 1000E3E6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E3F3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,?), ref: 1000E401
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E408
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,?), ref: 1000E417
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E41E
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$Cursor$DesktopDestroyInfoReleaseWindow
                        • String ID: DestroyCursor$FreeLibrary$GetTickCount$InterlockedExchange$KERNEL32.dll$Sleep$User32.dll
                        • API String ID: 2116817699-1045129642
                        • Opcode ID: 5fb9d3b9814b643b432a612074b4a3233b282e242a617cfdf832a38565391524
                        • Instruction ID: 7502a50747b9e10b677eab54ea5e0d87601013399c0b8f1625b389c5abe93b3f
                        • Opcode Fuzzy Hash: 5fb9d3b9814b643b432a612074b4a3233b282e242a617cfdf832a38565391524
                        • Instruction Fuzzy Hash: C771B771A006449FEB14DFB8CC889AEBBF9FF88350B108A59F546E7245DB70ED418B90
                        APIs
                        • putchar.MSVCRT ref: 1000F030
                        • GetProcAddress.KERNEL32(00000000,TerminateThread), ref: 1000F04E
                        • putchar.MSVCRT ref: 1000F06F
                        • GetProcAddress.KERNEL32(00000000,TerminateProcess), ref: 1000F093
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 1000F0A2
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F0A9
                        • putchar.MSVCRT ref: 1000F0CC
                        • putchar.MSVCRT ref: 1000F0DE
                        • putchar.MSVCRT ref: 1000F0F1
                        • GetProcAddress.KERNEL32(00000000,DisconnectNamedPipe), ref: 1000F114
                        • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 1000F175
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 1000F184
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F18B
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$putchar$LibraryLoad
                        • String ID: CloseHandle$DisconnectNamedPipe$FreeLibrary$KERNEL32.dll$TerminateProcess$TerminateThread$WaitForSingleObject
                        • API String ID: 2307409925-2198904809
                        • Opcode ID: 940fed469944679cc117962effeb96548658c7666f0ae78484961eb187d21bce
                        • Instruction ID: 7aa4cb8553133a3f9dea7be2f32008c8d3e95df56a599438eae320ccf76c8637
                        • Opcode Fuzzy Hash: 940fed469944679cc117962effeb96548658c7666f0ae78484961eb187d21bce
                        • Instruction Fuzzy Hash: E65191B2900615ABE711EFB4CD88A6FB7B9FF58310F154A19F651E7250CBB4E9018BA0
                        APIs
                        • LoadLibraryA.KERNEL32(WININET.dll,74DF0BD0,00000000), ref: 10011F1B
                        • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 10011F37
                        • GetProcAddress.KERNEL32(?,InternetOpenUrlA), ref: 10011F8A
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: 115.230.124.27$FreeLibrary$InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$KERNEL32.dll$Mozilla/4.0 (compatible)$WININET.dll$http://www.baidu.com/ip.txt
                        • API String ID: 2238633743-1547555411
                        • Opcode ID: 5a19922fb3e839d5377f8b9ad65df482db5bb8ca6901535b746399f6da59df0a
                        • Instruction ID: 2338258057033c5bffd16e43ff37a7f08f7d89a5e28c8140163f19effd12da90
                        • Opcode Fuzzy Hash: 5a19922fb3e839d5377f8b9ad65df482db5bb8ca6901535b746399f6da59df0a
                        • Instruction Fuzzy Hash: 8351E872D002186BE711DBB4DC48BFD7BA8FB45311F1186A9FA15E7180DBB49E418A94
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary,?,?,?,?,?,10010BC8), ref: 10010D5D
                        • GetProcAddress.KERNEL32(00000000), ref: 10010D66
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle,?,?,?,?,?,10010BC8), ref: 10010D74
                        • GetProcAddress.KERNEL32(00000000), ref: 10010D77
                        • IsWindow.USER32(?), ref: 10010D96
                        • SendMessageA.USER32(?,00000445,00000000,00000000), ref: 10010DA9
                        • IsWindow.USER32(?), ref: 10010DAF
                        • SendMessageA.USER32(?,0000040B,00000000,00000000), ref: 10010DC2
                        • ??3@YAXPAX@Z.MSVCRT ref: 10010DCC
                        • ??3@YAXPAX@Z.MSVCRT ref: 10010DDC
                        • IsWindow.USER32(?), ref: 10010DEF
                        • SendMessageA.USER32(?,00000402,00000000,00000000), ref: 10010E02
                        • IsWindow.USER32(?), ref: 10010E08
                        • SendMessageA.USER32(?,00000405,00000000,00000000), ref: 10010E1B
                        • CloseWindow.USER32(?), ref: 10010E27
                        • CloseWindow.USER32(?), ref: 10010E2D
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Window$MessageSend$??3@AddressCloseLibraryLoadProc
                        • String ID: CloseHandle$FreeLibrary$KERNEL32.dll$kernel32.dll
                        • API String ID: 3909432327-2974971588
                        • Opcode ID: 8b75e71f1fa09ceaf3887dad9fbe66cd354355976bce3fadba1be06135833af6
                        • Instruction ID: d169c2e70cab9f9fcb7b336e6b01fa6f8e499f057b8a28c9d8f61b6d283482d5
                        • Opcode Fuzzy Hash: 8b75e71f1fa09ceaf3887dad9fbe66cd354355976bce3fadba1be06135833af6
                        • Instruction Fuzzy Hash: 183129B5300745ABE620EBA5DD85F1BB3E8EF88B40F114918F6819B290DBB4F8458B65
                        APIs
                        • LoadCursorA.USER32(00000000,00000000), ref: 1000DD11
                        • LoadLibraryA.KERNEL32(GDI32.dll), ref: 1000DD37
                          • Part of subcall function 1000EA70: ReleaseDC.USER32(?,?), ref: 1000EA8A
                          • Part of subcall function 1000EA70: GetDesktopWindow.USER32 ref: 1000EA90
                          • Part of subcall function 1000EA70: GetDC.USER32(00000000), ref: 1000EA9D
                        • GetDesktopWindow.USER32 ref: 1000DD85
                        • GetDC.USER32(?), ref: 1000DDA5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 1000DDBF
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DDC6
                        • GetSystemMetrics.USER32(00000000), ref: 1000DDF5
                        • GetSystemMetrics.USER32(00000001), ref: 1000DDFC
                        • GetProcAddress.KERNEL32(00000000,CreateCompatibleDC), ref: 1000DE29
                        • GetProcAddress.KERNEL32(00000000,CreateDIBSection), ref: 1000DED1
                        • GetProcAddress.KERNEL32(00000000,SelectObject), ref: 1000DF48
                        • SetRect.USER32(00000036,00000000,00000000,?,?), ref: 1000DF95
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000DFA4
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$Load$DesktopLibraryMetricsSystemWindow$??2@CursorRectRelease
                        • String ID: CreateCompatibleDC$CreateDIBSection$GDI32.dll$GetTickCount$KERNEL32.dll$SelectObject
                        • API String ID: 3033261317-3678707404
                        • Opcode ID: aed57b3fa759c06229671b5f44264d3ff8f269b51171447d703ecef44c09c810
                        • Instruction ID: d06106a4e2d45155262b7b5c0f48e5bdc8c13f7e7a2ea952bc00af2bd6466b29
                        • Opcode Fuzzy Hash: aed57b3fa759c06229671b5f44264d3ff8f269b51171447d703ecef44c09c810
                        • Instruction Fuzzy Hash: FDB12CB5900B05AFE720DF65C884B6ABBF5FB48704F11891DE9969B750DBB4F8018F90
                        APIs
                        • ReleaseDC.USER32(?,?), ref: 1000E069
                        • GetProcAddress.KERNEL32(00000000,DeleteDC), ref: 1000E085
                        • GetProcAddress.KERNEL32(00000000,DeleteObject), ref: 1000E0D5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 1000E0E4
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E0EB
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000E11D
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000E129
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000E132
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000E13B
                        • LoadLibraryA.KERNEL32 ref: 1000E163
                        • GetProcAddress.KERNEL32(?,DestroyCursor), ref: 1000E18F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 1000E19E
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E1A5
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$??3@$LibraryLoad$Release
                        • String ID: DeleteDC$DeleteObject$DestroyCursor$FreeLibrary$KERNEL32.dll$User32.dll
                        • API String ID: 2450414274-2609009130
                        • Opcode ID: 83bbe95f12b0d2d38b5ce48e46a91e7028aac5a1ea4d83c99539493008367d94
                        • Instruction ID: f2966247950a2038ef805fc82d3ce22fed5f2f9c988e255f31edded61e873c45
                        • Opcode Fuzzy Hash: 83bbe95f12b0d2d38b5ce48e46a91e7028aac5a1ea4d83c99539493008367d94
                        • Instruction Fuzzy Hash: 955181B6800609AFDB10EBB4CD88A6FBBB9FF08310F154919F655E7210DB74E9418B90
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10009782
                        • GetProcAddress.KERNEL32(00000000), ref: 1000978B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange), ref: 1000979A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000979D
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 100097AC
                        • GetProcAddress.KERNEL32(00000000), ref: 100097AF
                        • LoadLibraryA.KERNEL32(kernel32.dll,CreateThread), ref: 100097BE
                        • GetProcAddress.KERNEL32(00000000), ref: 100097C1
                        • RegCreateKeyExA.ADVAPI32(80000001,NetSubKey,00000000,00000000,00000000,00000002,00000000,?,?), ref: 10009A97
                        • RegSetValueExA.ADVAPI32(?,10020D00,00000000,00000001,?,?), ref: 10009AB4
                        • RegCloseKey.ADVAPI32(?), ref: 10009ABE
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$CloseCreateValue
                        • String ID: CloseHandle$CreateThread$InterlockedExchange$KERNEL32.dll$NetSubKey$Sleep$kernel32.dll
                        • API String ID: 4117740996-4135363688
                        • Opcode ID: 0ed5dbf1ea7c656ac72894d5cc2a42729d6afc5a2d8570a2d443478e4e3c9a26
                        • Instruction ID: 44b1fb31bbc208b649749b85e8b6f975ee1b0b8e11b1698b694e0121b82185e0
                        • Opcode Fuzzy Hash: 0ed5dbf1ea7c656ac72894d5cc2a42729d6afc5a2d8570a2d443478e4e3c9a26
                        • Instruction Fuzzy Hash: 3D91E9767402046BE710DE98EC82FA9B755FB84716F1441B6FF0CDF186D6B2685087A1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ResumeThread), ref: 1000161E
                        • GetProcAddress.KERNEL32(00000000), ref: 10001627
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 10001636
                        • GetProcAddress.KERNEL32(00000000), ref: 10001639
                        • GetProcAddress.KERNEL32(00000000,waveInGetNumDevs), ref: 10001649
                        • GetProcAddress.KERNEL32(00000000,waveInOpen), ref: 10001666
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: CreateThread$KERNEL32.dll$ResumeThread$waveInAddBuffer$waveInGetNumDevs$waveInOpen$waveInPrepareHeader$waveInStart
                        • API String ID: 2238633743-3299099871
                        • Opcode ID: 7c23e62d525bf484745cf17373ffefd112803f4cfd4b00d922179e5f9f2b3a25
                        • Instruction ID: 26153d58bdf52741785f43a7263c109918ace4d3c2c4c2bb7e2863db81e4dc62
                        • Opcode Fuzzy Hash: 7c23e62d525bf484745cf17373ffefd112803f4cfd4b00d922179e5f9f2b3a25
                        • Instruction Fuzzy Hash: C4417FB1A00205AFD710DFA8DC88EAABBB9FF59310F204699EA05D7345DB71ED418B90
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1000D0A0
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D0A9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 1000D0B8
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D0BB
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange), ref: 1000D0CA
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D0CD
                        • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,10019EF3,000000FF), ref: 1000D123
                        • GetProcAddress.KERNEL32(?,DestroyCursor), ref: 1000D14B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary,?,?,?,?,?,?,?,10019EF3,000000FF), ref: 1000D15A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D161
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: CloseHandle$DestroyCursor$FreeLibrary$InterlockedExchange$KERNEL32.dll$User32.dll$WaitForSingleObject
                        • API String ID: 2574300362-2298042170
                        • Opcode ID: 2e6f788b3fd0c435e2aeeaeb4e28e77bd3d1990dcefbf6004740af77da005aaf
                        • Instruction ID: 22b61fc93f8b594afbf484fe73ad82fa853709b14961d151676a2a7b1a9c52fc
                        • Opcode Fuzzy Hash: 2e6f788b3fd0c435e2aeeaeb4e28e77bd3d1990dcefbf6004740af77da005aaf
                        • Instruction Fuzzy Hash: A04164B1900649ABDB11EFF4CC84BAEB7B8FF48310F104A19E66597240DBB4ED408BA4
                        APIs
                        • LoadLibraryA.KERNEL32(-0000002C,-0000001C), ref: 10009F8E
                        • GetProcAddress.KERNEL32(00000000), ref: 10009F97
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10009FA6
                        • GetProcAddress.KERNEL32(00000000), ref: 10009FA9
                          • Part of subcall function 10009DD0: LoadLibraryA.KERNEL32(0000006B,00000047,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000,00000000), ref: 10009E7F
                          • Part of subcall function 10009DD0: GetProcAddress.KERNEL32(00000000), ref: 10009E88
                          • Part of subcall function 10009DD0: LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 10009E97
                          • Part of subcall function 10009DD0: GetProcAddress.KERNEL32(00000000), ref: 10009E9A
                          • Part of subcall function 10009DD0: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 10009EA9
                          • Part of subcall function 10009DD0: GetProcAddress.KERNEL32(00000000), ref: 10009EAC
                        • putchar.MSVCRT ref: 10009FBB
                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 10009FC9
                        • putchar.MSVCRT ref: 10009FD3
                        • OpenServiceA.ADVAPI32(00000000,Defghi Klmnopqr Tuv,00010000), ref: 10009FE3
                        • putchar.MSVCRT ref: 10009FED
                        • DeleteService.ADVAPI32(00000000), ref: 10009FF3
                        • putchar.MSVCRT ref: 10009FFB
                        • CloseServiceHandle.ADVAPI32(00000000), ref: 1000A007
                        • putchar.MSVCRT ref: 1000A00B
                        • CloseServiceHandle.ADVAPI32(00000000), ref: 1000A011
                          • Part of subcall function 100123D0: SetServiceStatus.SECHOST ref: 10012417
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcServiceputchar$CloseHandleOpen$DeleteManagerStatus
                        • String ID: Defghi Klmnopqr Tuv$KERNEL32.dll$Sleep
                        • API String ID: 544756903-1347711872
                        • Opcode ID: 2a729e18e16e4b2cf60ccc7317e82a5b4ee8861af1ca6a7b7ac013fc98a0c81e
                        • Instruction ID: 0262be125ec33654a992c1e2cfbf4862875b767276f555c09b7a97a68a00b18b
                        • Opcode Fuzzy Hash: 2a729e18e16e4b2cf60ccc7317e82a5b4ee8861af1ca6a7b7ac013fc98a0c81e
                        • Instruction Fuzzy Hash: 3F419251D04388A9EB02D7F88C49BDFBF745F26708F080095E2847B282D6FA5748C7B6
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 10007EFA
                        • GetProcAddress.KERNEL32(00000000), ref: 10007F03
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 10007F13
                        • GetProcAddress.KERNEL32(00000000), ref: 10007F16
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection), ref: 10007F26
                        • GetProcAddress.KERNEL32(00000000), ref: 10007F29
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection), ref: 10007F37
                        • GetProcAddress.KERNEL32(00000000), ref: 10007F3A
                          • Part of subcall function 10007DB0: _strnicmp.MSVCRT ref: 10007DC4
                        • send.WS2_32(?,HTTP/1.0 200 OK,?,00000000), ref: 1000800B
                        • send.WS2_32(?,?,00000000,00000000), ref: 10008081
                          • Part of subcall function 10007D20: atoi.MSVCRT ref: 10007D59
                          • Part of subcall function 100085C0: htons.WS2_32 ref: 100085E3
                          • Part of subcall function 100085C0: inet_addr.WS2_32(?), ref: 100085F9
                          • Part of subcall function 100085C0: inet_addr.WS2_32(?), ref: 10008617
                          • Part of subcall function 100085C0: socket.WS2_32(00000002,00000001,00000006), ref: 10008623
                          • Part of subcall function 100085C0: setsockopt.WS2_32 ref: 1000864E
                          • Part of subcall function 100085C0: connect.WS2_32(?,?,00000010), ref: 1000865E
                          • Part of subcall function 100085C0: closesocket.WS2_32 ref: 1000866C
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$inet_addrsend$_strnicmpatoiclosesocketconnecthtonssetsockoptsocket
                        • String ID: CreateThread$EnterCriticalSection$HTTP/1.0 200 OK$KERNEL32.dll$LeaveCriticalSection$WaitForSingleObject
                        • API String ID: 3052754541-739832319
                        • Opcode ID: 7da915b50903dce6945727a973b4ef154478643b5d5d4c7976fc711e11c9e9c3
                        • Instruction ID: 52866b1079af80d2b305d3905d162663b83d34c508c9b66606edd0fc3eb35aaf
                        • Opcode Fuzzy Hash: 7da915b50903dce6945727a973b4ef154478643b5d5d4c7976fc711e11c9e9c3
                        • Instruction Fuzzy Hash: 9351C271504345ABE760DB65CC44EAF7BE8FB88794F000A19F68897184DB34EE498BA2
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteCriticalSection), ref: 10008CD9
                        • GetProcAddress.KERNEL32(00000000), ref: 10008CE2
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InitializeCriticalSection), ref: 10008CF2
                        • GetProcAddress.KERNEL32(00000000), ref: 10008CF5
                        • strchr.MSVCRT ref: 10008D0B
                        • atoi.MSVCRT ref: 10008D38
                          • Part of subcall function 10008B80: WSAStartup.WS2_32(00000202,?), ref: 10008B91
                          • Part of subcall function 10008B80: socket.WS2_32(00000002,00000001,00000006), ref: 10008BA5
                          • Part of subcall function 10008B80: htons.WS2_32 ref: 10008BDC
                          • Part of subcall function 10008B80: bind.WS2_32(00000000,?,00000010), ref: 10008BF7
                          • Part of subcall function 10008B80: listen.WS2_32(00000000,00000032), ref: 10008C0C
                        • strchr.MSVCRT ref: 10008D7A
                        • strncpy.MSVCRT ref: 10008DB1
                        • strchr.MSVCRT ref: 10008DBD
                        • strncpy.MSVCRT ref: 10008DE5
                        • strncpy.MSVCRT ref: 10008E01
                        • WSACleanup.WS2_32 ref: 10008E71
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: strchrstrncpy$AddressLibraryLoadProc$CleanupStartupatoibindhtonslistensocket
                        • String ID: DeleteCriticalSection$InitializeCriticalSection$KERNEL32.dll
                        • API String ID: 1006115148-499905313
                        • Opcode ID: 75cad7a7bac20715824d92c9c192a9340d4210a9972cf71da4b207119ee3d975
                        • Instruction ID: 5f8be6a1ed72d2f484aab7dfbce2e4da3a60a98b84222065e7be3347505b39c2
                        • Opcode Fuzzy Hash: 75cad7a7bac20715824d92c9c192a9340d4210a9972cf71da4b207119ee3d975
                        • Instruction Fuzzy Hash: 624103765046085BD32CDA789C458AF7AD5FBC8360F514B2EFA26832D0DFB4DE088695
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: puts$Sleepputchar$AddressLibraryLoadProcclosesocketconnecthtonssendsocket
                        • String ID: KERNEL32.dll$Sleep
                        • API String ID: 3260058973-534790634
                        • Opcode ID: 184470e16eb88ea4019fad5a03110320653dcbeb1917fe3b4b129a9fa83417dc
                        • Instruction ID: bcd62129689d4c613132e2af378b0e7d5011e0aa68824e4f4f3977d62fecbfe9
                        • Opcode Fuzzy Hash: 184470e16eb88ea4019fad5a03110320653dcbeb1917fe3b4b129a9fa83417dc
                        • Instruction Fuzzy Hash: 9431BFB15083509BE310DF64CC89A9FBBE4EF89354F00492DF98997250D734E648C7A7
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap,74DEF550,00000000,00000000), ref: 1000B343
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B34C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapAlloc), ref: 1000B35B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B35E
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapFree), ref: 1000B36D
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B370
                        • InitializeSecurityDescriptor.ADVAPI32(?,00000001), ref: 1000B39E
                        • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 1000B3BA
                        • GetLengthSid.ADVAPI32(?), ref: 1000B3C8
                        • InitializeAcl.ADVAPI32(00000000,-00000010,00000002), ref: 1000B3ED
                        • AddAccessAllowedAce.ADVAPI32(00000000,00000002,10000000,?), ref: 1000B403
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000), ref: 1000B415
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressInitializeLibraryLoadProc$DescriptorSecurity$AccessAllocateAllowedDaclLength
                        • String ID: GetProcessHeap$HeapAlloc$HeapFree$KERNEL32.dll
                        • API String ID: 3780998791-586349836
                        • Opcode ID: 2b66ffaed301d19206916c030586f629f48294263b9af774fc6458f294147ea6
                        • Instruction ID: 716716d67412bd084fb9c280a64a993127ef777e090402050d58248913f24711
                        • Opcode Fuzzy Hash: 2b66ffaed301d19206916c030586f629f48294263b9af774fc6458f294147ea6
                        • Instruction Fuzzy Hash: CE416F72D00658ABEB10DFE5DC88BEEBBB8FB48790F41812AF510A7241D7759940CB60
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000057), ref: 1000F283
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F28A
                        • putchar.MSVCRT ref: 1000F2C6
                        • putchar.MSVCRT ref: 1000F2DF
                          • Part of subcall function 1000BCE0: LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,?,1000AE5B), ref: 1000BCED
                          • Part of subcall function 1000BCE0: GetProcAddress.KERNEL32(00000000), ref: 1000BCF4
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcputchar
                        • String ID: .$2$3$F$W$d$k$l$n$r$r$t
                        • API String ID: 1538228972-552937298
                        • Opcode ID: 0f27b6de2dfdc01747567f23aba05658d44cd7bac98a52a1360e8559715075e9
                        • Instruction ID: cfd7fc7050bdb867459b98675480d65a3e182ccc8e398decb3b62b5952879010
                        • Opcode Fuzzy Hash: 0f27b6de2dfdc01747567f23aba05658d44cd7bac98a52a1360e8559715075e9
                        • Instruction Fuzzy Hash: BC318962C082C9DEEB01DBE89849BEEBF759F26254F084099D98477342C7B54708C7B6
                        APIs
                        • LoadLibraryA.KERNEL32(0000006B,00000043,74DEF550,?,00002342), ref: 1000BB74
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BB7B
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: .$2$3$A$C$E$a$d$k$n$n$r$r$v
                        • API String ID: 2574300362-202716631
                        • Opcode ID: 56874e524665a964731267736d58daac631161e239299b27c2e259f170452e5b
                        • Instruction ID: d026ff1e715d9bef1d7702f1d61489e2b18bede88cf70736868d30998b8e7535
                        • Opcode Fuzzy Hash: 56874e524665a964731267736d58daac631161e239299b27c2e259f170452e5b
                        • Instruction Fuzzy Hash: 86312C61C093C9DDEB02DAF895497EEBFB5AF26204F184089D585B7382C2B94748C776
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalSize,?), ref: 1000DB3B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DB44
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalLock), ref: 1000DB52
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DB55
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GlobalUnlock), ref: 1000DB63
                        • GetProcAddress.KERNEL32(00000000), ref: 1000DB66
                        • OpenClipboard.USER32(00000000), ref: 1000DB6E
                        • GetClipboardData.USER32(00000001), ref: 1000DB7A
                        • CloseClipboard.USER32 ref: 1000DB8A
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000DBA4
                        • CloseClipboard.USER32 ref: 1000DBCF
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000DBE1
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Clipboard$AddressLibraryLoadProc$Close$??2@??3@DataOpen
                        • String ID: GlobalLock$GlobalSize$GlobalUnlock$KERNEL32.dll
                        • API String ID: 2000242716-1635939564
                        • Opcode ID: 2469a16e857213a7a9021555622aba351584a6e765ed68a6edf5fdd561724a3e
                        • Instruction ID: 2c40b5e421004fdc6d255f506f72f375f8688b869bf4a442a4c8cfd91467e81f
                        • Opcode Fuzzy Hash: 2469a16e857213a7a9021555622aba351584a6e765ed68a6edf5fdd561724a3e
                        • Instruction Fuzzy Hash: 8411E4359002586BD700FBB59C49E9F7F98EF88390F410825FE058B201DBB9E949CBE1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: ??2@
                        • String ID: ICOpen$ICSendMessage$ICSeqCompressFrameStart$IV32$M263$MP42$MSVFW32.dll$cvid$vidc
                        • API String ID: 1033339047-3354383837
                        • Opcode ID: f822e3d6776e00fb8041a8986804b2f273a358f2b5952b817fd9d49a4e585832
                        • Instruction ID: ee81bd89cf373bdf8deb7698395b47bb453ca70eceb4a31eb16da47c69291720
                        • Opcode Fuzzy Hash: f822e3d6776e00fb8041a8986804b2f273a358f2b5952b817fd9d49a4e585832
                        • Instruction Fuzzy Hash: 0AB1D2B2E00209DFDB04DFA4D584AADBBB6FB49310F254259E946EB341DB74ED81CB50
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 1000F306
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F30D
                        • GetProcAddress.KERNEL32(00000000,PeekNamedPipe), ref: 1000F332
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree), ref: 1000F37E
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F387
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000F396
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F399
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,ReadFile), ref: 1000F3A7
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F3AA
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: KERNEL32.dll$LocalAlloc$LocalFree$PeekNamedPipe$ReadFile$Sleep
                        • API String ID: 2238633743-3908338389
                        • Opcode ID: 57c4142caff495a6a6edc287235360e8d6fd1aef602bcf3c527697dd76cf0f4e
                        • Instruction ID: a4832e17eabea6061c2a429b004f403c802ac44fc9aaa6377eaf78ef81cbf902
                        • Opcode Fuzzy Hash: 57c4142caff495a6a6edc287235360e8d6fd1aef602bcf3c527697dd76cf0f4e
                        • Instruction Fuzzy Hash: 90312CB5900219BBEB15DBA0CD88EEF7B79EF48340F108595FA05E7240DB74EE408BA5
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot,74DEF550,00000000), ref: 100100A7
                        • GetProcAddress.KERNEL32(00000000), ref: 100100B0
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First), ref: 100100BE
                        • GetProcAddress.KERNEL32(00000000), ref: 100100C1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next), ref: 100100CF
                        • GetProcAddress.KERNEL32(00000000), ref: 100100D2
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA), ref: 100100E2
                        • GetProcAddress.KERNEL32(00000000), ref: 100100E5
                        • ??2@YAPAXI@Z.MSVCRT ref: 100100F8
                        • _stricmp.MSVCRT(00000024,?), ref: 10010119
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@_stricmp
                        • String ID: CreateToolhelp32Snapshot$KERNEL32.dll$Process32First$Process32Next$lstrcmpiA
                        • API String ID: 1309286175-2242182618
                        • Opcode ID: 1a3dfc7ac0c0e6541102edbdc541287a5c2ce652a02bb8189215e1b6d0523268
                        • Instruction ID: 2ebfecebbe8207ada7d1c7b20146d11ea3a69a26d2ab8a63f2565491de4f4a3f
                        • Opcode Fuzzy Hash: 1a3dfc7ac0c0e6541102edbdc541287a5c2ce652a02bb8189215e1b6d0523268
                        • Instruction Fuzzy Hash: 5F117561A003597AD610EBB29C49E9F7EDCEF853D1F414825FA44CB140EBB9E845C7A1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,74DEF550,74DF0BD0,00000000,00000000,?,00000000,10019B5C,000000FF,100123B3), ref: 100023FE
                        • GetProcAddress.KERNEL32(00000000), ref: 10002407
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 10002415
                        • GetProcAddress.KERNEL32(00000000), ref: 10002418
                        • puts.MSVCRT ref: 10002427
                        • Sleep.KERNEL32(00000000), ref: 10002435
                        • puts.MSVCRT ref: 1000244B
                        • puts.MSVCRT ref: 10002469
                        • putchar.MSVCRT ref: 10002479
                        • puts.MSVCRT ref: 10002490
                        • WSACleanup.WS2_32 ref: 10002495
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,74DF0BD0,?,?,00000000,?,10002534), ref: 10002AC9
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AD2
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,CancelIo,?,00000000,?,10002534), ref: 10002AE0
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AE3
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,00000000,?,10002534), ref: 10002AF3
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AF6
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B10
                          • Part of subcall function 10002AB0: setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10002B2D
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B35
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B47
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B59
                          • Part of subcall function 10002AB0: closesocket.WS2_32(?), ref: 10002B65
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B6D
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B7D
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$puts$CleanupSleepclosesocketsetsockopt
                        • String ID: CloseHandle$KERNEL32.dll$WaitForSingleObject$kernel32.dll
                        • API String ID: 47822364-3809471920
                        • Opcode ID: 2cf5aa14253fe279c61591adbf3b38a76934faa1dbed84de76ab2b76edc51f44
                        • Instruction ID: d78f0f19bb28b42d6256308152d9275956a10a08728b7f487f26977846528c0a
                        • Opcode Fuzzy Hash: 2cf5aa14253fe279c61591adbf3b38a76934faa1dbed84de76ab2b76edc51f44
                        • Instruction Fuzzy Hash: 5121C3701047889FE211EB74CC45B9FB7D8EF89354F414A2DF5A647281CBB5E9488B63
                        APIs
                        • RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?), ref: 1000C009
                        • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,00000000), ref: 1000C03B
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalReAlloc), ref: 1000C083
                        • GetProcAddress.KERNEL32(00000000), ref: 1000C08C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000C09C
                        • GetProcAddress.KERNEL32(00000000), ref: 1000C09F
                        • malloc.MSVCRT ref: 1000C10F
                        • malloc.MSVCRT ref: 1000C11A
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcmalloc$InfoOpenQuery
                        • String ID: KERNEL32.dll$LocalAlloc$LocalReAlloc
                        • API String ID: 1258441503-2711553049
                        • Opcode ID: 8c37f560148f30f82c7ad7b864de35396c8234b062251e6dc13cd6593f5a7f4c
                        • Instruction ID: 9172dfafab3165e71304a6681021f4a781f481aa2e306401e2f2409e7b3d4183
                        • Opcode Fuzzy Hash: 8c37f560148f30f82c7ad7b864de35396c8234b062251e6dc13cd6593f5a7f4c
                        • Instruction Fuzzy Hash: 977187716083499FD318CF68CC80A5BBBE9EBC8794F44892DF58A93340D771E909CB92
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 10010209
                        • GetProcAddress.KERNEL32(00000000), ref: 10010212
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,OpenProcess), ref: 10010221
                        • GetProcAddress.KERNEL32(00000000), ref: 10010224
                          • Part of subcall function 10010090: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot,74DEF550,00000000), ref: 100100A7
                          • Part of subcall function 10010090: GetProcAddress.KERNEL32(00000000), ref: 100100B0
                          • Part of subcall function 10010090: LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First), ref: 100100BE
                          • Part of subcall function 10010090: GetProcAddress.KERNEL32(00000000), ref: 100100C1
                          • Part of subcall function 10010090: LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next), ref: 100100CF
                          • Part of subcall function 10010090: GetProcAddress.KERNEL32(00000000), ref: 100100D2
                          • Part of subcall function 10010090: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA), ref: 100100E2
                          • Part of subcall function 10010090: GetProcAddress.KERNEL32(00000000), ref: 100100E5
                          • Part of subcall function 10010090: ??2@YAPAXI@Z.MSVCRT ref: 100100F8
                          • Part of subcall function 10010090: _stricmp.MSVCRT(00000024,?), ref: 10010119
                        • OpenProcessToken.ADVAPI32(00000000,00000008,?), ref: 1001027A
                        • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,00000000,?), ref: 100102A0
                        • ??2@YAPAXI@Z.MSVCRT ref: 100102AD
                        • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,?,?), ref: 100102CF
                        • ??2@YAPAXI@Z.MSVCRT ref: 100102F1
                        • LookupAccountSidA.ADVAPI32(00000000,00000000,00000000,00000100,?,00000104,?), ref: 10010321
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@Token$Information$AccountLookupOpenProcess_stricmp
                        • String ID: CloseHandle$KERNEL32.dll$OpenProcess$explorer.exe
                        • API String ID: 262538485-3644286086
                        • Opcode ID: eb2989b1fff5d03f98c39b57767800e2655dc431c0bf1dd0ddc44c66fb6d1c5b
                        • Instruction ID: 686f0c5367471ec8589c1892a92d5e31d5c5de1d0ba109975a8e4cc611351407
                        • Opcode Fuzzy Hash: eb2989b1fff5d03f98c39b57767800e2655dc431c0bf1dd0ddc44c66fb6d1c5b
                        • Instruction Fuzzy Hash: 73411CB1D00618ABDB51DFA5DC85BDEBBB8FF88710F10415AF519AB250E7B09981CF60
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentThreadId,00007F86,00000002,?,0000000F), ref: 1001042A
                        • GetProcAddress.KERNEL32(00000000), ref: 10010433
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA,?,0000000F), ref: 10010441
                        • GetProcAddress.KERNEL32(00000000), ref: 10010444
                        • GetThreadDesktop.USER32(00000000), ref: 10010453
                        • GetUserObjectInformationA.USER32(00000000,00000002,?,00000100,?), ref: 1001047A
                        • OpenInputDesktop.USER32(00000000,00000000,02000000), ref: 10010489
                        • GetUserObjectInformationA.USER32(00000000,00000002,?,00000100,?), ref: 100104B6
                        • SetThreadDesktop.USER32(00000000), ref: 100104D0
                        • CloseDesktop.USER32(00000000), ref: 100104E8
                        • CloseDesktop.USER32(00000000), ref: 100104EB
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Desktop$AddressCloseInformationLibraryLoadObjectProcThreadUser$InputOpen
                        • String ID: GetCurrentThreadId$KERNEL32.dll$lstrcmpiA
                        • API String ID: 2669542783-3583696425
                        • Opcode ID: 6a1f81e7cd70d3c671da6a8adc1b93085e50937805a86d6d8735f39b7fbf4705
                        • Instruction ID: 106e680e66321e465b7654eeab688ead780144e25000a5e5e3930718b96b1682
                        • Opcode Fuzzy Hash: 6a1f81e7cd70d3c671da6a8adc1b93085e50937805a86d6d8735f39b7fbf4705
                        • Instruction Fuzzy Hash: F62184712043596BE710EBA4CC89FDF77D9FB88340F014915F745A7191EBB8E8498BA1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 1000F84B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F854
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,OpenProcess), ref: 1000F864
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F867
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,TerminateProcess), ref: 1000F875
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F878
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 1000F886
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F889
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: CloseHandle$KERNEL32.dll$OpenProcess$Sleep$TerminateProcess$kernel32.dll
                        • API String ID: 2574300362-2023942180
                        • Opcode ID: bbd60b100ff63f5ddc2d5cf3de426f2c578620cc07108f38c8cb3f906a151163
                        • Instruction ID: 0f302c128fa7de2b6d215540bdc35a7e998cb7c1c2c65e33171ff27cd8f7d6c9
                        • Opcode Fuzzy Hash: bbd60b100ff63f5ddc2d5cf3de426f2c578620cc07108f38c8cb3f906a151163
                        • Instruction Fuzzy Hash: 7011A775A003546BD611FBB58C48E6FBED8EFC8790F010929FA4497240DBB4EC448BE2
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10008EF8
                        • GetProcAddress.KERNEL32(00000000), ref: 10008EFF
                        • select.WS2_32(?,?,00000000,00000000,00000000), ref: 10008F95
                        • _errno.MSVCRT ref: 10008F9F
                        • __WSAFDIsSet.WS2_32(?,?), ref: 10008FB7
                        • __WSAFDIsSet.WS2_32(?,?), ref: 10008FCD
                        • recvfrom.WS2_32(00000010,?,00004FF6,00000000,?,00000010), ref: 10009007
                        • inet_addr.WS2_32(00000000), ref: 10009088
                        • htons.WS2_32(?), ref: 10009097
                        • closesocket.WS2_32 ref: 10009143
                        • closesocket.WS2_32(?), ref: 10009149
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: closesocket$AddressLibraryLoadProc_errnohtonsinet_addrrecvfromselect
                        • String ID: KERNEL32.dll$Sleep
                        • API String ID: 2572120288-534790634
                        • Opcode ID: 647c8c9056ecafe6be0bebd789b7f7c21d1c154331daaccf2652a9b5e0a6097a
                        • Instruction ID: e79c81247fa068893c5a0a18a03b09551ee79d98065f2261218ba87f614bd604
                        • Opcode Fuzzy Hash: 647c8c9056ecafe6be0bebd789b7f7c21d1c154331daaccf2652a9b5e0a6097a
                        • Instruction Fuzzy Hash: 1D616DB5508782ABE710CF64CC48A9FB7E4FFC8754F008A2DF99997250E770DA098B56
                        APIs
                        • GetProcAddress.KERNEL32(75BD0000,GetActiveWindow), ref: 1000A904
                        • GetProcAddress.KERNEL32(75BD0000,GetWindowTextA), ref: 1000A93D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 1000A960
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A969
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetLocalTime), ref: 1000A98A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A98D
                        • wsprintfA.USER32 ref: 1000AA15
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad$wsprintf
                        • String ID: [%02u-%02u-%d %02u:%02u:%02u] (%s)$GetActiveWindow$GetLocalTime$GetWindowTextA$KERNEL32.dll$lstrcatA
                        • API String ID: 1732317035-1432727782
                        • Opcode ID: 5763eed0ed1c51fceaa045eab7ba1771b7dcbbad3d70494b22323b880b0b11d1
                        • Instruction ID: 1e46e9e7cf6953ab3ed65de4d76be8fba034e5f6a4f3c264055b66cb13503dc8
                        • Opcode Fuzzy Hash: 5763eed0ed1c51fceaa045eab7ba1771b7dcbbad3d70494b22323b880b0b11d1
                        • Instruction Fuzzy Hash: C05103B2900219AFEB04DBA4CC84DBEBB79FF8A351F244665E605E7245CB34DD418B50
                        APIs
                        • RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?), ref: 1000BE4A
                        • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00000000,00000000), ref: 1000BE7C
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalReAlloc), ref: 1000BEBC
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BEC5
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000BED5
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BED8
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000BF20
                        • RegEnumKeyExA.ADVAPI32(?,?,00000000,?,00000000,00000000,00000000,00000000), ref: 1000BF79
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@EnumInfoOpenQuery
                        • String ID: KERNEL32.dll$LocalAlloc$LocalReAlloc
                        • API String ID: 1594150316-2711553049
                        • Opcode ID: 1d47f7c55ed226ced2e92bebcf9672223f4d13c501e34aca67b518ebf0718e0b
                        • Instruction ID: 1e511cf904c36394fea8c543c6dbc0983839fb17e8ec9ee4041522732a303212
                        • Opcode Fuzzy Hash: 1d47f7c55ed226ced2e92bebcf9672223f4d13c501e34aca67b518ebf0718e0b
                        • Instruction Fuzzy Hash: 9A518C71608355AFD314DF29CC40A6BBBE9EBC8790F448A2DF659D7240DA31ED05CBA2
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000F6D0
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F6D9
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree), ref: 1000F6EB
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F6EE
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000F6FE
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F701
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize), ref: 1000F711
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F714
                          • Part of subcall function 10004290: ??2@YAPAXI@Z.MSVCRT ref: 100042BB
                          • Part of subcall function 10004290: ??2@YAPAXI@Z.MSVCRT ref: 100042CA
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@
                        • String ID: KERNEL32.dll$LocalAlloc$LocalFree$LocalSize$lstrlenA
                        • API String ID: 729240022-3256744539
                        • Opcode ID: 8908c35b6e2bc7b6dc7c85cde6700387f0f506a08a2a7f144e4bdd676ec995e1
                        • Instruction ID: 09151e469b537d2d4807bf04e5168df54ca2ef505e4c2b6c081f7b3372e75f3a
                        • Opcode Fuzzy Hash: 8908c35b6e2bc7b6dc7c85cde6700387f0f506a08a2a7f144e4bdd676ec995e1
                        • Instruction Fuzzy Hash: 164136B55083859BD300DF64CC84A2FBBE5FB89394F400A2DF99997340CB78E9458B92
                        APIs
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: ??2@$??3@
                        • String ID:
                        • API String ID: 1245774677-0
                        • Opcode ID: d50685c07fc8e4a33409b2ae018ace28bf02c788de52f839d40d063411901558
                        • Instruction ID: 0955d762f10532c73ca106df8cf33809bd7e98a680463d9846988eb612767b71
                        • Opcode Fuzzy Hash: d50685c07fc8e4a33409b2ae018ace28bf02c788de52f839d40d063411901558
                        • Instruction Fuzzy Hash: C8C1BFB5B002058BE718CE39C89292B77D6EF882A0B16863DF9168B3C1DF71ED05C795
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree,00000000,?,?,?,?,10001DE2,00000000,?,?,?,?), ref: 10001F69
                        • GetProcAddress.KERNEL32(00000000), ref: 10001F72
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualAlloc,?,10001DE2,00000000,?,?,?,?), ref: 10001F82
                        • GetProcAddress.KERNEL32(00000000), ref: 10001F85
                        • ceil.MSVCRT ref: 10001FC0
                        • _ftol.MSVCRT ref: 10001FC6
                        • putchar.MSVCRT ref: 10001FD8
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$_ftolceilputchar
                        • String ID: KERNEL32.dll$VirtualAlloc$VirtualFree
                        • API String ID: 1002542111-854231263
                        • Opcode ID: f5311b14f0455f95b195ff1f4646f693abe788d38b50bbae20ad59dc3f208bf0
                        • Instruction ID: f10c4aba8c28df8adf62b9ebd62d7853fcf90992ae737c539b5aa2a879643abe
                        • Opcode Fuzzy Hash: f5311b14f0455f95b195ff1f4646f693abe788d38b50bbae20ad59dc3f208bf0
                        • Instruction Fuzzy Hash: 8B31D671A043045BE700EF64AC5575BBBD4EF847A0F05443AF9449B390DBB5D908CBA2
                        APIs
                        • GetProcAddress.KERNEL32(00000000,waveInAddBuffer), ref: 100018AE
                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 100018C1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 100018EB
                        • GetProcAddress.KERNEL32(00000000), ref: 100018EE
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent), ref: 10001900
                        • GetProcAddress.KERNEL32(00000000), ref: 10001903
                        • TranslateMessage.USER32(?), ref: 10001943
                        • DispatchMessageA.USER32(?), ref: 1000194D
                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1000195D
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Message$AddressProc$LibraryLoad$DispatchTranslate
                        • String ID: KERNEL32.dll$SetEvent$WaitForSingleObject$waveInAddBuffer
                        • API String ID: 323455292-1319925935
                        • Opcode ID: 0d8279d6833c800dec4d3a33bdb3b83f94fb5d191e267e8c3b1764b3d83ec4d5
                        • Instruction ID: 00e73342f542f1f5e5f269486634e561f78a75a8fe6509b01a3d07f81f72cb1b
                        • Opcode Fuzzy Hash: 0d8279d6833c800dec4d3a33bdb3b83f94fb5d191e267e8c3b1764b3d83ec4d5
                        • Instruction Fuzzy Hash: 9C21B471A00715ABE720DBB5CC88FAAB7B8EF48351F108619F615E7184DB74E9408B60
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,00000000,?,00000000,74DEF550,?,10004B40,00000000), ref: 10005187
                        • GetProcAddress.KERNEL32(00000000), ref: 10005190
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,MultiByteToWideChar,?,00000000,74DEF550,?,10004B40,00000000), ref: 1000519E
                        • GetProcAddress.KERNEL32(00000000), ref: 100051A1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WideCharToMultiByte,?,00000000,74DEF550,?,10004B40,00000000), ref: 100051B1
                        • GetProcAddress.KERNEL32(00000000), ref: 100051B4
                        • ??2@YAPAXI@Z.MSVCRT ref: 100051D1
                        • ??2@YAPAXI@Z.MSVCRT ref: 100051D9
                        • ??3@YAXPAX@Z.MSVCRT ref: 10005205
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@$??3@
                        • String ID: KERNEL32.dll$MultiByteToWideChar$WideCharToMultiByte$lstrlenA
                        • API String ID: 2774626721-4059950253
                        • Opcode ID: d7cacddbd15bfb88fcbe6019714b75dbf31395039c7574a945899cfd78a14b52
                        • Instruction ID: 9c5c66fe498036c3d4431d75e68116c0c9bfaf470cc058836bda1e038a9e4851
                        • Opcode Fuzzy Hash: d7cacddbd15bfb88fcbe6019714b75dbf31395039c7574a945899cfd78a14b52
                        • Instruction Fuzzy Hash: F8110672A4035836D610F6B62C49F4FBE9CDF967B1F110532FB04AB180DA75E84486F6
                        APIs
                        • GetProcAddress.KERNEL32(?,ICSendMessage), ref: 10011911
                        • GetProcAddress.KERNEL32(?,ICSeqCompressFrameEnd), ref: 1001192B
                        • GetProcAddress.KERNEL32(?,ICCompressorFree), ref: 1001193C
                        • GetProcAddress.KERNEL32(?,ICClose), ref: 1001194A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10011958
                        • GetProcAddress.KERNEL32(00000000), ref: 1001195F
                        • ??3@YAXPAX@Z.MSVCRT ref: 10011979
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$??3@LibraryLoad
                        • String ID: FreeLibrary$ICClose$ICCompressorFree$ICSendMessage$ICSeqCompressFrameEnd$KERNEL32.dll
                        • API String ID: 3057795744-1660901631
                        • Opcode ID: 027f405a1c8a5098067f5e9ccd07a3d626195aca3d9361b2bfb60785c11bc74e
                        • Instruction ID: 4d79a081a2b0dbb5144a50138e913ac24297a08ce51522ac81cfc057e2ab5203
                        • Opcode Fuzzy Hash: 027f405a1c8a5098067f5e9ccd07a3d626195aca3d9361b2bfb60785c11bc74e
                        • Instruction Fuzzy Hash: 380161B6200B546BE221E7B98C84E8BB2EDDF88740B014C28F761D7260CB75FC818B60
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000E603
                        • putchar.MSVCRT ref: 1000E664
                        • GetDC.USER32(00000000), ref: 1000E66A
                        • putchar.MSVCRT ref: 1000E675
                        • putchar.MSVCRT ref: 1000E686
                        • GetProcAddress.KERNEL32(00000000,CreateCompatibleBitmap), ref: 1000E69B
                        • GetProcAddress.KERNEL32(00000000,GetDIBits), ref: 1000E6D1
                        • ReleaseDC.USER32(00000000,?), ref: 1000E6FE
                        • GetProcAddress.KERNEL32(00000000,DeleteObject), ref: 1000E719
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProcputchar$??2@Release
                        • String ID: CreateCompatibleBitmap$DeleteObject$GetDIBits
                        • API String ID: 2864807487-483435919
                        • Opcode ID: a87edf00a4808446149df7ba30ef71a4b00c28d3ba07bbec9b7e9cb8e6e3ba50
                        • Instruction ID: c12efb4bc809e3de7e5bbfb8e1ce1d6d505bb2f9d693b4d46cc8469a21d4e5ee
                        • Opcode Fuzzy Hash: a87edf00a4808446149df7ba30ef71a4b00c28d3ba07bbec9b7e9cb8e6e3ba50
                        • Instruction Fuzzy Hash: D35127B2900255AFE704DF28DC88AA9BBA5FF55314F15C1AAF915DF361D7B0DA02CB80
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000A2C2
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 1000A308
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A311
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 1000A320
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A323
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1000A334
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A337
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000A41B
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@??3@
                        • String ID: CloseHandle$CreateThread$KERNEL32.dll$Sleep
                        • API String ID: 2249131349-2798766653
                        • Opcode ID: bfcdd782b3c82d2f8fe0afc77d9375d24df26a339858dc50b9d355b766c7d066
                        • Instruction ID: 44d532e6d1b5cab07083413fdeb4812748d7a018b959a1b577aa736fe4627f3f
                        • Opcode Fuzzy Hash: bfcdd782b3c82d2f8fe0afc77d9375d24df26a339858dc50b9d355b766c7d066
                        • Instruction Fuzzy Hash: 474126B5D00208BFEB00DFB48C89F9D7AA5FB66380F154164F605EB281E7B4DA818B40
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection,?,00000000,?,?,00000000,759A3A20,?,?,?,00000000,10019B70,000000FF,?,100027E7), ref: 10001E49
                        • GetProcAddress.KERNEL32(00000000), ref: 10001E52
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection,?,?,00000000,759A3A20,?,?,?,00000000,10019B70,000000FF,?,100027E7,?), ref: 10001E64
                        • GetProcAddress.KERNEL32(00000000), ref: 10001E67
                        • Sleep.KERNEL32(00000000,?,?,00000000,759A3A20,?,?,?,00000000,10019B70,000000FF,?,100027E7,?), ref: 10001E6D
                        • Sleep.KERNEL32(00000000,?,?,00000000,759A3A20,?,?,?,00000000,10019B70,000000FF,?,100027E7,?), ref: 10001ED2
                        • memmove.MSVCRT ref: 10001EE6
                        • Sleep.KERNEL32(00000000,?,?,?,00000000,759A3A20,?,?,?,00000000,10019B70,000000FF,?,100027E7,?), ref: 10001EF1
                        • putchar.MSVCRT ref: 10001F14
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Sleep$AddressLibraryLoadProc$memmoveputchar
                        • String ID: EnterCriticalSection$KERNEL32.dll$LeaveCriticalSection
                        • API String ID: 912286022-1950043958
                        • Opcode ID: 1a2a2bd3c4118896cdd056336935b0cf6cf6125520f30055565659cde7f11279
                        • Instruction ID: eccae69e5102e23f90fbc1400e1d47b36914905a76f09ad57e49f820cb905a2f
                        • Opcode Fuzzy Hash: 1a2a2bd3c4118896cdd056336935b0cf6cf6125520f30055565659cde7f11279
                        • Instruction Fuzzy Hash: 4021A0366002195BD704FFB49C91AAFBB99EF84290F054479FA019B246DF75ED0887E1
                        APIs
                        • LoadLibraryA.KERNEL32(Shell32.dll), ref: 10007C49
                        • GetProcAddress.KERNEL32(00000000,ShellExecuteA), ref: 10007C59
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10007C67
                        • GetProcAddress.KERNEL32(00000000), ref: 10007C6A
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: FreeLibrary$KERNEL32.dll$Shell32.dll$ShellExecuteA$e$n$o$p
                        • API String ID: 2574300362-2349682124
                        • Opcode ID: b9e0edf3f4df24e08de4b228d8db5f39e27349f92bbd7a006c3a865600ea2cf8
                        • Instruction ID: 11d82ed1ce08c2d56356509464648dab1a31a934e30de640c98d0ce6ea347312
                        • Opcode Fuzzy Hash: b9e0edf3f4df24e08de4b228d8db5f39e27349f92bbd7a006c3a865600ea2cf8
                        • Instruction Fuzzy Hash: 9D0168201083846AE200E6388C40F6FFBC4EFD9399F050A5CF588572C0C7B6DD4987BA
                        APIs
                        • LookupAccountNameA.ADVAPI32(00000000,?,?,?,?,?,?), ref: 10004532
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AccountLookupName
                        • String ID: ConvertSidToStringSidA$FreeLibrary$KERNEL32.dll$L$_RasDefaultCredentials#0$advapi32.dll
                        • API String ID: 1484870144-1900776057
                        • Opcode ID: f4436920d8739c802f0b0165078cfe62e793e6c88f8d7dd36c7eb4dd5dc74a5d
                        • Instruction ID: 63d1c341f1a6a9e55507f5f3d5112503c43b0a296a8d903421dce52d3c7f6920
                        • Opcode Fuzzy Hash: f4436920d8739c802f0b0165078cfe62e793e6c88f8d7dd36c7eb4dd5dc74a5d
                        • Instruction Fuzzy Hash: AB31D5B3E00109AFEB00DAF8DC499FEBB78EB45216F1141A5FA18D2100F6709A414B90
                        APIs
                          • Part of subcall function 1000BAE0: LoadLibraryA.KERNEL32(0000006B,00000043,74DEF550,?,00002342), ref: 1000BB74
                          • Part of subcall function 1000BAE0: GetProcAddress.KERNEL32(00000000), ref: 1000BB7B
                        • putchar.MSVCRT ref: 1000A4F9
                        • LoadLibraryA.KERNEL32(IMM32.dll), ref: 1000A510
                        • putchar.MSVCRT ref: 1000A527
                        • LoadLibraryA.KERNEL32(user32.dll), ref: 1000A53E
                        • putchar.MSVCRT ref: 1000A555
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 1000A59B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A5A2
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: LibraryLoad$putchar$AddressProc
                        • String ID: IMM32.dll$KERNEL32.dll$Sleep$user32.dll
                        • API String ID: 1608385978-2989729630
                        • Opcode ID: 483df61e1388b3766e4fc3ef24f4339834b21e875271673a3085238bfbfe6df0
                        • Instruction ID: 369412b175836c1cd4be7d870a70c29b12889e7913f010337c978ba3e31e77de
                        • Opcode Fuzzy Hash: 483df61e1388b3766e4fc3ef24f4339834b21e875271673a3085238bfbfe6df0
                        • Instruction Fuzzy Hash: 8931E4796006149BF700DF64CCC5B9A7BA9FF4A391F0041A9FA068B365CB70D901CB51
                        APIs
                        • LoadLibraryA.KERNEL32 ref: 10011190
                        • GetProcAddress.KERNEL32(00000000), ref: 10011199
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange), ref: 100111A7
                        • GetProcAddress.KERNEL32(00000000), ref: 100111AA
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 100111BA
                        • GetProcAddress.KERNEL32(00000000), ref: 100111BD
                          • Part of subcall function 1000BBE0: LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,74DF0BD0,1000974D), ref: 1000BBF3
                          • Part of subcall function 1000BBE0: GetProcAddress.KERNEL32(00000000), ref: 1000BBFA
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: CloseHandle$InterlockedExchange$KERNEL32.dll$WaitForSingleObject$kernel32.dll
                        • API String ID: 2574300362-1578280562
                        • Opcode ID: e91c4d8f141cb9723779da5c9419121d4f360fa600f13cead8d7a31c036ac56e
                        • Instruction ID: f5d13ae2897e68361ed96a281903b064943801b35e1352852a2484c0a38b3074
                        • Opcode Fuzzy Hash: e91c4d8f141cb9723779da5c9419121d4f360fa600f13cead8d7a31c036ac56e
                        • Instruction Fuzzy Hash: 25118271504784ABC211EFA48C44F5FB7A8FB88760F110B1DF26597290CBB8D8848BA1
                        APIs
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: inet_ntoa$htons$inet_addr
                        • String ID:
                        • API String ID: 2325850693-0
                        • Opcode ID: c45103d885fd92be750276a8694257432146acdbe33b862109c6a28506e57a6d
                        • Instruction ID: 06e12904e5218c81b4e9040584a028b9bb7e8ea56ee9a0ed9b1d271d6cfd16d2
                        • Opcode Fuzzy Hash: c45103d885fd92be750276a8694257432146acdbe33b862109c6a28506e57a6d
                        • Instruction Fuzzy Hash: 0451223A2046544BCB18CF3498901AFB7E2FF89661B59846DED8AD7381DB31ED06C7A4
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForMultipleObjects), ref: 1000F433
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F43A
                        • putchar.MSVCRT ref: 1000F459
                        • putchar.MSVCRT ref: 1000F46C
                        • GetProcAddress.KERNEL32(00000000,TerminateThread), ref: 1000F487
                        • GetProcAddress.KERNEL32(00000000,TerminateProcess), ref: 1000F4B0
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,74DF0BD0,?,?,00000000,?,10002534), ref: 10002AC9
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AD2
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,CancelIo,?,00000000,?,10002534), ref: 10002AE0
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AE3
                          • Part of subcall function 10002AB0: LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,00000000,?,10002534), ref: 10002AF3
                          • Part of subcall function 10002AB0: GetProcAddress.KERNEL32(00000000), ref: 10002AF6
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B10
                          • Part of subcall function 10002AB0: setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10002B2D
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B35
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B47
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B59
                          • Part of subcall function 10002AB0: closesocket.WS2_32(?), ref: 10002B65
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B6D
                          • Part of subcall function 10002AB0: putchar.MSVCRT ref: 10002B7D
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$AddressProc$LibraryLoad$closesocketsetsockopt
                        • String ID: KERNEL32.dll$TerminateProcess$TerminateThread$WaitForMultipleObjects
                        • API String ID: 4283027344-2489239429
                        • Opcode ID: 5c7e3796056e4cbd3379f5c872fddea207afd272e04c54cea7f7c62c049bb4e7
                        • Instruction ID: fde39d320287b4dd3584fb3fb776219f39cffd84d4f36fbccbecf11c1a9422b1
                        • Opcode Fuzzy Hash: 5c7e3796056e4cbd3379f5c872fddea207afd272e04c54cea7f7c62c049bb4e7
                        • Instruction Fuzzy Hash: D9210EB6900218AFE701EBB0DC89EAA7F78FB09320F114655FA56D7290DB70E940CA90
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc$closesocketsetsockopt
                        • String ID: bad Allocate$bad buffer
                        • API String ID: 3616939384-2913219628
                        • Opcode ID: 3e0046746b5ce4adc019aa3c9e3aba578350255f0b2243ae27adee8c6788bd2d
                        • Instruction ID: 9dd5e3e30a0f3f0958516b7de65f22ec458712ef5f89b2b598548e140e2be646
                        • Opcode Fuzzy Hash: 3e0046746b5ce4adc019aa3c9e3aba578350255f0b2243ae27adee8c6788bd2d
                        • Instruction Fuzzy Hash: D851B775A00149ABEF04DFA5CC91BEF77B9EF88780F008129F905AB245DF34EA458791
                        APIs
                        • LoadLibraryA.KERNEL32(Shell32.dll), ref: 10005738
                        • GetProcAddress.KERNEL32(?,ShellExecuteA), ref: 1000575A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10005769
                        • GetProcAddress.KERNEL32(00000000), ref: 10005770
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: FreeLibrary$KERNEL32.dll$Shell32.dll$ShellExecuteA$open
                        • API String ID: 2574300362-3909544775
                        • Opcode ID: 4c6c1ddee89bdf1601a2266b15924c516d2a5e3d68bab9ce85e7b424c8057b02
                        • Instruction ID: 41d5c09341cedf949a8e495c982338020b92463cc999780d4f0196b9bd5c9131
                        • Opcode Fuzzy Hash: 4c6c1ddee89bdf1601a2266b15924c516d2a5e3d68bab9ce85e7b424c8057b02
                        • Instruction Fuzzy Hash: 9A1190B2C00248AEEB01EBF4DD4DBBEBF79EB26315F144195F945E6241D7B48E4087A0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc
                        • String ID: EnumWindows$user32.dll
                        • API String ID: 2374183287-245904054
                        • Opcode ID: b8208c4cab019e14eb58bd8ef4f3bd53baaea404a3de742ce8d18416d34b44b3
                        • Instruction ID: c45bb8d21575c65a63a34b4907720d092ae53db163c7da872aa286adcdab7aee
                        • Opcode Fuzzy Hash: b8208c4cab019e14eb58bd8ef4f3bd53baaea404a3de742ce8d18416d34b44b3
                        • Instruction Fuzzy Hash: F511CEB2C40104BFF701ABB8AD8EAAB7F28FB02326F154151F946C5260E7B09A408656
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,00000F9F,?,00000000,00000001,000000FF,?,759A3A20), ref: 10002EA6
                        • GetProcAddress.KERNEL32(00000000), ref: 10002EAF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetLocalTime,?,759A3A20), ref: 10002EBD
                        • GetProcAddress.KERNEL32(00000000), ref: 10002EC0
                        • rand.MSVCRT ref: 10002EDB
                        • rand.MSVCRT ref: 10002F0C
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcrand
                        • String ID: GetLocalTime$GetTickCount$KERNEL32.dll
                        • API String ID: 1703804876-841556142
                        • Opcode ID: e0a8aa6874521f8d6e43febe6ec1c5afea584208fed4c954f0b4b3749d8d9869
                        • Instruction ID: 7a3049161d37d83d8d956c1facf6c928a5037acca9d7e249140b39230d5f9e00
                        • Opcode Fuzzy Hash: e0a8aa6874521f8d6e43febe6ec1c5afea584208fed4c954f0b4b3749d8d9869
                        • Instruction Fuzzy Hash: 5011E373A0066617D720EBE8CC455AB7795EFC83A0F8E4675EE18D3240D238DC1846D0
                        APIs
                        • LoadLibraryA.KERNEL32(User32.dll), ref: 1000CFB7
                        • GetProcAddress.KERNEL32(?,DestroyCursor), ref: 1000CFE3
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 1000CFF2
                        • GetProcAddress.KERNEL32(00000000), ref: 1000CFF9
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000D02D
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??3@
                        • String ID: DestroyCursor$FreeLibrary$KERNEL32.dll$User32.dll
                        • API String ID: 845963415-3389378975
                        • Opcode ID: 2a65dc85002af9b5ba2a96eb6b2987ff4408610064f565c2702aee200e0c8c90
                        • Instruction ID: 0980dc21b89a1b23c15b38efa359d04a0eb62cea6c8e067bad16bb8c0a79e0c5
                        • Opcode Fuzzy Hash: 2a65dc85002af9b5ba2a96eb6b2987ff4408610064f565c2702aee200e0c8c90
                        • Instruction Fuzzy Hash: C911A0B2C00208ABDB01EFB49D8DAAEBF68FF15350F1549A6FA45D7201D774DE818A94
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,74DEF550,74DF0BD0,00000001), ref: 1000B759
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B762
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,UnmapViewOfFile), ref: 1000B771
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B774
                        • GetProcAddress.KERNEL32(75BD0000,UnhookWindowsHookEx), ref: 1000B78E
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: CloseHandle$KERNEL32.dll$UnhookWindowsHookEx$UnmapViewOfFile
                        • API String ID: 2238633743-600064166
                        • Opcode ID: 07d5ef75f54fa1f0ecd40d4cca29776b7b21d514a83f9c3f189d2ea07221cf66
                        • Instruction ID: 51fce7eb2b97b11f9ffc7c4898600e953d8dcb7a15d4a7eb49c6ef8d6e20fbd7
                        • Opcode Fuzzy Hash: 07d5ef75f54fa1f0ecd40d4cca29776b7b21d514a83f9c3f189d2ea07221cf66
                        • Instruction Fuzzy Hash: 3A113CB6D00228ABD701EBF48D8889EBB79FB983567218596FA05D7210D774D9418B90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: strstr$CloseQueryValue
                        • String ID: 2000$2003$2008$ProductName
                        • API String ID: 810289328-4212795574
                        • Opcode ID: 84ae04167add677d625ab3ccad7ad6b31fcf3dcb0772e9791728c43eae7912cd
                        • Instruction ID: 601a36fe5f5d9a92ebcfe6db4435d00f9b4456b4edcac870eabdc3e630252293
                        • Opcode Fuzzy Hash: 84ae04167add677d625ab3ccad7ad6b31fcf3dcb0772e9791728c43eae7912cd
                        • Instruction Fuzzy Hash: F401AD715003126BE600DB58EDA9BDB77ECEF88349F408818F98893140F735EA088BA3
                        APIs
                        • GetProcAddress.KERNEL32(00000000,CreateDIBSection), ref: 1000E8AA
                        • GetProcAddress.KERNEL32(00000000,SelectObject), ref: 1000E8F7
                        • GetProcAddress.KERNEL32(00000000,BitBlt), ref: 1000E92E
                        • GetProcAddress.KERNEL32(00000000,DeleteObject), ref: 1000E9B8
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc
                        • String ID: BitBlt$CreateDIBSection$DeleteObject$SelectObject
                        • API String ID: 190572456-815035257
                        • Opcode ID: 503d731b9095df9c6d03a02a2006f9597252b66ce2278101a9cb687525f596f4
                        • Instruction ID: 004b18f6554b730f5c45cf184dca801f8e09d9ae1f9ae04991f37051ec486055
                        • Opcode Fuzzy Hash: 503d731b9095df9c6d03a02a2006f9597252b66ce2278101a9cb687525f596f4
                        • Instruction Fuzzy Hash: B0519DB6900208AFD704DFA8CD89E6EBBB9FF48310B258659FA06D7351D770ED018B94
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,10019F21,000000FF,1000D365,?,?,?,?,?,?,10019F30,000000FF), ref: 1000D1D3
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D1DA
                        • CloseHandle.KERNEL32(?,?,?,10019F21,000000FF,1000D365,?,?,?,?,?,?,10019F30,000000FF), ref: 1000D1F0
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000D214
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000D245
                          • Part of subcall function 1000DC60: LoadCursorA.USER32(00000000,00000000), ref: 1000DD11
                          • Part of subcall function 1000DC60: LoadLibraryA.KERNEL32(GDI32.dll), ref: 1000DD37
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000D26C
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: ??2@Load$Library$AddressCloseCursorHandleProc
                        • String ID: KERNEL32.dll$WaitForSingleObject
                        • API String ID: 261307611-3889371928
                        • Opcode ID: ffb439ba301902b4dbac372751125f6ee189a38e30c5d73aed1d79768ab87827
                        • Instruction ID: 51312dc75bc5faf12228c5e910e794450c8203c9dd932687773c32088200b489
                        • Opcode Fuzzy Hash: ffb439ba301902b4dbac372751125f6ee189a38e30c5d73aed1d79768ab87827
                        • Instruction Fuzzy Hash: 0C31E574604741ABF720DF248C56B5FBAE1EF55740F004A2DF2569B2C1DBB1E848C7A6
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcmallocputcharstrrchr
                        • String ID: CreateProcessA$D$KERNEL32.dll
                        • API String ID: 189992226-1276209912
                        • Opcode ID: 2a03e6ac6b0066ddbd6cc564a7abdc43b91a812419abc5c1008d298fe253afe7
                        • Instruction ID: eba57bcc8d31b89eaa507860f832d070f9dbc449a745fdd333c5c3cac8a74b20
                        • Opcode Fuzzy Hash: 2a03e6ac6b0066ddbd6cc564a7abdc43b91a812419abc5c1008d298fe253afe7
                        • Instruction Fuzzy Hash: 372138B26042001BE614A764AC44AABB7D5EBC4371F00053AFE46D3290EF76D84982B2
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcmallocputcharstrrchr
                        • String ID: CreateProcessA$D$KERNEL32.dll
                        • API String ID: 189992226-1276209912
                        • Opcode ID: 947060a2213fbea0ad5f5441051ecb0ae5e951f146b3ae58568aba0f1adce1c5
                        • Instruction ID: 2828d72653d2406cdddd6234a8948036db010591438d37b1094796d04063a2f8
                        • Opcode Fuzzy Hash: 947060a2213fbea0ad5f5441051ecb0ae5e951f146b3ae58568aba0f1adce1c5
                        • Instruction Fuzzy Hash: A71127B27042501BE214E768AC45AABB7D5FBC4371F01053AFE46D7280DFBADD4982B2
                        APIs
                        • LoadLibraryA.KERNEL32(User32.dll), ref: 1000CF27
                        • GetProcAddress.KERNEL32(?,DestroyCursor), ref: 1000CF53
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 1000CF62
                        • GetProcAddress.KERNEL32(00000000), ref: 1000CF69
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: DestroyCursor$FreeLibrary$KERNEL32.dll$User32.dll
                        • API String ID: 2574300362-3389378975
                        • Opcode ID: 1443308fdc6f6ce54cedbede98953e31b2f09f3fa0f3bb9e07ba7cc8d5c52e4d
                        • Instruction ID: 4e33f39dcdbe39727c16940ce3d8678dbc847f33df06c372395ef2de23fa33ca
                        • Opcode Fuzzy Hash: 1443308fdc6f6ce54cedbede98953e31b2f09f3fa0f3bb9e07ba7cc8d5c52e4d
                        • Instruction Fuzzy Hash: DB0100B2C00208ABDB01EBF4CD4C9AEBF79FF08321B1149A5FA04E7200D774DE418A80
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,74DEF550,?,00000000,74DF0BD0,00000000), ref: 10001CAC
                        • GetProcAddress.KERNEL32(?,InitializeCriticalSection), ref: 10001CD8
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FreeLibrary), ref: 10001CE6
                        • GetProcAddress.KERNEL32(00000000), ref: 10001CED
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: FreeLibrary$InitializeCriticalSection$KERNEL32.dll$kernel32.dll
                        • API String ID: 2574300362-2472849579
                        • Opcode ID: eaae7cc9a550c319ea947826e4ee7f3b195cceae9d57f4325eb129900523a7b7
                        • Instruction ID: 6aa86751103756ba19ab13df35f8fab319288fc9f805d5be92915ca29492b1da
                        • Opcode Fuzzy Hash: eaae7cc9a550c319ea947826e4ee7f3b195cceae9d57f4325eb129900523a7b7
                        • Instruction Fuzzy Hash: 140192B2C00208AF9701EFF49D4846EBFB8FE0922572585AAEA09D7200E775DD418B94
                        APIs
                        • LoadLibraryA.KERNEL32 ref: 100096F0
                        • GetProcAddress.KERNEL32(00000000), ref: 100096F9
                        • LoadLibraryA.KERNEL32(kernel32.dll,CloseHandle), ref: 10009707
                        • GetProcAddress.KERNEL32(00000000), ref: 1000970A
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: CloseHandle$KERNEL32.dll$TerminateThread$kernel32.dll
                        • API String ID: 2574300362-2388941276
                        • Opcode ID: 9c09ad6fb2e4c1b93b1673bce2ebe0496d65afa23dafe971fcb38650b6fd562b
                        • Instruction ID: 199db684e3ee1caa01176aa0a35859e622a5c42fe252f77eb2cb49d84e941425
                        • Opcode Fuzzy Hash: 9c09ad6fb2e4c1b93b1673bce2ebe0496d65afa23dafe971fcb38650b6fd562b
                        • Instruction Fuzzy Hash: 5411C6756047419BC710DFA8CC84B8AFBE8FF48761F510B29F56897280C7B4EC408BA1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,?,?,00000000,?,100046B6,?,?,?,L$_RasDefaultCredentials#0), ref: 10004604
                        • GetProcAddress.KERNEL32(00000000), ref: 1000460D
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,MultiByteToWideChar,?,00000000,?,100046B6,?,?,?,L$_RasDefaultCredentials#0), ref: 1000461B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000461E
                        • malloc.MSVCRT ref: 1000463F
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$malloc
                        • String ID: KERNEL32.dll$MultiByteToWideChar$lstrlenA
                        • API String ID: 1625907898-1681667406
                        • Opcode ID: bc7e2323f6949f8a37bfcc0e61b844eca8e5f04e3f8cd3779ccc68e2a2f6caa2
                        • Instruction ID: 83b7b65355f7706635673efdd8426b0e3c15878589515ca315a3fb5add5cecd5
                        • Opcode Fuzzy Hash: bc7e2323f6949f8a37bfcc0e61b844eca8e5f04e3f8cd3779ccc68e2a2f6caa2
                        • Instruction Fuzzy Hash: 86F0A4A15406556AF210A7B48C86E6BB7ACEF58351F01882AF64597240DA78EC408771
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B4B8
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B4C1
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapFree), ref: 1000B4CF
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B4D2
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000B4EF
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??3@
                        • String ID: GetProcessHeap$HeapFree$KERNEL32.dll
                        • API String ID: 845963415-3454514201
                        • Opcode ID: 462d4b85e1a1034cc3431bf106a58a17e61dcdca0540b7c48d4856ecf14e4768
                        • Instruction ID: 8e82963ce2f20f439254b5526edf320060cb151459a6c3e457815943d93f1a4e
                        • Opcode Fuzzy Hash: 462d4b85e1a1034cc3431bf106a58a17e61dcdca0540b7c48d4856ecf14e4768
                        • Instruction Fuzzy Hash: 56F0C2729046556BE601EBE69C48E5BEBCCEFD57A0F028426F614AB201CBB4EC4086B1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentThreadId,?,00000000), ref: 10010512
                        • GetProcAddress.KERNEL32(00000000), ref: 10010519
                        • GetThreadDesktop.USER32(00000000), ref: 10010522
                        • GetUserObjectInformationA.USER32(?,00000002,?,00000100,?), ref: 10010543
                        • SetThreadDesktop.USER32(?), ref: 10010557
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: DesktopThread$AddressInformationLibraryLoadObjectProcUser
                        • String ID: GetCurrentThreadId$KERNEL32.dll
                        • API String ID: 3036381255-1458786552
                        • Opcode ID: 18770a1fe4dbcf73fa969aebd7f5b6486168eeef38b4a8067ef0f2da3bddd3d6
                        • Instruction ID: 833e892427034d026e993ccb682bb8696454c43104ed07a143a44b4b5f7b0140
                        • Opcode Fuzzy Hash: 18770a1fe4dbcf73fa969aebd7f5b6486168eeef38b4a8067ef0f2da3bddd3d6
                        • Instruction Fuzzy Hash: 6CF0C271200520ABE311A769EC8DFEF3B98FF88711F408025F694C6160E7B8C9898AA1
                        APIs
                          • Part of subcall function 10010410: LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentThreadId,00007F86,00000002,?,0000000F), ref: 1001042A
                          • Part of subcall function 10010410: GetProcAddress.KERNEL32(00000000), ref: 10010433
                          • Part of subcall function 10010410: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcmpiA,?,0000000F), ref: 10010441
                          • Part of subcall function 10010410: GetProcAddress.KERNEL32(00000000), ref: 10010444
                          • Part of subcall function 10010410: GetThreadDesktop.USER32(00000000), ref: 10010453
                          • Part of subcall function 10010410: GetUserObjectInformationA.USER32(00000000,00000002,?,00000100,?), ref: 1001047A
                          • Part of subcall function 10010410: OpenInputDesktop.USER32(00000000,00000000,02000000), ref: 10010489
                          • Part of subcall function 10010410: GetUserObjectInformationA.USER32(00000000,00000002,?,00000100,?), ref: 100104B6
                          • Part of subcall function 10010410: SetThreadDesktop.USER32(00000000), ref: 100104D0
                          • Part of subcall function 10010410: CloseDesktop.USER32(00000000), ref: 100104E8
                          • Part of subcall function 10010410: CloseDesktop.USER32(00000000), ref: 100104EB
                        • SetCursorPos.USER32(?,?,?,?,759A3A20,?,1000D3DC,?,?,00000000), ref: 1000D8E8
                        • WindowFromPoint.USER32(?,?,?,?,759A3A20,?,1000D3DC,?,?,00000000), ref: 1000D8F0
                        • SetCapture.USER32(00000000,?,?,759A3A20,?,1000D3DC,?,?,00000000), ref: 1000D8F7
                        • MapVirtualKeyA.USER32(?,00000000), ref: 1000D936
                        • keybd_event.USER32(?,00000000), ref: 1000D940
                        • MapVirtualKeyA.USER32(?,00000000), ref: 1000D954
                        • keybd_event.USER32(00000000,00000000), ref: 1000D95E
                        • mouse_event.USER32(00000008,00000000,00000000,00000000,00000000), ref: 1000DA1A
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Desktop$AddressCloseInformationLibraryLoadObjectProcThreadUserVirtualkeybd_event$CaptureCursorFromInputOpenPointWindowmouse_event
                        • String ID:
                        • API String ID: 3772272885-0
                        • Opcode ID: f31e4980b49609c19f8d259eeab3a1ea214579d002136fe734e92ed7db10b075
                        • Instruction ID: 695d3e637a6625c8d95e1edfa3f51b4f769b28b513739f17560300035964d10d
                        • Opcode Fuzzy Hash: f31e4980b49609c19f8d259eeab3a1ea214579d002136fe734e92ed7db10b075
                        • Instruction Fuzzy Hash: 6E4137357C8714BAF270EA148C8BF0E6665EB46F91F318116B741BE1C9C6E0B840866E
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindClose,?), ref: 1000678C
                        • GetProcAddress.KERNEL32(00000000), ref: 10006795
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,FindFirstFileA), ref: 100067A5
                        • GetProcAddress.KERNEL32(00000000), ref: 100067A8
                          • Part of subcall function 10005530: LoadLibraryA.KERNEL32(KERNEL32.dll,GetLastError), ref: 10005566
                          • Part of subcall function 10005530: GetProcAddress.KERNEL32(00000000), ref: 1000556F
                          • Part of subcall function 10005530: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 1000557E
                          • Part of subcall function 10005530: GetProcAddress.KERNEL32(00000000), ref: 10005581
                          • Part of subcall function 10005530: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 1000558F
                          • Part of subcall function 10005530: GetProcAddress.KERNEL32(00000000), ref: 10005592
                          • Part of subcall function 10005530: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateDirectoryA), ref: 100055A1
                          • Part of subcall function 10005530: GetProcAddress.KERNEL32(00000000), ref: 100055A4
                          • Part of subcall function 10005530: LoadLibraryA.KERNEL32(KERNEL32.dll,GetFileAttributesA), ref: 100055B3
                          • Part of subcall function 10005530: GetProcAddress.KERNEL32(00000000), ref: 100055B6
                          • Part of subcall function 10005530: putchar.MSVCRT ref: 100055C4
                          • Part of subcall function 10005530: malloc.MSVCRT ref: 100055D5
                          • Part of subcall function 10005530: CharNextA.USER32(00000002), ref: 10005616
                          • Part of subcall function 10005530: CharNextA.USER32(00000002), ref: 10005634
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$CharNext$mallocputchar
                        • String ID: FindClose$FindFirstFileA$KERNEL32.dll
                        • API String ID: 2036624238-3859562830
                        • Opcode ID: 08d6e0be5b70e9897d15e53c0c4e217d4fe2de277949bc98215d746e5a3d9ec8
                        • Instruction ID: 715cbf3846f150a1725a9cd5557ebcb6fa1e7231fe07a9e4984ea373b5282805
                        • Opcode Fuzzy Hash: 08d6e0be5b70e9897d15e53c0c4e217d4fe2de277949bc98215d746e5a3d9ec8
                        • Instruction Fuzzy Hash: 422143326002144BE714EE64DC44AAFBBD6EBC93A0F10463AF94AD7391CE75ED49C7A1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree), ref: 1000C611
                        • GetProcAddress.KERNEL32(00000000), ref: 1000C61A
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize), ref: 1000C628
                        • GetProcAddress.KERNEL32(00000000), ref: 1000C62B
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$LocalFree$LocalSize
                        • API String ID: 2574300362-127136793
                        • Opcode ID: 5ca9dae351c9fddcc92f091b2179f7cec23b8067cf04418eab9d226d3342786f
                        • Instruction ID: b9ff663b914e14fab95e4db01679e41a8e4d55429728726ae4c66c87215de853
                        • Opcode Fuzzy Hash: 5ca9dae351c9fddcc92f091b2179f7cec23b8067cf04418eab9d226d3342786f
                        • Instruction Fuzzy Hash: CA21CF35101B985BE221EF64CC41FEFB6D8EF89390F000A29F55197286DF34EC048AE6
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentThreadId,?,10019F30,000000FF), ref: 100105E3
                        • GetProcAddress.KERNEL32(00000000), ref: 100105EA
                        • GetThreadDesktop.USER32(00000000), ref: 100105F3
                        • _strrev.MSVCRT ref: 10010638
                          • Part of subcall function 10010580: OpenDesktopA.USER32(?,00000000,00000000,400001CF), ref: 10010593
                        • PostMessageA.USER32(0000FFFF,00000312,00000000,002E0003), ref: 10010673
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Desktop$AddressLibraryLoadMessageOpenPostProcThread_strrev
                        • String ID: GetCurrentThreadId$KERNEL32.dll
                        • API String ID: 540453910-1458786552
                        • Opcode ID: 4236fe490a2b43ca766c1360484dae5c0bf6134db19f5bfbc0b93306ac4f8ff4
                        • Instruction ID: 07bb75c2037145e51f058acebe15a17ddda69d343ac8ea5b3e29ba818300e23b
                        • Opcode Fuzzy Hash: 4236fe490a2b43ca766c1360484dae5c0bf6134db19f5bfbc0b93306ac4f8ff4
                        • Instruction Fuzzy Hash: E3115B72900288AEE701E7F8AC4CBAE7F69EB11305F044495F944D6242D2B5C6548761
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 100114D3
                        • GetProcAddress.KERNEL32(00000000), ref: 100114DC
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 100114EA
                        • GetProcAddress.KERNEL32(00000000), ref: 100114ED
                          • Part of subcall function 10011280: ??2@YAPAXI@Z.MSVCRT ref: 10011286
                          • Part of subcall function 10011280: ??3@YAXPAX@Z.MSVCRT ref: 100112B4
                          • Part of subcall function 1000BC90: LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,?,?,?,1000A576), ref: 1000BCA6
                          • Part of subcall function 1000BC90: GetProcAddress.KERNEL32(00000000), ref: 1000BCAF
                          • Part of subcall function 1000BC90: LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,?,1000A576), ref: 1000BCBD
                          • Part of subcall function 1000BC90: GetProcAddress.KERNEL32(00000000), ref: 1000BCC0
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@??3@
                        • String ID: GetTickCount$KERNEL32.dll$Sleep
                        • API String ID: 2249131349-1262029506
                        • Opcode ID: f5f9fad658a3d1c5fe97a50b8d6d30c87f64e7aa8fefcfac340236f87b026efa
                        • Instruction ID: 34408a371c8056f7721af778b5a6187b5a8ae70ff4f834ec6cfe8761b723a322
                        • Opcode Fuzzy Hash: f5f9fad658a3d1c5fe97a50b8d6d30c87f64e7aa8fefcfac340236f87b026efa
                        • Instruction Fuzzy Hash: 671129296006A447DB05EBB54C945CF2BDADFD57D0315485AE2A18F242CF30D882CBA0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection,?,?,?,?,?,10002D04,?,00000005,?,00000000,?,00000000), ref: 10001DA7
                        • GetProcAddress.KERNEL32(00000000), ref: 10001DB0
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection,?,?,?,?), ref: 10001DC2
                        • GetProcAddress.KERNEL32(00000000), ref: 10001DC5
                          • Part of subcall function 10001F50: LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree,00000000,?,?,?,?,10001DE2,00000000,?,?,?,?), ref: 10001F69
                          • Part of subcall function 10001F50: GetProcAddress.KERNEL32(00000000), ref: 10001F72
                          • Part of subcall function 10001F50: LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualAlloc,?,10001DE2,00000000,?,?,?,?), ref: 10001F82
                          • Part of subcall function 10001F50: GetProcAddress.KERNEL32(00000000), ref: 10001F85
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: EnterCriticalSection$KERNEL32.dll$LeaveCriticalSection
                        • API String ID: 2574300362-1950043958
                        • Opcode ID: d17b92f535407b10d1d5c8a5060b03c25a03f19b08d9744025a23f9ad0067ada
                        • Instruction ID: 5b462253e58bfee8e2dccfed5e634a75f218b6c43f8e4f9e68e51f4161190dee
                        • Opcode Fuzzy Hash: d17b92f535407b10d1d5c8a5060b03c25a03f19b08d9744025a23f9ad0067ada
                        • Instruction Fuzzy Hash: 8F01C4727002185B9B08EFA4DC848AFB79DEB882B1714456EFE16D7341CB70ED4487B0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CreateDirectoryA,C:\Program Files (x86)\Iefg\Nefghijkl.pic,00000000,00000000), ref: 10012653
                        • GetProcAddress.KERNEL32(00000000), ref: 1001265A
                        • strncpy.MSVCRT ref: 100126A4
                        • _access.MSVCRT ref: 100126AD
                        Strings
                        • KERNEL32.dll, xrefs: 1001264E
                        • CreateDirectoryA, xrefs: 10012649
                        • C:\Program Files (x86)\Iefg\Nefghijkl.pic, xrefs: 10012648
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc_accessstrncpy
                        • String ID: C:\Program Files (x86)\Iefg\Nefghijkl.pic$CreateDirectoryA$KERNEL32.dll
                        • API String ID: 2439819275-932344124
                        • Opcode ID: bd9f4dd86b21963415de69861360becd9f22f8caa79ac4150bdd9c3c65826599
                        • Instruction ID: 9ecce95db63e18048a6869a008e3f82084b796811035b761db618d25f4687eea
                        • Opcode Fuzzy Hash: bd9f4dd86b21963415de69861360becd9f22f8caa79ac4150bdd9c3c65826599
                        • Instruction Fuzzy Hash: FB1125724043546BD364DA74CC88BAB7BD4EB88361F014B2DF7A2921D0CF79D88486A5
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree,?,?), ref: 1000D4FD
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D506
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualAlloc,?,?), ref: 1000D516
                        • GetProcAddress.KERNEL32(00000000), ref: 1000D519
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$VirtualAlloc$VirtualFree
                        • API String ID: 2574300362-854231263
                        • Opcode ID: c7e03051a9c8aa37f6476984808cc5c99d45258fea9fe9eb2bb1706784078963
                        • Instruction ID: 8d2988216eeb259400dff83b3ebcaa4ee3dbfcc9fb1eefef0f51cf4ccf514edc
                        • Opcode Fuzzy Hash: c7e03051a9c8aa37f6476984808cc5c99d45258fea9fe9eb2bb1706784078963
                        • Instruction Fuzzy Hash: B301C8357003486FE710EA748C85BAFB699FF88380F004529FA459B280CBB5BD058791
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 100014F6
                        • GetProcAddress.KERNEL32(00000000), ref: 100014FF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent), ref: 1000150D
                        • GetProcAddress.KERNEL32(00000000), ref: 10001510
                          • Part of subcall function 10001600: LoadLibraryA.KERNEL32(KERNEL32.dll,ResumeThread), ref: 1000161E
                          • Part of subcall function 10001600: GetProcAddress.KERNEL32(00000000), ref: 10001627
                          • Part of subcall function 10001600: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateThread), ref: 10001636
                          • Part of subcall function 10001600: GetProcAddress.KERNEL32(00000000), ref: 10001639
                          • Part of subcall function 10001600: GetProcAddress.KERNEL32(00000000,waveInGetNumDevs), ref: 10001649
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: KERNEL32.dll$SetEvent$WaitForSingleObject
                        • API String ID: 2238633743-601223695
                        • Opcode ID: b738b1f32a49024a2b0f876405b79a377610698ac4ac701528d04fae2553e765
                        • Instruction ID: 73ebe775897d1bf67a5f5b79541b9af596cfe4f1940e55fc67e852c0b522cfd9
                        • Opcode Fuzzy Hash: b738b1f32a49024a2b0f876405b79a377610698ac4ac701528d04fae2553e765
                        • Instruction Fuzzy Hash: CE01B1733006549B9621EAAAAC84CDBF3DCDF993A1301892AE345C7200CB72EC418760
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree,00000000,00000000,?,00000000,1000BAB8,00000000,00000000), ref: 1000B81B
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B824
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc,?,00000000,1000BAB8,00000000,00000000), ref: 1000B834
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B837
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$LocalAlloc$LocalFree
                        • API String ID: 2574300362-4288603552
                        • Opcode ID: 06fa6f908cb209310e77bf82f82b4c92b617f615ecddb61920612db000cbd137
                        • Instruction ID: 7e4b49a6111b3693da8d235190f84ef4e4b5acbda8601b9e7e85a3bfe9523918
                        • Opcode Fuzzy Hash: 06fa6f908cb209310e77bf82f82b4c92b617f615ecddb61920612db000cbd137
                        • Instruction Fuzzy Hash: 5B018F72A042596BDB04EFA49C4495FBB99EB98391F01086AFA44E7200C675BD088BF1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,?,1001126A,?,?), ref: 10011456
                        • GetProcAddress.KERNEL32(00000000), ref: 1001145F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,?,?,?,1001126A,?,?), ref: 1001146D
                        • GetProcAddress.KERNEL32(00000000), ref: 10011470
                          • Part of subcall function 1000FF60: LoadLibraryA.KERNEL32(0000006B,00000043,759A9E20,?,74DF0F00), ref: 1000FFF1
                          • Part of subcall function 1000FF60: GetProcAddress.KERNEL32(00000000), ref: 1000FFFA
                          • Part of subcall function 1000FF60: LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 10010009
                          • Part of subcall function 1000FF60: GetProcAddress.KERNEL32(00000000), ref: 1001000C
                          • Part of subcall function 1000FF60: LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1001001B
                          • Part of subcall function 1000FF60: GetProcAddress.KERNEL32(00000000), ref: 1001001E
                          • Part of subcall function 1000FF60: _beginthreadex.MSVCRT ref: 10010066
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$_beginthreadex
                        • String ID: InterlockedExchange$KERNEL32.dll$WaitForSingleObject
                        • API String ID: 780464054-3102577651
                        • Opcode ID: fd60ab5e19b057075c066c9bb2d7e3bf8beb4220d8b0b91c1660579f60ce8dbf
                        • Instruction ID: 635336324a5817ebb6bf66a2a74f683e682ec107a73a052a3edaf7a798989065
                        • Opcode Fuzzy Hash: fd60ab5e19b057075c066c9bb2d7e3bf8beb4220d8b0b91c1660579f60ce8dbf
                        • Instruction Fuzzy Hash: CF0162726443147BE220EBA58C85F9BB79CEF89750F114A19F3459B2C0DBB1E8408B64
                        APIs
                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,00000000,74DEF550), ref: 1001278F
                        • OpenServiceA.ADVAPI32(00000000,Defghi Klmnopqr Tuv,000F003F,?,?,?,?,?,?,?,?,?,?,10013BE5), ref: 100127A2
                        • LockServiceDatabase.ADVAPI32 ref: 10012805
                        • ChangeServiceConfig2A.ADVAPI32(00000000,00000002,?), ref: 10012813
                        • CloseServiceHandle.ADVAPI32(00000000), ref: 1001281A
                        • UnlockServiceDatabase.ADVAPI32(00000000), ref: 10012821
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Service$DatabaseOpen$ChangeCloseConfig2HandleLockManagerUnlock
                        • String ID: Defghi Klmnopqr Tuv
                        • API String ID: 3576742245-1553144822
                        • Opcode ID: 8242b42af8a2c538c7ae6c912ba52f921246bb4d296905a702196d8567fe2067
                        • Instruction ID: 979725648ea5624c37e5db280a7066a56225332a09d4f3c86fafda82edb6931b
                        • Opcode Fuzzy Hash: 8242b42af8a2c538c7ae6c912ba52f921246bb4d296905a702196d8567fe2067
                        • Instruction Fuzzy Hash: 0F112EB0409310AFE301DF25C8C8B6FBAF8FB8C758F40491DF59996251D7B886498F92
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA,?), ref: 1001016E
                        • GetProcAddress.KERNEL32(00000000), ref: 10010175
                        • WTSQuerySessionInformationA.WTSAPI32(00000000,000000FF,00000005,?,?), ref: 10010196
                        • ??2@YAPAXI@Z.MSVCRT ref: 100101A5
                        • WTSFreeMemory.WTSAPI32(?), ref: 100101BC
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: ??2@AddressFreeInformationLibraryLoadMemoryProcQuerySession
                        • String ID: KERNEL32.dll$lstrcpyA
                        • API String ID: 628228830-739640453
                        • Opcode ID: c8794d6c8d0368645fb03014219f32e218bf387bff35de0783f4478029be3e98
                        • Instruction ID: 4f9be430be8656fe696166f367461231b0c686f58e4ec5394a051c5fc79ec9c8
                        • Opcode Fuzzy Hash: c8794d6c8d0368645fb03014219f32e218bf387bff35de0783f4478029be3e98
                        • Instruction Fuzzy Hash: 0EF09C756042117FD600DBB9DC05D5F7AD8DFC4751F414928F549C6150EA34D949C7E2
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree,?,00002342,?,?,1000F52C,?,?,00002342,00000000,10019FD8,000000FF,10007A03,?), ref: 1000F5F6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F5FF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize,?,00002342,?,?,1000F52C,?,?,00002342,00000000,10019FD8,000000FF,10007A03,?), ref: 1000F60D
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F610
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle), ref: 1000F90C
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F915
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,LocalReAlloc), ref: 1000F924
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F927
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,LocalAlloc), ref: 1000F936
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F939
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize), ref: 1000F948
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F94B
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,CreateToolhelp32Snapshot), ref: 1000F95A
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F95D
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,Process32First), ref: 1000F96B
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F96E
                          • Part of subcall function 1000F8F0: LoadLibraryA.KERNEL32(KERNEL32.dll,Process32Next), ref: 1000F97D
                          • Part of subcall function 1000F8F0: GetProcAddress.KERNEL32(00000000), ref: 1000F980
                          • Part of subcall function 1000F8F0: putchar.MSVCRT ref: 1000F9BB
                          • Part of subcall function 1000F8F0: putchar.MSVCRT ref: 1000F9C9
                          • Part of subcall function 1000F8F0: putchar.MSVCRT ref: 1000F9DB
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$putchar
                        • String ID: KERNEL32.dll$LocalFree$LocalSize
                        • API String ID: 3860417020-127136793
                        • Opcode ID: c7e14e40ebfe24844784abefe58bfae978303ddca6c79f08813a26c0fe55ed85
                        • Instruction ID: d70911c5b119bcea8e85fd7799bc783a74f8ae8d0e43b0a038cf00aa553e73cf
                        • Opcode Fuzzy Hash: c7e14e40ebfe24844784abefe58bfae978303ddca6c79f08813a26c0fe55ed85
                        • Instruction Fuzzy Hash: 5FE06D62A026783AA502A3F94C84CBFA68DDF892D53010566F60097202CFA5EC4103F8
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalFree,?,?,?,?,1000F5A1), ref: 1000F656
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F65F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LocalSize,?,?,?,?,1000F5A1), ref: 1000F66D
                        • GetProcAddress.KERNEL32(00000000), ref: 1000F670
                          • Part of subcall function 1000FE10: putchar.MSVCRT ref: 1000FE22
                          • Part of subcall function 1000FE10: LoadLibraryA.KERNEL32(user32.dll), ref: 1000FE30
                          • Part of subcall function 1000FE10: putchar.MSVCRT ref: 1000FE45
                          • Part of subcall function 1000FE10: putchar.MSVCRT ref: 1000FE5A
                          • Part of subcall function 1000FE10: GetProcAddress.KERNEL32(?,EnumWindows), ref: 1000FE6C
                          • Part of subcall function 1000FE10: putchar.MSVCRT ref: 1000FE81
                          • Part of subcall function 1000FE10: putchar.MSVCRT ref: 1000FEA2
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar$AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$LocalFree$LocalSize
                        • API String ID: 2374183287-127136793
                        • Opcode ID: 1a12c0cfb2d62d7db108ee40f990ac2cdf46120d3356b9963177ae90ebb778b0
                        • Instruction ID: 39687c258324d9af63445024950fe9fcbe7e67f7ac15e3728e8537f8cdf83c30
                        • Opcode Fuzzy Hash: 1a12c0cfb2d62d7db108ee40f990ac2cdf46120d3356b9963177ae90ebb778b0
                        • Instruction Fuzzy Hash: 1FE06D62A026783AA502A3F95C84CBFA68DDF892D13010566F60097211CFB5EC4102F8
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,0000006F,?,?,?,10005481,0000006F), ref: 10006C76
                        • GetProcAddress.KERNEL32(00000000), ref: 10006C7F
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,MoveFileA,?,?,?,10005481,0000006F), ref: 10006C8D
                        • GetProcAddress.KERNEL32(00000000), ref: 10006C90
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$MoveFileA$lstrlenA
                        • API String ID: 2574300362-2667531482
                        • Opcode ID: 4805dad5504e30285bb994fe7d7c858771234758b6e479bee3be976b1d7f239d
                        • Instruction ID: 5f4f5e56de4c5efbf47a5c78d48e29a7ad09a041bba15cfb9ae28dacb9f2c98a
                        • Opcode Fuzzy Hash: 4805dad5504e30285bb994fe7d7c858771234758b6e479bee3be976b1d7f239d
                        • Instruction Fuzzy Hash: 48E06D626006282BA601E7E49C84CBF675DEF8D3907014472F704AB141DBB5EC4147B9
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteCriticalSection,759A9E20,?,00000000,00000000,100024A8), ref: 10001D4C
                        • GetProcAddress.KERNEL32(00000000), ref: 10001D55
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree), ref: 10001D63
                        • GetProcAddress.KERNEL32(00000000), ref: 10001D66
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: DeleteCriticalSection$KERNEL32.dll$VirtualFree
                        • API String ID: 2574300362-834918275
                        • Opcode ID: 9b0d53f833990a5a0aaf02e17cf435255bad5745e8f2993bfc6634b20cfa57ac
                        • Instruction ID: de24d1f777150d321959ae89f14270a1b7e629dd5b50cfb5e8bbae6585d01e99
                        • Opcode Fuzzy Hash: 9b0d53f833990a5a0aaf02e17cf435255bad5745e8f2993bfc6634b20cfa57ac
                        • Instruction Fuzzy Hash: 33E09B7120165837E625E7E58C44F9FAB5CDF85391B010969F60497140CBF6EC4046A4
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetProcessHeap), ref: 1000B2E1
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B2EA
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,HeapFree), ref: 1000B2F8
                        • GetProcAddress.KERNEL32(00000000), ref: 1000B2FB
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetProcessHeap$HeapFree$KERNEL32.dll
                        • API String ID: 2574300362-3454514201
                        • Opcode ID: 03626b03dd023116e98fb4ea4f566bb4f9a014edb3d61d8aae51cde71110ae27
                        • Instruction ID: 310a44c4b7cdbb270d522b78608fe0ec49ac24af4aca9d099abcab58f91b4b15
                        • Opcode Fuzzy Hash: 03626b03dd023116e98fb4ea4f566bb4f9a014edb3d61d8aae51cde71110ae27
                        • Instruction Fuzzy Hash: 6FE06D739006686BE900F7E98C84E4B6A8CDF893D5B524561E704AB100C7B2DC4147F0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection,?,00000000,?,?,10002BB7,?,00000000,?,00000000,?,?,?,?), ref: 100021C6
                        • GetProcAddress.KERNEL32(00000000), ref: 100021CF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection,?,?,?,?), ref: 100021DD
                        • GetProcAddress.KERNEL32(00000000), ref: 100021E0
                          • Part of subcall function 10002070: LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualFree,?,?,00000000,74DEF550,?,100021FA,00000400,?,?,?,?), ref: 10002089
                          • Part of subcall function 10002070: GetProcAddress.KERNEL32(00000000), ref: 10002092
                          • Part of subcall function 10002070: LoadLibraryA.KERNEL32(KERNEL32.dll,VirtualAlloc,?,100021FA,00000400,?,?,?,?), ref: 100020A2
                          • Part of subcall function 10002070: GetProcAddress.KERNEL32(00000000), ref: 100020A5
                          • Part of subcall function 10002070: puts.MSVCRT ref: 100020B4
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$puts
                        • String ID: EnterCriticalSection$KERNEL32.dll$LeaveCriticalSection
                        • API String ID: 2365495358-1950043958
                        • Opcode ID: 6e1a9d865275c1195eb0810f5d040a9fa8ffc5c988c1dcf26130878df8d133a7
                        • Instruction ID: 784a852ed69f14d488034ed7e4a864560cbfd45e2e389442ae4117b144a7c494
                        • Opcode Fuzzy Hash: 6e1a9d865275c1195eb0810f5d040a9fa8ffc5c988c1dcf26130878df8d133a7
                        • Instruction Fuzzy Hash: 21E092726003586BD621E7F58C88DAFB7ADEFC9751701496AF3149B100CBB5FC4147A4
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,?,?,?,1000A576), ref: 1000BCA6
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BCAF
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,?,1000A576), ref: 1000BCBD
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BCC0
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$Sleep$WaitForSingleObject
                        • API String ID: 2574300362-1894623987
                        • Opcode ID: 33a666b476e140a8f8c871be7aee747473652424465154160a6930d692a1832c
                        • Instruction ID: 1fccbf4ff30f5a4550b0fe0fe6a56459ea15908391166e8337ca4d0f8b12fcd3
                        • Opcode Fuzzy Hash: 33a666b476e140a8f8c871be7aee747473652424465154160a6930d692a1832c
                        • Instruction Fuzzy Hash: EBE04F622002683AE521E3F68C84CAFE74CEF893717010665F32497190CFB2DC808770
                        APIs
                        • ?_Xran@std@@YAXXZ.MSVCP60(?,?,?,00000000,?,-00000008,10019C11,000000FF,100063BE,-00000008,?,?,?,?,?), ref: 10006DCF
                        • ?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ.MSVCP60(?,?,?,00000000,?,-00000008,10019C11,000000FF,100063BE,-00000008,?,?,?,?,?), ref: 10006DD7
                        • memmove.MSVCRT ref: 10006DF9
                        • ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z.MSVCP60(?,00000000), ref: 10006E0B
                        • ?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z.MSVCP60(?), ref: 10006E18
                        • ?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ.MSVCP60(?,00000000,?,-00000008,10019C11,000000FF,100063BE,-00000008,?,?,?,?,?), ref: 10006E20
                        • ?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,?,?,00000000,?,-00000008,10019C11,000000FF,100063BE,-00000008,?,?,?,?,?), ref: 10006E57
                        • ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z.MSVCP60(3B4208C4,00000001,?,?,?,00000000,?,-00000008,10019C11,000000FF,100063BE,-00000008,?,?,?), ref: 10006E98
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: D@2@@std@@D@std@@U?$char_traits@V?$allocator@$Grow@?$basic_string@Split@?$basic_string@$Eos@?$basic_string@Tidy@?$basic_string@Xran@std@@memmove
                        • String ID:
                        • API String ID: 1074130261-0
                        • Opcode ID: 6453fa029f67a1a700aa8543c53005a187c52897ab2fc396bcd21011305c2596
                        • Instruction ID: 1f6dc37bb7bd278f628bc600a919a3777c22ab94731e7534e6f4ea16ccf593b5
                        • Opcode Fuzzy Hash: 6453fa029f67a1a700aa8543c53005a187c52897ab2fc396bcd21011305c2596
                        • Instruction Fuzzy Hash: 0C41FF35700BA49FD711DF58CCC46AABBE6FB8C6A0F60892EE86A87340C7359D44CB40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: _strnicmp
                        • String ID: CONNECT $GET $HEAD $POST
                        • API String ID: 2635805826-4031508290
                        • Opcode ID: 481b378a983ec95f02804e289f69900a8b027311c82380ac88004a847cd836b5
                        • Instruction ID: c70ae619576b633602851eb6159f78066b6353e148645e3fca1d5dd950b70279
                        • Opcode Fuzzy Hash: 481b378a983ec95f02804e289f69900a8b027311c82380ac88004a847cd836b5
                        • Instruction Fuzzy Hash: 1C018C3170029157E301EA1CEC00BCEB3D8FF85356F8600A2FA44DB284E3B8DC458B82
                        APIs
                        • GetProcAddress.KERNEL32(00000000,waveOutGetNumDevs), ref: 10001797
                        • GetProcAddress.KERNEL32(00000000,waveOutOpen), ref: 100017F9
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc
                        • String ID: waveOutGetNumDevs$waveOutOpen$waveOutPrepareHeader
                        • API String ID: 190572456-3006884721
                        • Opcode ID: c0672bbd657d60da7a62fba07e8a7a99cab492d54b45343f5947f5f434c369be
                        • Instruction ID: ce5621f32cbc2ef36ccf1da218a0d45e5495487102fa125a822fe108158a2c00
                        • Opcode Fuzzy Hash: c0672bbd657d60da7a62fba07e8a7a99cab492d54b45343f5947f5f434c369be
                        • Instruction Fuzzy Hash: 5D319375A00205AFD714DF68D884AAABBF5FB89310F2045A9EA05D7345DB31ED02CB90
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA), ref: 10006327
                        • GetProcAddress.KERNEL32(00000000), ref: 1000632E
                        • ?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z.MSVCP60(?,?,?), ref: 1000638C
                          • Part of subcall function 10006440: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrlenA,?,?), ref: 10006471
                          • Part of subcall function 10006440: GetProcAddress.KERNEL32(00000000), ref: 1000647A
                          • Part of subcall function 10006440: LoadLibraryA.KERNEL32(KERNEL32.dll,FindClose), ref: 10006488
                          • Part of subcall function 10006440: GetProcAddress.KERNEL32(00000000), ref: 1000648B
                          • Part of subcall function 10006440: LoadLibraryA.KERNEL32(KERNEL32.dll,FindNextFileA), ref: 1000649B
                          • Part of subcall function 10006440: GetProcAddress.KERNEL32(00000000), ref: 1000649E
                          • Part of subcall function 10006440: LoadLibraryA.KERNEL32(KERNEL32.dll,FindFirstFileA), ref: 100064AE
                          • Part of subcall function 10006440: GetProcAddress.KERNEL32(00000000), ref: 100064B1
                          • Part of subcall function 10006440: wsprintfA.USER32 ref: 10006504
                          • Part of subcall function 100066B0: ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z.MSVCP60(?,?,?,?,00000000,?,1000635E,?), ref: 100066F4
                          • Part of subcall function 100066B0: ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z.MSVCP60(?,?,00000000,?,1000635E,?), ref: 10006705
                          • Part of subcall function 100066B0: ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z.MSVCP60(?,?,00000000,?,1000635E,?), ref: 10006716
                          • Part of subcall function 100066B0: ??3@YAXPAX@Z.MSVCRT ref: 1000673F
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$D@2@@std@@D@std@@U?$char_traits@V?$allocator@$Refcnt@?$basic_string@$??3@?assign@?$basic_string@V12@wsprintf
                        • String ID: KERNEL32.dll$lstrlenA
                        • API String ID: 1916893902-1796993502
                        • Opcode ID: e0b391abb841a7829105a7001758cfc126c682f5c3696db6e38f7df281d6d75e
                        • Instruction ID: eeecbe46f180edadddb5c42fdebf3831498551bd03c72119858809fffa62efc0
                        • Opcode Fuzzy Hash: e0b391abb841a7829105a7001758cfc126c682f5c3696db6e38f7df281d6d75e
                        • Instruction Fuzzy Hash: C731E1B55047429FE300CF68CC84A5BBBE5FF8D290F204A2DF59987391C734EA458BA2
                        APIs
                        • htons.WS2_32 ref: 100085E3
                        • inet_addr.WS2_32(?), ref: 100085F9
                        • inet_addr.WS2_32(?), ref: 10008617
                        • socket.WS2_32(00000002,00000001,00000006), ref: 10008623
                        • setsockopt.WS2_32 ref: 1000864E
                        • connect.WS2_32(?,?,00000010), ref: 1000865E
                        • closesocket.WS2_32 ref: 1000866C
                          • Part of subcall function 100083B0: gethostbyname.WS2_32(?), ref: 100083B5
                          • Part of subcall function 100083B0: inet_ntoa.WS2_32(00000000), ref: 100083C8
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: inet_addr$closesocketconnectgethostbynamehtonsinet_ntoasetsockoptsocket
                        • String ID:
                        • API String ID: 1372979013-0
                        • Opcode ID: 8a7243a903e700a571d8f5d735249f95955cb8d29f26a7dd3346c4c37a6d1d94
                        • Instruction ID: 2ef1c08a475b93d1d30a38a551d650a9823448007ed46fe3478c86a47590e5aa
                        • Opcode Fuzzy Hash: 8a7243a903e700a571d8f5d735249f95955cb8d29f26a7dd3346c4c37a6d1d94
                        • Instruction Fuzzy Hash: 4B119D70504711ABE710DF288C85A5BB7E4FF883A4F508A19F4A8D62E0E7B1D9448B92
                        APIs
                        • IsWindow.USER32(?), ref: 10010C1A
                        • SendMessageA.USER32(?,00000408,00000000,00000000), ref: 10010C2E
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,?,?,?,?,?,1001A020,000000FF), ref: 10010C44
                        • GetProcAddress.KERNEL32(00000000), ref: 10010C4B
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadMessageProcSendWindow
                        • String ID: KERNEL32.dll$SetEvent
                        • API String ID: 4217182500-1240338101
                        • Opcode ID: dc4ef39d119e2903dd12595a883f60e45b26bf2eac42065822fea1cd3add9524
                        • Instruction ID: 6384992c116f9cac417eac121cbe395da42384bff593b8ba7c2dd42a5e07efc2
                        • Opcode Fuzzy Hash: dc4ef39d119e2903dd12595a883f60e45b26bf2eac42065822fea1cd3add9524
                        • Instruction Fuzzy Hash: 4211A535600614AFD704DF54DC95B5BB7A9FB4D720F008259FE059B380CB75E940CBA0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep,?,?,?,?), ref: 1000EAC2
                        • GetProcAddress.KERNEL32(00000000), ref: 1000EACF
                        • GetProcAddress.KERNEL32(00000000,BitBlt), ref: 1000EAE0
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: BitBlt$KERNEL32.dll$Sleep
                        • API String ID: 2238633743-3382908569
                        • Opcode ID: a4cf78a9fdaf5011dfe05a6834ed4b09f11624f9c3812add02a35ae9711c83a1
                        • Instruction ID: 80d2dc58ce5143aeb720f31c2f76471c939d4acdc1391abfc761270904054b7e
                        • Opcode Fuzzy Hash: a4cf78a9fdaf5011dfe05a6834ed4b09f11624f9c3812add02a35ae9711c83a1
                        • Instruction Fuzzy Hash: 3D0152726442646BD310DB99CC84E5BBBECFB9D791F014929FA48A7240C771EC058BA1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,100112E6), ref: 10010E5E
                        • GetProcAddress.KERNEL32(00000000), ref: 10010E65
                        • IsWindow.USER32(?), ref: 10010E71
                        • SendMessageA.USER32(?,0000043D,00000000,00000000), ref: 10010E88
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadMessageProcSendWindow
                        • String ID: KERNEL32.dll$WaitForSingleObject
                        • API String ID: 4217182500-3889371928
                        • Opcode ID: 35de2e643744c5910c6ad20459225d6b002ddd7c2e74455300ccce17b1c3095d
                        • Instruction ID: 43b46d2f5609498b0dd9ee59ec715d185c634a343cb93416766cca141da8a0ea
                        • Opcode Fuzzy Hash: 35de2e643744c5910c6ad20459225d6b002ddd7c2e74455300ccce17b1c3095d
                        • Instruction Fuzzy Hash: 69F01C76300720ABE760DBA5EC48F4B77A8EB88B61F018959F645DB180DBB0E8818760
                        APIs
                        • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,00000000,10013BE0), ref: 1001284B
                        • OpenServiceA.ADVAPI32(00000000,Defghi Klmnopqr Tuv,000F003F), ref: 1001285E
                        • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 1001286B
                        • CloseServiceHandle.ADVAPI32(00000000), ref: 10012878
                        • CloseServiceHandle.ADVAPI32(00000000), ref: 1001287B
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Service$CloseHandleOpen$ManagerStart
                        • String ID: Defghi Klmnopqr Tuv
                        • API String ID: 1485051382-1553144822
                        • Opcode ID: 07d0b6ac0352781bcf5aedf1783fa255a29000363869a2130161e43ca6bfe717
                        • Instruction ID: 7c8c28317631a892ccae3cb9f3ad782f9acbea9ad03f54a2e51300a147e659e8
                        • Opcode Fuzzy Hash: 07d0b6ac0352781bcf5aedf1783fa255a29000363869a2130161e43ca6bfe717
                        • Instruction Fuzzy Hash: EFE08C31B4063076F23213205C4AF7F2A28DB89BA1F014011FB08AB191CBB4A80286A4
                        APIs
                          • Part of subcall function 100021B0: LoadLibraryA.KERNEL32(KERNEL32.dll,LeaveCriticalSection,?,00000000,?,?,10002BB7,?,00000000,?,00000000,?,?,?,?), ref: 100021C6
                          • Part of subcall function 100021B0: GetProcAddress.KERNEL32(00000000), ref: 100021CF
                          • Part of subcall function 100021B0: LoadLibraryA.KERNEL32(KERNEL32.dll,EnterCriticalSection,?,?,?,?), ref: 100021DD
                          • Part of subcall function 100021B0: GetProcAddress.KERNEL32(00000000), ref: 100021E0
                        • _ftol.MSVCRT ref: 10002BDF
                        • ??2@YAPAXI@Z.MSVCRT ref: 10002BE9
                        • ??3@YAXPAX@Z.MSVCRT ref: 10002C1E
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$??2@??3@_ftol
                        • String ID:
                        • API String ID: 907892022-0
                        • Opcode ID: f20f1712f8050ff989f7084e8eb515db515269b0456350a3c15761881792ee97
                        • Instruction ID: d41c8f31576468369ca1b47338740924bd3f9691942a29fca6a49e72c163abc7
                        • Opcode Fuzzy Hash: f20f1712f8050ff989f7084e8eb515db515269b0456350a3c15761881792ee97
                        • Instruction Fuzzy Hash: 7041B4767043045BE704EF259C42ABF73D9EBD8690F00092DFA4557386EE35FA0987A2
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,DeleteFileA), ref: 100053DF
                        • GetProcAddress.KERNEL32(00000000), ref: 100053E6
                        • Sleep.KERNEL32(00000000), ref: 1000541A
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProcSleep
                        • String ID: DeleteFileA$KERNEL32.dll
                        • API String ID: 188063004-2147215044
                        • Opcode ID: 53b0e606c39ac888e3f65b27229fd5ad64fe52a2532cb209e29ee44e1a34e688
                        • Instruction ID: 111b25c7b5b3c32ed8a88bd0af0234a4f4a27215f145db55a404f07c7f97eb56
                        • Opcode Fuzzy Hash: 53b0e606c39ac888e3f65b27229fd5ad64fe52a2532cb209e29ee44e1a34e688
                        • Instruction Fuzzy Hash: 9021732B30002013A415F29E7C99EBFDB1DEBE5AF7B20803BF682C5195CB451CA692B5
                        APIs
                        • LoadLibraryA.KERNEL32(WINMM.dll), ref: 10001AE6
                        • GetProcAddress.KERNEL32(?,waveInGetNumDevs), ref: 10001B02
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: WINMM.dll$waveInGetNumDevs
                        • API String ID: 2574300362-817700921
                        • Opcode ID: 94dd57762219a88611f35a8c154427ee6484170ef8eb23dda1bc12ffa7650c71
                        • Instruction ID: e73551ae0253794c8a5c6544d3d27412878de8d53c60ea806c2f1c7c45091e12
                        • Opcode Fuzzy Hash: 94dd57762219a88611f35a8c154427ee6484170ef8eb23dda1bc12ffa7650c71
                        • Instruction Fuzzy Hash: 6A110372E006499FEB01CFA8EC457EDBBB9FB45251F1002BAE919C3740EB359901C791
                        APIs
                        • wsprintfA.USER32 ref: 1000490C
                          • Part of subcall function 10004670: LsaOpenPolicy.ADVAPI32(00000000,?,00000004,?), ref: 10004692
                        • LsaFreeMemory.ADVAPI32(?), ref: 1000493A
                        • LsaFreeMemory.ADVAPI32(?), ref: 10004964
                          • Part of subcall function 10004700: LoadLibraryA.KERNEL32(KERNEL32.dll,WideCharToMultiByte,?,00000000,00000000), ref: 10004716
                          • Part of subcall function 10004700: GetProcAddress.KERNEL32(00000000), ref: 1000471D
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: FreeMemory$AddressLibraryLoadOpenPolicyProcwsprintf
                        • String ID: L$_RasDefaultCredentials#0$RasDialParams!%s#0
                        • API String ID: 4178720857-1591505386
                        • Opcode ID: e43955cd61d83b4fcbcd524804181394f015150c14cf35c21bbdfaaadf604e78
                        • Instruction ID: 5dbc5db930d339ed8d670602376d9ed9f1f6c6c76cd1139057483e510253f374
                        • Opcode Fuzzy Hash: e43955cd61d83b4fcbcd524804181394f015150c14cf35c21bbdfaaadf604e78
                        • Instruction Fuzzy Hash: B92192B96047519BE304DF14D89086BB7EAEFCC744F00892DF98987301EA34ED08CB91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar
                        • String ID: CreateThread$KERNEL32.dll$Sleep
                        • API String ID: 2332253611-933711560
                        • Opcode ID: 2312679918a36abb4d04cfc295b63230907a7276eec1b7fa3e2c97e5bd5fd1df
                        • Instruction ID: c5c1dcb7ef1ad39004ac39bd421cc68e8377f655f5857e45d56879e9997a8e21
                        • Opcode Fuzzy Hash: 2312679918a36abb4d04cfc295b63230907a7276eec1b7fa3e2c97e5bd5fd1df
                        • Instruction Fuzzy Hash: 49F0AF79E40228B7E310EBF45C95FDF7A58EB98350F214072FA09AB280D6B0DA418F91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: putchar
                        • String ID: CreateThread$KERNEL32.dll$Sleep
                        • API String ID: 2332253611-933711560
                        • Opcode ID: 40ba6680ac7aef9a45845643e59f85c0d27882956f6a619d0e0f0560d23ed27f
                        • Instruction ID: 6639dc5b20e13b9ffc20b7d029d38c8bf6795efa3ba254e4639380a2f20fe8e3
                        • Opcode Fuzzy Hash: 40ba6680ac7aef9a45845643e59f85c0d27882956f6a619d0e0f0560d23ed27f
                        • Instruction Fuzzy Hash: 88F03072F4025836E510B3F55C5AF9F6A48EB84794F110522F708AA180C9F1D9508AA6
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WideCharToMultiByte,?,00000000,00000000), ref: 10004716
                        • GetProcAddress.KERNEL32(00000000), ref: 1000471D
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$WideCharToMultiByte
                        • API String ID: 2574300362-2634761684
                        • Opcode ID: 6fab4e53bca937376b5e52c08edff61ee41b765bf7b5218c31c0fad5cbd9b2d6
                        • Instruction ID: eebf43c34f85d85ec279a3e96838be588e74a7e6cfa64fb4382280e521ea847d
                        • Opcode Fuzzy Hash: 6fab4e53bca937376b5e52c08edff61ee41b765bf7b5218c31c0fad5cbd9b2d6
                        • Instruction Fuzzy Hash: 6541E3725042568FDB18CE2CC8549AFBBD5FBC4354F168A2DF86593281DE70DD0ACB91
                        APIs
                          • Part of subcall function 10010E50: LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,100112E6), ref: 10010E5E
                          • Part of subcall function 10010E50: GetProcAddress.KERNEL32(00000000), ref: 10010E65
                          • Part of subcall function 10010E50: IsWindow.USER32(?), ref: 10010E71
                          • Part of subcall function 10010E50: SendMessageA.USER32(?,0000043D,00000000,00000000), ref: 10010E88
                        • ??2@YAPAXI@Z.MSVCRT ref: 100112F8
                        • GetProcAddress.KERNEL32(?,ICSeqCompressFrame), ref: 10011393
                        • ??3@YAXPAX@Z.MSVCRT ref: 10011426
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProc$??2@??3@LibraryLoadMessageSendWindow
                        • String ID: ICSeqCompressFrame
                        • API String ID: 2489156091-1610221639
                        • Opcode ID: 7e25597ab546359d2a8180d076c7e857adf4dbdfe4734e7351304efe555cf152
                        • Instruction ID: 670ec2e5f3974c571d900b6b407094b4b862db627b4d759557e127e0940dcbb3
                        • Opcode Fuzzy Hash: 7e25597ab546359d2a8180d076c7e857adf4dbdfe4734e7351304efe555cf152
                        • Instruction Fuzzy Hash: ED416EB5B0010A9FDB1CCF64D995AABBBF5FF48244B154198E806EF345D631ED81CBA0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcessId,00000000,00000000,?,759A3A20), ref: 10003CF4
                        • GetProcAddress.KERNEL32(00000000), ref: 10003CFB
                          • Part of subcall function 10002E90: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,00000F9F,?,00000000,00000001,000000FF,?,759A3A20), ref: 10002EA6
                          • Part of subcall function 10002E90: GetProcAddress.KERNEL32(00000000), ref: 10002EAF
                          • Part of subcall function 10002E90: LoadLibraryA.KERNEL32(KERNEL32.dll,GetLocalTime,?,759A3A20), ref: 10002EBD
                          • Part of subcall function 10002E90: GetProcAddress.KERNEL32(00000000), ref: 10002EC0
                          • Part of subcall function 10002E90: rand.MSVCRT ref: 10002EDB
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc$rand
                        • String ID: GetCurrentProcessId$KERNEL32.dll
                        • API String ID: 237380613-1570577352
                        • Opcode ID: 0470e2496fdb1645f775446bc4e49627f3889440c96ab3b7fc32d8b380eafc00
                        • Instruction ID: 367786970d8e879bccbbb5aaf35d38d8f6bcda55fe6c16505e8c99dfb50899a8
                        • Opcode Fuzzy Hash: 0470e2496fdb1645f775446bc4e49627f3889440c96ab3b7fc32d8b380eafc00
                        • Instruction Fuzzy Hash: 651106312487865BE325CB64DC012ABBBD5FF85310F404D3DE6A693680CF75A90C8392
                        APIs
                        • LsaOpenPolicy.ADVAPI32(00000000,?,00000004,?), ref: 10004692
                        • LsaRetrievePrivateData.ADVAPI32(?,?,?), ref: 100046C5
                        Strings
                        • L$_RasDefaultCredentials#0, xrefs: 10004675
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: DataOpenPolicyPrivateRetrieve
                        • String ID: L$_RasDefaultCredentials#0
                        • API String ID: 1655749231-2801509457
                        • Opcode ID: 7d9469a1c1fa6bf10911a44bd94c175364d005d9e62463a7837736ccd188982d
                        • Instruction ID: 77331fefa27b426b9a93bc2f5e8769b784269982fce734c4936179efd27b4e46
                        • Opcode Fuzzy Hash: 7d9469a1c1fa6bf10911a44bd94c175364d005d9e62463a7837736ccd188982d
                        • Instruction Fuzzy Hash: DC01D8B62082026FE704DA28DC42EBBB3D8EBD4254F008D2DF544CB141FA71E959C792
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,Sleep), ref: 10002F63
                        • GetProcAddress.KERNEL32(00000000), ref: 10002F6A
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$Sleep
                        • API String ID: 2574300362-534790634
                        • Opcode ID: 4d0212f82a36383c1feb37774aa7978657163f070ada41fa4824c188b90f222c
                        • Instruction ID: 6bf08cfb84708a53feb671671ff8d99a5db139820554d43d51ecefb986336f89
                        • Opcode Fuzzy Hash: 4d0212f82a36383c1feb37774aa7978657163f070ada41fa4824c188b90f222c
                        • Instruction Fuzzy Hash: FE01F5B3A0011A9FE710CF9CDCC8CAABBBAFB45351B6202BBEA14C7514DB3199558B51
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetVersionExA), ref: 10010392
                        • GetProcAddress.KERNEL32(00000000), ref: 10010399
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetVersionExA$KERNEL32.dll
                        • API String ID: 2574300362-3023017819
                        • Opcode ID: 82f2b0b514181a4903b275308320458c98271e8cb33de1fd48414da4b85e077c
                        • Instruction ID: 0f9b196472ab68e805716585def8839785b03ec4095205029c5d0f18bfe44061
                        • Opcode Fuzzy Hash: 82f2b0b514181a4903b275308320458c98271e8cb33de1fd48414da4b85e077c
                        • Instruction Fuzzy Hash: 32F0D635A00342A7E310E774DC48F9B3FE8EFC4394F408829F99896151E7B8C5898A92
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange), ref: 1001120D
                        • GetProcAddress.KERNEL32(00000000), ref: 10011214
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: InterlockedExchange$KERNEL32.dll
                        • API String ID: 2574300362-896495449
                        • Opcode ID: 765902535b6fde137b4ad2f71effcb023d1b9619df46c92c6c5f583fd52c208c
                        • Instruction ID: ad45b1caf5e8cac53132981ffbe2540148f7c74f6a55752de9e01a09189c2720
                        • Opcode Fuzzy Hash: 765902535b6fde137b4ad2f71effcb023d1b9619df46c92c6c5f583fd52c208c
                        • Instruction Fuzzy Hash: 8BF0F63620842197E648EB649CA0EEFB755EFAD351B06864EF9169B2C0CB309CD1C3D9
                        APIs
                          • Part of subcall function 10012880: LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcess,SeBackupPrivilege,00000000,10012B0F,?,00000000), ref: 1001288D
                          • Part of subcall function 10012880: GetProcAddress.KERNEL32(00000000), ref: 10012894
                          • Part of subcall function 10012880: OpenProcessToken.ADVAPI32(00000000), ref: 100128A4
                          • Part of subcall function 10012880: LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 100128BA
                          • Part of subcall function 10012880: AdjustTokenPrivileges.ADVAPI32 ref: 100128E2
                        • RegCreateKeyExA.ADVAPI32(80000002,?,00000000,00000000,00000000,000F003F,00000000,?,?,SeRestorePrivilege,00000000,00000000), ref: 10012989
                        • RegRestoreKeyA.ADVAPI32(?,?,00000008,?,?,SeRestorePrivilege,00000000,00000000), ref: 100129A5
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: Token$AddressAdjustCreateLibraryLoadLookupOpenPrivilegePrivilegesProcProcessRestoreValue
                        • String ID: SeRestorePrivilege
                        • API String ID: 2429928042-1684392131
                        • Opcode ID: 097e06e332430977430d9a460b39217e3c597f3917cbf94135a069d7c89771bc
                        • Instruction ID: b4c7a59b284b538a44cb7b6238b6d835cb3a570a7bb80d5eba4fcf3e4dfdd8cd
                        • Opcode Fuzzy Hash: 097e06e332430977430d9a460b39217e3c597f3917cbf94135a069d7c89771bc
                        • Instruction Fuzzy Hash: 80F062B93443017BF710DB20DC46F7B73E8EB84B05F54882CFA489A280E674E858C762
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject,?,?,?,10019AB8,000000FF,10001A28), ref: 10001A75
                        • GetProcAddress.KERNEL32(00000000), ref: 10001A7C
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$WaitForSingleObject
                        • API String ID: 2574300362-3889371928
                        • Opcode ID: 9792fb54ace26a4efeb0556bd1d455398675d1cbb426dba80bb32bc06295ea0d
                        • Instruction ID: 23ae332d06c33137492a8de233bea9ceaec26f1b355b87d5c938c7ec8b0537e1
                        • Opcode Fuzzy Hash: 9792fb54ace26a4efeb0556bd1d455398675d1cbb426dba80bb32bc06295ea0d
                        • Instruction Fuzzy Hash: DA016D71104B52ABD324DF58CC44B9ABBA4FB49720F504B4DF176876D0CBB894448B92
                        APIs
                          • Part of subcall function 10012880: LoadLibraryA.KERNEL32(KERNEL32.dll,GetCurrentProcess,SeBackupPrivilege,00000000,10012B0F,?,00000000), ref: 1001288D
                          • Part of subcall function 10012880: GetProcAddress.KERNEL32(00000000), ref: 10012894
                          • Part of subcall function 10012880: OpenProcessToken.ADVAPI32(00000000), ref: 100128A4
                          • Part of subcall function 10012880: LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 100128BA
                          • Part of subcall function 10012880: AdjustTokenPrivileges.ADVAPI32 ref: 100128E2
                        • RegOpenKeyExA.ADVAPI32(80000002,10012B0F,00000000,000F003F,00000000,00000000), ref: 10012914
                        • RegSaveKeyA.ADVAPI32(00000000,?,00000000), ref: 1001292E
                        • RegCloseKey.ADVAPI32 ref: 10012939
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: OpenToken$AddressAdjustCloseLibraryLoadLookupPrivilegePrivilegesProcProcessSaveValue
                        • String ID: SeBackupPrivilege
                        • API String ID: 2372920917-2429070247
                        • Opcode ID: 3df8689c6ac1e2b386c68f0f0d01f5e065a9ec451b2765de15d8a0098039fddc
                        • Instruction ID: 43d226543e6eeb859091b46bbcf5307d07454dd089c114a20b0d5770e2fe7636
                        • Opcode Fuzzy Hash: 3df8689c6ac1e2b386c68f0f0d01f5e065a9ec451b2765de15d8a0098039fddc
                        • Instruction Fuzzy Hash: F4F0EDB5214200BFF319DB60CC89F3B73A8EB88741F24881CF656C6691DB70E854CA66
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,TerminateThread), ref: 1001243A
                        • GetProcAddress.KERNEL32(00000000), ref: 10012441
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$TerminateThread
                        • API String ID: 2574300362-3315417790
                        • Opcode ID: 24442554f76a4791856c97d2b7a15cc731875ce1c8c942be61a1074fece9f87f
                        • Instruction ID: f85aac3ac9cb4f3fa26bccd3d9435cec06b79a3cd592f3cb8fa1da8c44eb7136
                        • Opcode Fuzzy Hash: 24442554f76a4791856c97d2b7a15cc731875ce1c8c942be61a1074fece9f87f
                        • Instruction Fuzzy Hash: F8E04FB468020076F121E3A04C4AF593111DB14B60F608644F3252E0E1C7F1E9D18629
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,1000D2BE,FFFFFFFF,?), ref: 1000E9FD
                        • GetProcAddress.KERNEL32(00000000), ref: 1000EA04
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: InterlockedExchange$KERNEL32.dll
                        • API String ID: 2574300362-896495449
                        • Opcode ID: f6e472de204293b899042bd0bca3fb713a86289f67ced4b3daf9e9f36bef45d7
                        • Instruction ID: b8a4efd2c7601d393e6865693a388da66cd8199ebd7907c6d8f397bd308f225c
                        • Opcode Fuzzy Hash: f6e472de204293b899042bd0bca3fb713a86289f67ced4b3daf9e9f36bef45d7
                        • Instruction Fuzzy Hash: 85D02E720042A17AF20593908C8CBEB6E1ADF49390B024498FA4127282DB328C4082A2
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,InterlockedExchange,?,1000D2AF,?), ref: 1000E5AD
                        • GetProcAddress.KERNEL32(00000000), ref: 1000E5B4
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: InterlockedExchange$KERNEL32.dll
                        • API String ID: 2574300362-896495449
                        • Opcode ID: 66cca24a373f8bccf9510449797d14a03f0ef159430a0306f2667c069828979a
                        • Instruction ID: 465ccf067edbdd59b3eb53a1b61bb9303e9e4eafa6cd5f272da5a7b4a4e3ecbd
                        • Opcode Fuzzy Hash: 66cca24a373f8bccf9510449797d14a03f0ef159430a0306f2667c069828979a
                        • Instruction Fuzzy Hash: 20C012724044706BE115D7D0CC4CC9F6E28EF483657018565FA1957250DB70DC80C6F5
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,WaitForSingleObject), ref: 1000283D
                        • GetProcAddress.KERNEL32(00000000), ref: 10002844
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$WaitForSingleObject
                        • API String ID: 2574300362-3889371928
                        • Opcode ID: d3afab7406923ccce619c7f53ec8d53eb42c8db2c000410bcd3f907516cfd657
                        • Instruction ID: 86423163b6c041e323ca761cdba1352f045bc25448ac2e0872825fa0eeda39f0
                        • Opcode Fuzzy Hash: d3afab7406923ccce619c7f53ec8d53eb42c8db2c000410bcd3f907516cfd657
                        • Instruction Fuzzy Hash: 5CC0C931008570ABE52597E49C4CD8A6A14EB493617014789F635561D0CB7098808760
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,CloseHandle,74DF0BD0,1000974D), ref: 1000BBF3
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BBFA
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: CloseHandle$KERNEL32.dll
                        • API String ID: 2574300362-2295661983
                        • Opcode ID: 0470a471ef778f5a4f0875c051031e8035987bdddae29296fa6f6fd4d5a713d0
                        • Instruction ID: 71a75eba107be1fa7f35bc22cc11f2eb860450d8e127f70ecf74c7fc174c3b1f
                        • Opcode Fuzzy Hash: 0470a471ef778f5a4f0875c051031e8035987bdddae29296fa6f6fd4d5a713d0
                        • Instruction Fuzzy Hash: 0FC012754005619BD225EBE4DC4889B7A68FF4C3013414989F66187150CBF4DDC087A1
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,SetEvent,?,1000AE5B), ref: 1000BCED
                        • GetProcAddress.KERNEL32(00000000), ref: 1000BCF4
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: KERNEL32.dll$SetEvent
                        • API String ID: 2574300362-1240338101
                        • Opcode ID: 7e845474010858c51cbeb81fb8748a49539094e452202afe6b9d06160f956f74
                        • Instruction ID: d0fca89943742553d3a958ea99514f8d67f95a1582ee3db68f22447bd0f97b38
                        • Opcode Fuzzy Hash: 7e845474010858c51cbeb81fb8748a49539094e452202afe6b9d06160f956f74
                        • Instruction Fuzzy Hash: 79C00276404561ABE66AA7E1EC8C89B7A29EF4C3513018A99F62697150CBB5DC8087A0
                        APIs
                        • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount), ref: 1000A48A
                        • GetProcAddress.KERNEL32(00000000), ref: 1000A491
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetTickCount$KERNEL32.dll
                        • API String ID: 2574300362-381038616
                        • Opcode ID: 1d0aff5e160d0188b1a05f8fd4d33ae2250fd2240afe3bd43899046bf254bafc
                        • Instruction ID: 69d4e34d5701a036605e1fa22f034677dc5ba7240c88984f0e32ae24fd997e10
                        • Opcode Fuzzy Hash: 1d0aff5e160d0188b1a05f8fd4d33ae2250fd2240afe3bd43899046bf254bafc
                        • Instruction Fuzzy Hash: 32C09B7440156197E711DBE09C8C94E3E2CFB4C34272186D1F62197154CB74C4C15754
                        APIs
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: BlockInputputchar
                        • String ID:
                        • API String ID: 212221266-0
                        • Opcode ID: d0c40fde479a2ac77fd0eefb49e819c914263974de65ed91e79539f181853983
                        • Instruction ID: bcae60638838201e75d5e396b352f3edd3d3fbe876f74dd5a81984333f12039e
                        • Opcode Fuzzy Hash: d0c40fde479a2ac77fd0eefb49e819c914263974de65ed91e79539f181853983
                        • Instruction Fuzzy Hash: F3412737B486849BD310DF58A842BAEFB65FBC5620F0082BFD84587740CB366914C7E1
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000CB36
                          • Part of subcall function 1000C340: RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?), ref: 1000C358
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000CB88
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000CB98
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000CBF6
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: ??2@??3@$Open
                        • String ID:
                        • API String ID: 2374869923-0
                        • Opcode ID: a9ab1b918e15f974b9df6159bc6cb97b660a4e7a2585d31fd390fdca0085edfd
                        • Instruction ID: 399480632b0bc5efd84cd499c26cb2b4aef188cf81daa96a5daa0e4e81883018
                        • Opcode Fuzzy Hash: a9ab1b918e15f974b9df6159bc6cb97b660a4e7a2585d31fd390fdca0085edfd
                        • Instruction Fuzzy Hash: 4831B1366047494BD708DF29DC52A6FB2DAEB88650F44452CF906D7381EB35FE0AC792
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000CC96
                          • Part of subcall function 1000C340: RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?), ref: 1000C358
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000CCE8
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000CCF8
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000CD52
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: ??2@??3@$Open
                        • String ID:
                        • API String ID: 2374869923-0
                        • Opcode ID: 2f25fd5e720aa9cab3d4030d25313d2690da9c75a393af0b07616f3da6d1cc91
                        • Instruction ID: e01c473f364dc3bdf89258c02f17adc81957c92e3fcdac4d77c90bb936f91be0
                        • Opcode Fuzzy Hash: 2f25fd5e720aa9cab3d4030d25313d2690da9c75a393af0b07616f3da6d1cc91
                        • Instruction Fuzzy Hash: 2931F276604B084BD308DF28CC51A6BB7E6FBC8640F44453DFA1A87381DB31EA09CB92
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000C9A6
                          • Part of subcall function 1000C340: RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?), ref: 1000C358
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000C9F8
                        • ??2@YAPAXI@Z.MSVCRT ref: 1000CA08
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000CA62
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: ??2@??3@$Open
                        • String ID:
                        • API String ID: 2374869923-0
                        • Opcode ID: aae3b58483ccaa6e520bcad75a32c1209ee6f662ab4da20995c377e84611bd71
                        • Instruction ID: eea0e5a8ea9d9c84cb76cedbbef8a19c41a254cccb2e08925f8116ba8cfcd4ec
                        • Opcode Fuzzy Hash: aae3b58483ccaa6e520bcad75a32c1209ee6f662ab4da20995c377e84611bd71
                        • Instruction Fuzzy Hash: 5531E07660474C4BD708DF28C851A6BB3D5FBC9A44F44452CFA5687381DB35EE09C792
                        APIs
                        • ?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z.MSVCP60(00000001,?,?,?,?,?,?,?,?,?,?,000000FF,100052B8), ref: 10005322
                        • ??3@YAXPAX@Z.MSVCRT ref: 10005329
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000537F
                        • ??3@YAXPAX@Z.MSVCRT ref: 10005396
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: ??3@$D@2@@std@@D@std@@Tidy@?$basic_string@U?$char_traits@V?$allocator@
                        • String ID:
                        • API String ID: 3379573162-0
                        • Opcode ID: 41e59e46f8f8aa70387dda40c822bdfd0314e96149d3350878c62626ad5ed490
                        • Instruction ID: f90b1bacc28198c49dbbefc3f517bc8e4a0b2cda54f5eaebc2833e498af44e37
                        • Opcode Fuzzy Hash: 41e59e46f8f8aa70387dda40c822bdfd0314e96149d3350878c62626ad5ed490
                        • Instruction Fuzzy Hash: 79316575600B429BC300CF5AC980A4AF7E0FF48740F00462DE55A8B792DB72FA84CBD1
                        APIs
                        • ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z.MSVCP60(?,?,?,?,00000000,?,1000635E,?), ref: 100066F4
                        • ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z.MSVCP60(?,?,00000000,?,1000635E,?), ref: 10006705
                        • ?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z.MSVCP60(?,?,00000000,?,1000635E,?), ref: 10006716
                        • ??3@YAXPAX@Z.MSVCRT ref: 1000673F
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: D@2@@std@@D@std@@Refcnt@?$basic_string@U?$char_traits@V?$allocator@$??3@
                        • String ID:
                        • API String ID: 1648593004-0
                        • Opcode ID: 59f1b0d670d1a1cc55aa766f25f71db387d79b3ce56979a42751eaff6acdd965
                        • Instruction ID: 0d66392145157419a21775a2c7d86c6955f3a7b4f70b606196f5badc0afe4783
                        • Opcode Fuzzy Hash: 59f1b0d670d1a1cc55aa766f25f71db387d79b3ce56979a42751eaff6acdd965
                        • Instruction Fuzzy Hash: F2215074704A019FE719CF29C98092BBBE6EF49690710855DE85ECB755EB30FD50CBA0
                        APIs
                        • GetProcAddress.KERNEL32(00000000,BitBlt), ref: 1000E495
                        • SetRect.USER32(?,000000FF,?,000000FF,?), ref: 1000E4EF
                        Strings
                        Memory Dump Source
                        • Source File: 0000001C.00000002.2925986376.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 0000001C.00000002.2925970460.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926009281.000000001001B000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926026622.000000001001E000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926045133.0000000010020000.00000008.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926061598.0000000010021000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 0000001C.00000002.2926078134.0000000010022000.00000002.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_28_2_10000000_svchost.jbxd
                        Similarity
                        • API ID: AddressProcRect
                        • String ID: BitBlt
                        • API String ID: 4245370471-1846796307
                        • Opcode ID: 7a9c73e825b01b7318887443e287f68de443f5842346160bc2c2aa2d36657793
                        • Instruction ID: efef9cc2901e17b89c1c2283a89420657ccd7ca40561f4e11b8d1eeecd3c465f
                        • Opcode Fuzzy Hash: 7a9c73e825b01b7318887443e287f68de443f5842346160bc2c2aa2d36657793
                        • Instruction Fuzzy Hash: BE419F75A00B049FD714CF69D9C0A6ABBF6FF88354B208A2DE986D7B94D730F8018B50