Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9JQ3JboYdz.exe

Overview

General Information

Sample name:9JQ3JboYdz.exe
renamed because original name is a hash value
Original sample name:fb714d59bcb67c0910c8f4ee0c5f0e62.exe
Analysis ID:1520443
MD5:fb714d59bcb67c0910c8f4ee0c5f0e62
SHA1:f22ffe25d693ccf771b5ae60b373f4c74551b317
SHA256:25ad9ca13dc1ee44d8c3a3d0fba9365d9e9fd65db1411a0f720dd036d11911f3
Tags:exeuser-abuse_ch
Infos:

Detection

RunningRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RunningRAT
AI detected suspicious sample
Checks if browser processes are running
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for dropped file
Self deletion via cmd or bat file
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Drops PE files to the program root directory (C:\Program Files)
Drops PE files to the windows directory (C:\Windows)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 9JQ3JboYdz.exe (PID: 4364 cmdline: "C:\Users\user\Desktop\9JQ3JboYdz.exe" MD5: FB714D59BCB67C0910C8F4EE0C5F0E62)
    • cmd.exe (PID: 4568 cmdline: "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\user\Desktop\9JQ3JboYdz.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 2792 cmdline: ping 127.0.0.1 -n 1 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • svchost.exe (PID: 6208 cmdline: C:\Windows\SysWOW64\svchost.exe -k "SySe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • svchost.exe (PID: 7084 cmdline: C:\Windows\SysWOW64\svchost.exe -k "SySe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
    • SySe.exe (PID: 1612 cmdline: C:\Windows\system32\SySe.exe "c:\program files (x86)\4293750.dll",MainThread MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Running RATNJCCIC characterizes RunningRAT as a remote access trojan (RAT) that operates using two DLL files. When the trojan is loaded onto a system, it executes the first DLL. This is used to disable anti-malware solutions, unpack and execute the main RAT DLL, and gain persistence. The trojan installs a Windows batch file dx.bat that attempts to kill the daumcleaner.exe task, a Korean security program. The file then attempts to remove itself. Once the second DLL is loaded into memory, the first DLL overwrites the IP address for the control server to change the address the trojan communicates with. The second DLL gathers information about the victim's system, including its operating system and driver and processor information. The RAT can log user keystrokes, copy the clipboard, delete files, compress files, clear event logs, shut down the machine, and more. The second DLL also uses several anti-bugging techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.runningrat
No configs have been found
SourceRuleDescriptionAuthorStrings
9JQ3JboYdz.exeJoeSecurity_RunningRATYara detected RunningRATJoe Security
    9JQ3JboYdz.exeGoldDragon_RunningRATDetects Running RAT from Gold Dragon reportFlorian Roth
    • 0x402f:$a1: emanybtsohteg
    • 0x405d:$a2: tekcosesolc
    • 0x4089:$a3: emankcosteg
    • 0x4095:$a4: emantsohteg
    • 0x406a:$a5: tpokcostes
    • 0x400e:$a6: putratSASW
    9JQ3JboYdz.exeMALWARE_Win_RunningRATDetects RunningRATditekSHen
    • 0x9bb0:$s1: %s%d.dll
    • 0x9cbc:$s2: /c ping 127.0.0.1 -n
    • 0x9cd6:$s3: del /f/q "%s"
    • 0x9ac8:$s4: GUpdate
    • 0x9c8c:$s5: %s\%d.bak
    • 0x9bc5:$s6: "%s",MainThread
    • 0x9bd8:$s7: rundll32.exe
    • 0x4089:$rev1: emankcosteg
    • 0x42ae:$rev3: daerhTniaM,"s%" s%
    • 0x4602:$rev4: s% etadpUllD,"s%" 23lldnuR
    • 0x472f:$rev5: ---DNE yromeMmorFdaoL
    • 0x4724:$rev6: eMnigulP
    • 0x429f:$rev7: exe.23lldnuR\
    • 0x45a8:$rev8: dnammoc\nepo\llehs\
    • 0x45df:$rev8: dnammoc\nepo\llehs\
    • 0x4789:$rev9: "s%" k- exe.tsohcvs\23metsyS\%%tooRmetsyS%
    • 0x402f:$rev10: emanybtsohteg
    • 0x405d:$rev11: tekcosesolc
    • 0x406a:$rev12: tpokcostes
    • 0x4095:$rev13: emantsohteg
    SourceRuleDescriptionAuthorStrings
    C:\Program Files (x86)\4293750.dllMALWARE_Win_RunningRATDetects RunningRATditekSHen
    • 0x5534:$s4: GUpdate
    • 0x514c:$s5: %s\%d.bak
    • 0x55e3:$s6: "%s",MainThread
    • 0x50ec:$v2_1: %%SystemRoot%%\System32\svchost.exe -k "%s"
    • 0x515c:$v2_2: LoadFromMemory END---
    • 0x51d0:$v2_3: hmProxy!= NULL
    • 0x5284:$v2_4: Rundll32 "%s",DllUpdate %s
    • 0x5610:$v2_6: %d*%sMHz
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2138500502.0000000000403000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_RunningRATYara detected RunningRATJoe Security
      Process Memory Space: 9JQ3JboYdz.exe PID: 4364JoeSecurity_RunningRATYara detected RunningRATJoe Security
        SourceRuleDescriptionAuthorStrings
        3.2.svchost.exe.10000000.0.unpackMALWARE_Win_RunningRATDetects RunningRATditekSHen
        • 0x5534:$s4: GUpdate
        • 0x514c:$s5: %s\%d.bak
        • 0x55e3:$s6: "%s",MainThread
        • 0x50ec:$v2_1: %%SystemRoot%%\System32\svchost.exe -k "%s"
        • 0x515c:$v2_2: LoadFromMemory END---
        • 0x51d0:$v2_3: hmProxy!= NULL
        • 0x5284:$v2_4: Rundll32 "%s",DllUpdate %s
        • 0x5610:$v2_6: %d*%sMHz
        0.2.9JQ3JboYdz.exe.4032a0.1.unpackMALWARE_Win_RunningRATDetects RunningRATditekSHen
        • 0x5910:$s1: %s%d.dll
        • 0x5a1c:$s2: /c ping 127.0.0.1 -n
        • 0x5a36:$s3: del /f/q "%s"
        • 0x4934:$s4: GUpdate
        • 0x5828:$s4: GUpdate
        • 0x454c:$s5: %s\%d.bak
        • 0x59ec:$s5: %s\%d.bak
        • 0x49e3:$s6: "%s",MainThread
        • 0x5925:$s6: "%s",MainThread
        • 0x5938:$s7: rundll32.exe
        • 0x44ec:$v2_1: %%SystemRoot%%\System32\svchost.exe -k "%s"
        • 0x455c:$v2_2: LoadFromMemory END---
        • 0x45d0:$v2_3: hmProxy!= NULL
        • 0x4684:$v2_4: Rundll32 "%s",DllUpdate %s
        • 0x4a10:$v2_6: %d*%sMHz
        7.2.SySe.exe.10000000.1.unpackMALWARE_Win_RunningRATDetects RunningRATditekSHen
        • 0x5534:$s4: GUpdate
        • 0x514c:$s5: %s\%d.bak
        • 0x55e3:$s6: "%s",MainThread
        • 0x50ec:$v2_1: %%SystemRoot%%\System32\svchost.exe -k "%s"
        • 0x515c:$v2_2: LoadFromMemory END---
        • 0x51d0:$v2_3: hmProxy!= NULL
        • 0x5284:$v2_4: Rundll32 "%s",DllUpdate %s
        • 0x5610:$v2_6: %d*%sMHz
        0.2.9JQ3JboYdz.exe.4032a0.1.raw.unpackMALWARE_Win_RunningRATDetects RunningRATditekSHen
        • 0x6910:$s1: %s%d.dll
        • 0x6a1c:$s2: /c ping 127.0.0.1 -n
        • 0x6a36:$s3: del /f/q "%s"
        • 0x5534:$s4: GUpdate
        • 0x6828:$s4: GUpdate
        • 0x514c:$s5: %s\%d.bak
        • 0x69ec:$s5: %s\%d.bak
        • 0x55e3:$s6: "%s",MainThread
        • 0x6925:$s6: "%s",MainThread
        • 0x6938:$s7: rundll32.exe
        • 0x50ec:$v2_1: %%SystemRoot%%\System32\svchost.exe -k "%s"
        • 0x515c:$v2_2: LoadFromMemory END---
        • 0x51d0:$v2_3: hmProxy!= NULL
        • 0x5284:$v2_4: Rundll32 "%s",DllUpdate %s
        • 0x5610:$v2_6: %d*%sMHz
        0.0.9JQ3JboYdz.exe.400000.0.unpackJoeSecurity_RunningRATYara detected RunningRATJoe Security
          Click to see the 3 entries

          System Summary

          barindex
          Source: Process startedAuthor: vburov: Data: Command: C:\Windows\SysWOW64\svchost.exe -k "SySe", CommandLine: C:\Windows\SysWOW64\svchost.exe -k "SySe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe -k "SySe", ProcessId: 6208, ProcessName: svchost.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-09-27T11:11:24.709461+020028148971Malware Command and Control Activity Detected192.168.2.649711124.221.255.1458506TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 9JQ3JboYdz.exeAvira: detected
          Source: C:\Program Files (x86)\4293750.dllAvira: detection malicious, Label: BDS/Backdoor.Gen7
          Source: 9JQ3JboYdz.exeReversingLabs: Detection: 94%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Program Files (x86)\4293750.dllJoe Sandbox ML: detected
          Source: 9JQ3JboYdz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: Binary string: rundll32.pdb source: svchost.exe, 00000003.00000003.2140658085.0000000002E2C000.00000004.00000020.00020000.00000000.sdmp, SySe.exe, SySe.exe, 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, SySe.exe.3.dr
          Source: Binary string: rundll32.pdbGCTL source: svchost.exe, 00000003.00000003.2140658085.0000000002E2C000.00000004.00000020.00020000.00000000.sdmp, SySe.exe, 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, SySe.exe.3.dr

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2814897 - Severity 1 - ETPRO MALWARE W32.YoungLotus Checkin : 192.168.2.6:49711 -> 124.221.255.145:8506
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 1
          Source: global trafficTCP traffic: 192.168.2.6:49711 -> 124.221.255.145:8506
          Source: Joe Sandbox ViewASN Name: JCN-AS-KRUlsanJung-AngBroadcastingNetworkKR JCN-AS-KRUlsanJung-AngBroadcastingNetworkKR
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_1000152B select,memset,recv,3_2_1000152B
          Source: global trafficDNS traffic detected: DNS query: www.sf2110.com

          E-Banking Fraud

          barindex
          Source: C:\Windows\SysWOW64\svchost.exeCode function: strlen,memset,lstrlenA,strstr,lstrcpyA,CreateProcessA, Applications\iexplore.exe\shell\open\command3_2_10002BC3

          System Summary

          barindex
          Source: 9JQ3JboYdz.exe, type: SAMPLEMatched rule: Detects Running RAT from Gold Dragon report Author: Florian Roth
          Source: 9JQ3JboYdz.exe, type: SAMPLEMatched rule: Detects RunningRAT Author: ditekSHen
          Source: 3.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects RunningRAT Author: ditekSHen
          Source: 0.2.9JQ3JboYdz.exe.4032a0.1.unpack, type: UNPACKEDPEMatched rule: Detects RunningRAT Author: ditekSHen
          Source: 7.2.SySe.exe.10000000.1.unpack, type: UNPACKEDPEMatched rule: Detects RunningRAT Author: ditekSHen
          Source: 0.2.9JQ3JboYdz.exe.4032a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RunningRAT Author: ditekSHen
          Source: 0.0.9JQ3JboYdz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Running RAT from Gold Dragon report Author: Florian Roth
          Source: 0.0.9JQ3JboYdz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RunningRAT Author: ditekSHen
          Source: 0.2.9JQ3JboYdz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RunningRAT Author: ditekSHen
          Source: C:\Program Files (x86)\4293750.dll, type: DROPPEDMatched rule: Detects RunningRAT Author: ditekSHen
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B640B1 NtQuerySystemInformation,7_2_00B640B1
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B65CF1 NtQueryInformationToken,NtQueryInformationToken,RtlNtStatusToDosError,7_2_00B65CF1
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B64136 HeapSetInformation,NtSetInformationProcess,AttachConsole,LocalAlloc,LoadLibraryExW,GetProcAddress,SetErrorMode,DestroyWindow,FreeLibrary,LocalFree,DeactivateActCtx,ReleaseActCtx,FreeLibrary,LocalFree,FreeConsole,ExitProcess,7_2_00B64136
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B65911 PathIsRelativeW,RtlSetSearchPathMode,SearchPathW,GetFileAttributesW,CreateActCtxW,CreateActCtxWWorker,CreateActCtxWWorker,CreateActCtxWWorker,GetModuleHandleW,CreateActCtxWWorker,ActivateActCtx,SetWindowLongW,GetWindowLongW,GetWindow,memset,GetClassNameW,CompareStringW,GetWindow,GetWindow,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,7_2_00B65911
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B65D6A NtOpenProcessToken,RtlNtStatusToDosError,NtClose,QueryActCtxW,NtOpenProcessToken,NtSetInformationToken,NtClose,7_2_00B65D6A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10001F48 strlen,OpenSCManagerA,OpenServiceA,DeleteService,CloseServiceHandle,CloseServiceHandle,3_2_10001F48
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10001FBD LoadLibraryA,GetProcAddress,memset,memset,GetCurrentProcess,OpenProcessToken,DuplicateTokenEx,WTSGetActiveConsoleSessionId,SetTokenInformation,CreateProcessAsUserA,CloseHandle,CloseHandle,FreeLibrary,3_2_10001FBD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_100025A2 ExitWindowsEx,3_2_100025A2
          Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Windows\SysWOW64\SySe.exeJump to behavior
          Source: 9JQ3JboYdz.exe, 00000000.00000000.2138518349.000000000040B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs 9JQ3JboYdz.exe
          Source: 9JQ3JboYdz.exe, 00000000.00000002.2165981379.00000000006BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs 9JQ3JboYdz.exe
          Source: 9JQ3JboYdz.exeBinary or memory string: OriginalFilename vs 9JQ3JboYdz.exe
          Source: 9JQ3JboYdz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 9JQ3JboYdz.exe, type: SAMPLEMatched rule: GoldDragon_RunningRAT date = 2018-02-03, hash3 = 7aa99ebc49a130f07304ed25655862a04cc20cb59d129e1416a7dfa04f7d3e51, hash2 = 2981e1a1b3c395cee6e4b9e6c46d062cf6130546b04401d724750e4c8382c863, hash1 = 0852f2c5741997d8899a34bb95c349d7a9fb7277cd0910656c3ce37a6f11cb88, author = Florian Roth, description = Detects Running RAT from Gold Dragon report, reference = https://goo.gl/rW1yvZ, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 9JQ3JboYdz.exe, type: SAMPLEMatched rule: MALWARE_Win_RunningRAT author = ditekSHen, description = Detects RunningRAT, clamav_sig = MALWARE.Win.Trojan.RunningRAT
          Source: 3.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RunningRAT author = ditekSHen, description = Detects RunningRAT, clamav_sig = MALWARE.Win.Trojan.RunningRAT
          Source: 0.2.9JQ3JboYdz.exe.4032a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RunningRAT author = ditekSHen, description = Detects RunningRAT, clamav_sig = MALWARE.Win.Trojan.RunningRAT
          Source: 7.2.SySe.exe.10000000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RunningRAT author = ditekSHen, description = Detects RunningRAT, clamav_sig = MALWARE.Win.Trojan.RunningRAT
          Source: 0.2.9JQ3JboYdz.exe.4032a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RunningRAT author = ditekSHen, description = Detects RunningRAT, clamav_sig = MALWARE.Win.Trojan.RunningRAT
          Source: 0.0.9JQ3JboYdz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: GoldDragon_RunningRAT date = 2018-02-03, hash3 = 7aa99ebc49a130f07304ed25655862a04cc20cb59d129e1416a7dfa04f7d3e51, hash2 = 2981e1a1b3c395cee6e4b9e6c46d062cf6130546b04401d724750e4c8382c863, hash1 = 0852f2c5741997d8899a34bb95c349d7a9fb7277cd0910656c3ce37a6f11cb88, author = Florian Roth, description = Detects Running RAT from Gold Dragon report, reference = https://goo.gl/rW1yvZ, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.0.9JQ3JboYdz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RunningRAT author = ditekSHen, description = Detects RunningRAT, clamav_sig = MALWARE.Win.Trojan.RunningRAT
          Source: 0.2.9JQ3JboYdz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RunningRAT author = ditekSHen, description = Detects RunningRAT, clamav_sig = MALWARE.Win.Trojan.RunningRAT
          Source: C:\Program Files (x86)\4293750.dll, type: DROPPEDMatched rule: MALWARE_Win_RunningRAT author = ditekSHen, description = Detects RunningRAT, clamav_sig = MALWARE.Win.Trojan.RunningRAT
          Source: classification engineClassification label: mal100.bank.troj.evad.winEXE@10/2@1/2
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B63C66 LoadLibraryExW,GetLastError,FormatMessageW,RtlImageNtHeader,SetProcessMitigationPolicy,7_2_00B63C66
          Source: C:\Windows\SysWOW64\svchost.exeCode function: OpenSCManagerA,_local_unwind2,CreateServiceA,GetLastError,OpenServiceA,StartServiceA,ChangeServiceConfig2A,ChangeServiceConfig2A,wsprintfA,strlen,StartServiceA,3_2_10001B5B
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeCode function: 0_2_00401794 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,CreateToolhelp32Snapshot,Process32First,Process32Next,lstrcmpiA,CloseHandle,FreeLibrary,0_2_00401794
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B6205A CoCreateInstance,7_2_00B6205A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10001A43 OpenSCManagerA,OpenServiceA,StartServiceA,GetLastError,CloseServiceHandle,QueryServiceStatus,Sleep,CloseServiceHandle,CloseServiceHandle,3_2_10001A43
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeFile created: C:\Program Files (x86)\4293750.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeMutant created: \Sessions\1\BaseNamedObjects\www.sf2110.com:8506:SySe
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6264:120:WilError_03
          Source: C:\Windows\SysWOW64\SySe.exeCommand line argument: WLDP.DLL7_2_00B64136
          Source: C:\Windows\SysWOW64\SySe.exeCommand line argument: localserver7_2_00B64136
          Source: 9JQ3JboYdz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 9JQ3JboYdz.exeReversingLabs: Detection: 94%
          Source: unknownProcess created: C:\Users\user\Desktop\9JQ3JboYdz.exe "C:\Users\user\Desktop\9JQ3JboYdz.exe"
          Source: unknownProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe -k "SySe"
          Source: unknownProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe -k "SySe"
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\user\Desktop\9JQ3JboYdz.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 1
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\SySe.exe C:\Windows\system32\SySe.exe "c:\program files (x86)\4293750.dll",MainThread
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\user\Desktop\9JQ3JboYdz.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\SySe.exe C:\Windows\system32\SySe.exe "c:\program files (x86)\4293750.dll",MainThreadJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 1Jump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: mfc42.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: devenum.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: devobj.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: msdmo.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
          Source: Binary string: rundll32.pdb source: svchost.exe, 00000003.00000003.2140658085.0000000002E2C000.00000004.00000020.00020000.00000000.sdmp, SySe.exe, SySe.exe, 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, SySe.exe.3.dr
          Source: Binary string: rundll32.pdbGCTL source: svchost.exe, 00000003.00000003.2140658085.0000000002E2C000.00000004.00000020.00020000.00000000.sdmp, SySe.exe, 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, SySe.exe.3.dr
          Source: SySe.exe.3.drStatic PE information: 0x6A8F1B39 [Wed Aug 26 16:58:33 2026 UTC]
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeCode function: 0_2_00401B6B LoadLibraryA,GetProcAddress,__p__pgmptr,sprintf,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,ShellExecuteA,0_2_00401B6B
          Source: SySe.exe.3.drStatic PE information: section name: .didat
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10004C68 push eax; ret 3_2_10004C86
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10004CA0 push eax; ret 3_2_10004CCE
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B66883 push ecx; ret 7_2_00B66896
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B6682D push ecx; ret 7_2_00B66840

          Persistence and Installation Behavior

          barindex
          Source: C:\Windows\SysWOW64\svchost.exeExecutable created and started: C:\Windows\SysWOW64\SySe.exeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Windows\SysWOW64\SySe.exeJump to dropped file
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeFile created: C:\Program Files (x86)\4293750.dllJump to dropped file
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeFile created: C:\Program Files (x86)\4293750.dllJump to dropped file
          Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Windows\SysWOW64\SySe.exeJump to dropped file
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SySeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10001A43 OpenSCManagerA,OpenServiceA,StartServiceA,GetLastError,CloseServiceHandle,QueryServiceStatus,Sleep,CloseServiceHandle,CloseServiceHandle,3_2_10001A43

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess created: "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\user\Desktop\9JQ3JboYdz.exe"
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess created: "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\user\Desktop\9JQ3JboYdz.exe"Jump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeCode function: 0_2_00402400 IsIconic,0_2_00402400
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_1000265E OpenEventLogA,ClearEventLogA,CloseEventLog,3_2_1000265E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10003E6B LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,3_2_10003E6B
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-373
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 1Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 2720Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 7277Jump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeWindow / User API: threadDelayed 1386Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-1603
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeDropped PE file which has not been started: C:\Program Files (x86)\4293750.dllJump to dropped file
          Source: C:\Windows\SysWOW64\svchost.exe TID: 3924Thread sleep count: 2720 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 3924Thread sleep time: -2720000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 3924Thread sleep count: 7277 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 3924Thread sleep time: -7277000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exe TID: 5004Thread sleep count: 1386 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\SySe.exe TID: 5004Thread sleep time: -693000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exe TID: 5004Thread sleep count: 105 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\SySe.exe TID: 5004Thread sleep time: -52500s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\SySe.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\SySe.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_1000358C GetSystemInfo,wsprintfA,3_2_1000358C
          Source: 9JQ3JboYdz.exe, 00000000.00000002.2165981379.00000000006BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\YVRO
          Source: SySe.exe, 00000007.00000002.4610196471.0000000000787000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Windows\SysWOW64\SySe.exeAPI call chain: ExitProcess graph end nodegraph_7-2033
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B65E4F LdrResolveDelayLoadedAPI,7_2_00B65E4F
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B625B2 GetCurrentThreadId,IsDebuggerPresent,OutputDebugStringW,7_2_00B625B2
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeCode function: 0_2_00401B6B LoadLibraryA,GetProcAddress,__p__pgmptr,sprintf,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,ShellExecuteA,0_2_00401B6B
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B63F6B mov esi, dword ptr fs:[00000030h]7_2_00B63F6B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10003D5D FreeLibrary,free,VirtualFree,GetProcessHeap,HeapFree,3_2_10003D5D
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B661C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00B661C0
          Source: C:\Windows\SysWOW64\SySe.exeCode function: 7_2_00B66510 SetUnhandledExceptionFilter,7_2_00B66510
          Source: C:\Users\user\Desktop\9JQ3JboYdz.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\user\Desktop\9JQ3JboYdz.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 1Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_1000304F wsprintfA,strlen,strlen,strlen,GetLocalTime,wsprintfA,strlen,3_2_1000304F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_1000336E ServiceMain,strncpy,wcstombs,RegisterServiceCtrlHandlerA,FreeConsole,GetVersionExA,MainThread,GetCurrentDirectoryA,lstrcatA,lstrcatA,lstrcatA,GetSystemDirectoryA,lstrcatA,CopyFileA,GetFileAttributesA,GetLastError,wsprintfA,GetModuleFileNameA,wsprintfA,Sleep,GetExitCodeProcess,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,3_2_1000336E
          Source: 9JQ3JboYdz.exeBinary or memory string: 360tray.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 9JQ3JboYdz.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.9JQ3JboYdz.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2138500502.0000000000403000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 9JQ3JboYdz.exe PID: 4364, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 9JQ3JboYdz.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.9JQ3JboYdz.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2138500502.0000000000403000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 9JQ3JboYdz.exe PID: 4364, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure1
          Valid Accounts
          11
          Native API
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Obfuscated Files or Information
          OS Credential Dumping1
          System Time Discovery
          Remote ServicesData from Local System1
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts2
          Command and Scripting Interpreter
          1
          Valid Accounts
          1
          Valid Accounts
          1
          Timestomp
          LSASS Memory1
          File and Directory Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts12
          Service Execution
          22
          Windows Service
          1
          Access Token Manipulation
          1
          DLL Side-Loading
          Security Account Manager4
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook22
          Windows Service
          1
          File Deletion
          NTDS31
          Security Software Discovery
          Distributed Component Object ModelInput Capture1
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
          Process Injection
          131
          Masquerading
          LSA Secrets1
          Virtualization/Sandbox Evasion
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Valid Accounts
          Cached Domain Credentials12
          Process Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Virtualization/Sandbox Evasion
          DCSync11
          Application Window Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Access Token Manipulation
          Proc Filesystem1
          Remote System Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
          Process Injection
          /etc/passwd and /etc/shadow1
          System Network Configuration Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
          Indicator Removal
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          9JQ3JboYdz.exe95%ReversingLabsWin32.Backdoor.Venik
          9JQ3JboYdz.exe100%AviraTR/AD.Farfli.qqkhu
          SourceDetectionScannerLabelLink
          C:\Program Files (x86)\4293750.dll100%AviraBDS/Backdoor.Gen7
          C:\Program Files (x86)\4293750.dll100%Joe Sandbox ML
          C:\Windows\SysWOW64\SySe.exe0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.sf2110.com
          124.221.255.145
          truetrue
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            124.221.255.145
            www.sf2110.comChina
            45361JCN-AS-KRUlsanJung-AngBroadcastingNetworkKRtrue
            IP
            127.0.0.1
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1520443
            Start date and time:2024-09-27 11:10:35 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 7s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:12
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:9JQ3JboYdz.exe
            renamed because original name is a hash value
            Original Sample Name:fb714d59bcb67c0910c8f4ee0c5f0e62.exe
            Detection:MAL
            Classification:mal100.bank.troj.evad.winEXE@10/2@1/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 22
            • Number of non-executed functions: 84
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • VT rate limit hit for: 9JQ3JboYdz.exe
            TimeTypeDescription
            05:12:04API Interceptor8342554x Sleep call for process: svchost.exe modified
            05:12:12API Interceptor1431x Sleep call for process: SySe.exe modified
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            JCN-AS-KRUlsanJung-AngBroadcastingNetworkKRhttp://www.dh91l.icu/Get hashmaliciousUnknownBrowse
            • 124.221.80.91
            https://qwehikd-asdu.xyz/Get hashmaliciousUnknownBrowse
            • 124.222.174.117
            https://geminishdw-dws.top/Get hashmaliciousUnknownBrowse
            • 124.221.80.91
            https://geminiqwc-sw.top/Get hashmaliciousUnknownBrowse
            • 124.221.80.91
            https://qwekorqw-eqo.top/Get hashmaliciousUnknownBrowse
            • 124.222.174.117
            https://qwoms-dei3.top/Get hashmaliciousUnknownBrowse
            • 124.220.205.65
            https://saihdqq-yadq.xyz/Get hashmaliciousUnknownBrowse
            • 124.220.205.65
            https://soqmd-gm.top/Get hashmaliciousUnknownBrowse
            • 124.221.80.91
            https://sklqms-dp3.top/Get hashmaliciousUnknownBrowse
            • 124.221.80.91
            https://dsldiqos-erqs.xyz/Get hashmaliciousUnknownBrowse
            • 124.220.203.60
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\Windows\SysWOW64\SySe.exe2Syx0ZLsgo.exeGet hashmaliciousRunningRATBrowse
              I6A09pYeTA.exeGet hashmaliciousRunningRATBrowse
                ExeFile (24).exeGet hashmaliciousRunningRATBrowse
                  ExeFile (119).exeGet hashmaliciousRunningRATBrowse
                    ExeFile (118).exeGet hashmaliciousRunningRATBrowse
                      ExeFile (20).exeGet hashmaliciousGh0stCringe, RunningRATBrowse
                        LisectAVT_2403002A_160.exeGet hashmaliciousGh0stCringe, GhostRat, Mimikatz, RunningRAT, XRedBrowse
                          dPs664opQr.exeGet hashmaliciousGh0stCringe, GhostRat, Mimikatz, RunningRATBrowse
                            SraTIeD668.exeGet hashmaliciousGh0stCringe, GhostRat, Mimikatz, RunningRATBrowse
                              S6FxbFJNYp.exeGet hashmaliciousGh0stCringe, GhostRat, Mimikatz, RunningRATBrowse
                                Process:C:\Users\user\Desktop\9JQ3JboYdz.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):26112
                                Entropy (8bit):6.0728598875843725
                                Encrypted:false
                                SSDEEP:384:8T9IWqIwt10zr6lXYhCRdkyurLmC2S1xJrQcWrH/RUAMO0MY0holUxHdlkq4tKDV:8ht+Izr6pqRrLuS1vzWpaGZHdqYDG
                                MD5:CB0426D467A62C8DC63180E84FE2FDD2
                                SHA1:15BF72ABB1C002DD3B67200BAC22310AAFAB6D9C
                                SHA-256:73B2AC758264A2822AE0C61A414648F37FA1FEC0C2EF125C51D7B1AD975220C8
                                SHA-512:24199C817521D24441B86957D9860407D47DBD3B6D0FFEDF602A9D6D1039ACE784AB01E4491785861929D7BC4BF633B90FD06C77B7201E238C4368C1307AB980
                                Malicious:true
                                Yara Hits:
                                • Rule: MALWARE_Win_RunningRAT, Description: Detects RunningRAT, Source: C:\Program Files (x86)\4293750.dll, Author: ditekSHen
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........d...d...d..#G...d..x...d..{...d..zx...d..{...d..{...d...d...d...d..d..:k...d...B...d...D...d..Rich.d..........PE..L....w.T...........!.....@...$.......N.......P......................................................................pZ.......T..d............................p.......................................................P..$............................text....?.......@.................. ..`.rdata.......P.......D..............@..@.data........`.......P..............@....reloc..d....p.......^..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\svchost.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):61440
                                Entropy (8bit):6.199746098562656
                                Encrypted:false
                                SSDEEP:1536:H9ykYCTdiHQKrFXmw2RQln5IUmDjoX6+:HlMHprF2nRQln5I
                                MD5:889B99C52A60DD49227C5E485A016679
                                SHA1:8FA889E456AA646A4D0A4349977430CE5FA5E2D7
                                SHA-256:6CBE0E1F046B13B29BFA26F8B368281D2DDA7EB9B718651D5856F22CC3E02910
                                SHA-512:08933106EAF338DD119C45CBF1F83E723AFF77CC0F8D3FC84E36253B1EB31557A54211D1D5D1CB58958188E32064D451F6C66A24B3963CCCD3DE07299AB90641
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: 2Syx0ZLsgo.exe, Detection: malicious, Browse
                                • Filename: I6A09pYeTA.exe, Detection: malicious, Browse
                                • Filename: ExeFile (24).exe, Detection: malicious, Browse
                                • Filename: ExeFile (119).exe, Detection: malicious, Browse
                                • Filename: ExeFile (118).exe, Detection: malicious, Browse
                                • Filename: ExeFile (20).exe, Detection: malicious, Browse
                                • Filename: LisectAVT_2403002A_160.exe, Detection: malicious, Browse
                                • Filename: dPs664opQr.exe, Detection: malicious, Browse
                                • Filename: SraTIeD668.exe, Detection: malicious, Browse
                                • Filename: S6FxbFJNYp.exe, Detection: malicious, Browse
                                Reputation:moderate, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i.....^...^...^.pb^...^.c._...^.c._...^...^c..^.c._...^.c._...^.c._...^.c.^...^.c._...^Rich...^........PE..L...9..j.................b...........a............@..........................@............@.............................................hg...................0..........T........................... ........................m..`....................text...La.......b.................. ..`.data................f..............@....idata...............h..............@..@.didat...............~..............@....rsrc...hg.......h..................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):5.246733903202193
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:9JQ3JboYdz.exe
                                File size:49'152 bytes
                                MD5:fb714d59bcb67c0910c8f4ee0c5f0e62
                                SHA1:f22ffe25d693ccf771b5ae60b373f4c74551b317
                                SHA256:25ad9ca13dc1ee44d8c3a3d0fba9365d9e9fd65db1411a0f720dd036d11911f3
                                SHA512:24dac934a89ab30379331251749947af7817ed4c661a5b247a12177d1c3c04593da274eeea9ebfb7c6f7329916f03eb2c6c0a2d18b99358d8d14b6de48a33393
                                SSDEEP:768:zynb12Aw5J6HC4kq5Jp9bjAzhyY55J+NStcEeUlyqgZl4p67GhPC:Ub1MsHz3JDwhyWr+N95OTga69
                                TLSH:6E236D01730470A6D75693726AFB922F84593EB20BB824CBF7D44D0E19F49D5B93A42B
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........9..tW..tW..tW..h[..tW..{...tW.DhY..tW..k]..tW..kS..tW..RS..tW..tV.[tW..R\..tW..rQ..tW.Rich.tW.........PE..L....w.T...........
                                Icon Hash:71b018dccec77331
                                Entrypoint:0x4028d2
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                DLL Characteristics:
                                Time Stamp:0x54FD77CC [Mon Mar 9 10:37:00 2015 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:24ffff844f7eed74e1f1064cc9840ba9
                                Instruction
                                push ebp
                                mov ebp, esp
                                push FFFFFFFFh
                                push 0040A070h
                                push 004028CCh
                                mov eax, dword ptr fs:[00000000h]
                                push eax
                                mov dword ptr fs:[00000000h], esp
                                sub esp, 68h
                                push ebx
                                push esi
                                push edi
                                mov dword ptr [ebp-18h], esp
                                xor ebx, ebx
                                mov dword ptr [ebp-04h], ebx
                                push 00000002h
                                call dword ptr [004031FCh]
                                pop ecx
                                or dword ptr [0040A298h], FFFFFFFFh
                                or dword ptr [0040A29Ch], FFFFFFFFh
                                call dword ptr [00403200h]
                                mov ecx, dword ptr [0040A28Ch]
                                mov dword ptr [eax], ecx
                                call dword ptr [00403204h]
                                mov ecx, dword ptr [0040A288h]
                                mov dword ptr [eax], ecx
                                mov eax, dword ptr [00403208h]
                                mov eax, dword ptr [eax]
                                mov dword ptr [0040A294h], eax
                                call 00007F589CBCA83Bh
                                cmp dword ptr [00409D60h], ebx
                                jne 00007F589CBCA72Eh
                                push 00402A54h
                                call dword ptr [0040320Ch]
                                pop ecx
                                call 00007F589CBCA80Dh
                                push 00403294h
                                push 00403290h
                                call 00007F589CBCA7F8h
                                mov eax, dword ptr [0040A284h]
                                mov dword ptr [ebp-6Ch], eax
                                lea eax, dword ptr [ebp-6Ch]
                                push eax
                                push dword ptr [0040A280h]
                                lea eax, dword ptr [ebp-64h]
                                push eax
                                lea eax, dword ptr [ebp-70h]
                                push eax
                                lea eax, dword ptr [ebp-60h]
                                push eax
                                call dword ptr [00403214h]
                                push 0040328Ch
                                push 00403280h
                                call 00007F589CBCA7C5h
                                Programming Language:
                                • [C++] VS98 (6.0) SP6 build 8804
                                • [EXP] VC++ 6.0 SP5 build 8804
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xa2a00x64.data
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xb0000xa98.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x30000x280.data
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x1b830x2000af004437d972dc872368f31fffd6aaa6False0.4327392578125data5.330045711780258IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .data0x30000x78b60x8000925d51730b9cce1ad4e9c44bb9cd6285False0.495697021484375data5.749651963507455IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0xb0000xa980x1000c41cc8dcf2debdfbcfbd52158b76ca73False0.26123046875data2.5169812284194717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0xb1600x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.33064516129032256
                                RT_ICON0xb4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.4391891891891892
                                RT_DIALOG0xb5980x1c6dataChineseChina0.5682819383259912
                                RT_GROUP_ICON0xb5700x22dataChineseChina1.0
                                RT_VERSION0xb7600x338dataFrenchFrance0.45024271844660196
                                DLLImport
                                MFC42.DLL
                                MSVCRT.dll_controlfp, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, _onexit, __dllonexit, _except_handler3, memset, __p__pgmptr, sprintf, memcpy, _access, __CxxFrameHandler, strstr, _setmbcp, _mkdir
                                KERNEL32.dllCloseHandle, CreateFileA, FreeLibrary, GetTickCount, GetFileAttributesA, ExpandEnvironmentStringsA, GetLastError, GetProcAddress, LoadLibraryA, lstrcpyA, GetCommandLineA, Sleep, lstrcmpiA, SetThreadPriority, GetCurrentThread, SetPriorityClass, GetCurrentProcess, GetModuleHandleA, GetStartupInfoA, WriteFile
                                USER32.dllSendMessageA, IsIconic, GetClientRect, EnableWindow, LoadIconA, GetSystemMetrics, wsprintfA, DrawIcon
                                Language of compilation systemCountry where language is spokenMap
                                ChineseChina
                                FrenchFrance
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-09-27T11:11:24.709461+02002814897ETPRO MALWARE W32.YoungLotus Checkin1192.168.2.649711124.221.255.1458506TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Sep 27, 2024 11:11:33.295403957 CEST497118506192.168.2.6124.221.255.145
                                Sep 27, 2024 11:11:33.300436974 CEST850649711124.221.255.145192.168.2.6
                                Sep 27, 2024 11:11:33.300549984 CEST497118506192.168.2.6124.221.255.145
                                Sep 27, 2024 11:11:34.042504072 CEST497118506192.168.2.6124.221.255.145
                                Sep 27, 2024 11:11:34.047379971 CEST850649711124.221.255.145192.168.2.6
                                Sep 27, 2024 11:11:48.026493073 CEST850649711124.221.255.145192.168.2.6
                                Sep 27, 2024 11:11:48.068775892 CEST497118506192.168.2.6124.221.255.145
                                Sep 27, 2024 11:12:48.895733118 CEST850649711124.221.255.145192.168.2.6
                                Sep 27, 2024 11:12:48.959527016 CEST497118506192.168.2.6124.221.255.145
                                Sep 27, 2024 11:13:49.696609974 CEST850649711124.221.255.145192.168.2.6
                                Sep 27, 2024 11:13:49.772106886 CEST497118506192.168.2.6124.221.255.145
                                Sep 27, 2024 11:14:50.545175076 CEST850649711124.221.255.145192.168.2.6
                                Sep 27, 2024 11:14:50.663079977 CEST497118506192.168.2.6124.221.255.145
                                TimestampSource PortDest PortSource IPDest IP
                                Sep 27, 2024 11:11:32.741568089 CEST6253753192.168.2.61.1.1.1
                                Sep 27, 2024 11:11:33.288966894 CEST53625371.1.1.1192.168.2.6
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Sep 27, 2024 11:11:32.741568089 CEST192.168.2.61.1.1.10xa90bStandard query (0)www.sf2110.comA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Sep 27, 2024 11:11:33.288966894 CEST1.1.1.1192.168.2.60xa90bNo error (0)www.sf2110.com124.221.255.145A (IP address)IN (0x0001)false

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:05:11:27
                                Start date:27/09/2024
                                Path:C:\Users\user\Desktop\9JQ3JboYdz.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\9JQ3JboYdz.exe"
                                Imagebase:0x400000
                                File size:49'152 bytes
                                MD5 hash:FB714D59BCB67C0910C8F4EE0C5F0E62
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RunningRAT, Description: Yara detected RunningRAT, Source: 00000000.00000000.2138500502.0000000000403000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:true

                                Target ID:1
                                Start time:05:11:27
                                Start date:27/09/2024
                                Path:C:\Windows\SysWOW64\svchost.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\svchost.exe -k "SySe"
                                Imagebase:0x860000
                                File size:46'504 bytes
                                MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:05:11:28
                                Start date:27/09/2024
                                Path:C:\Windows\SysWOW64\svchost.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\svchost.exe -k "SySe"
                                Imagebase:0x860000
                                File size:46'504 bytes
                                MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:false

                                Target ID:4
                                Start time:05:11:30
                                Start date:27/09/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\user\Desktop\9JQ3JboYdz.exe"
                                Imagebase:0x1c0000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:05:11:30
                                Start date:27/09/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff66e660000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:6
                                Start time:05:11:30
                                Start date:27/09/2024
                                Path:C:\Windows\SysWOW64\PING.EXE
                                Wow64 process (32bit):true
                                Commandline:ping 127.0.0.1 -n 1
                                Imagebase:0xa30000
                                File size:18'944 bytes
                                MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:7
                                Start time:05:11:32
                                Start date:27/09/2024
                                Path:C:\Windows\SysWOW64\SySe.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\system32\SySe.exe "c:\program files (x86)\4293750.dll",MainThread
                                Imagebase:0xb60000
                                File size:61'440 bytes
                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 0%, ReversingLabs
                                Reputation:high
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:28.6%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:7.3%
                                  Total number of Nodes:179
                                  Total number of Limit Nodes:4
                                  execution_graph 465 402240 470 402270 #693 #641 465->470 467 40224f 468 402262 467->468 471 401de0 #825 467->471 470->467 471->468 473 402ac0 #800 474 401d80 479 401db0 #815 474->479 476 401d8f 477 401da2 476->477 480 401de0 #825 476->480 479->476 480->477 481 401fc6 496 402400 IsIconic 481->496 483 401ff2 484 401ffa #470 483->484 485 4020af 483->485 487 40201a 484->487 500 402470 #2379 485->500 497 4023d0 SendMessageA 487->497 488 4020ba 490 402028 GetSystemMetrics GetSystemMetrics 491 402046 490->491 498 402420 GetClientRect 491->498 493 402055 499 4023a0 DrawIcon 493->499 495 40209e #755 495->488 496->483 497->490 498->493 499->495 500->488 501 4010ce 504 401db0 #815 501->504 503 4010db 504->503 505 402b0f #755 506 402550 #693 507 402572 506->507 508 402569 506->508 510 401de0 #825 508->510 510->507 358 4028d2 __set_app_type __p__fmode __p__commode 359 402941 358->359 360 402955 359->360 361 402949 __setusermatherr 359->361 370 402a42 _controlfp 360->370 361->360 363 40295a _initterm __getmainargs _initterm 364 4029ae GetStartupInfoA 363->364 366 4029e2 GetModuleHandleA 364->366 371 402a60 #1576 366->371 369 402a06 exit _XcptFilter 370->363 371->369 513 4020dc 516 4023d0 SendMessageA 513->516 515 4020f1 516->515 517 40109e 522 4010ad 517->522 528 40107d #561 522->528 524 4010a6 525 4010bc 524->525 529 40289c 525->529 528->524 532 402870 529->532 531 4010ab 533 402885 __dllonexit 532->533 534 402879 _onexit 532->534 533->531 534->531 535 4024a0 EnableWindow 536 402aa1 537 402aa6 536->537 540 402a78 #1168 537->540 541 402a92 _setmbcp 540->541 542 402a9b 540->542 541->542 543 402b22 546 4022c0 #800 543->546 549 402510 #641 546->549 548 402300 549->548 550 402a24 _exit 551 401eed 554 402490 551->554 553 401f00 #2302 554->553 556 401e70 #324 563 402530 #567 556->563 558 401eac 564 402310 #1168 558->564 560 401ec3 565 4024e0 #1146 LoadIconA 560->565 562 401eca 563->558 564->560 565->562 566 402af0 #641 567 402b70 570 402510 #641 567->570 569 402b78 570->569 372 401134 #2621 Sleep GetCommandLineA strstr Sleep 373 401305 10 API calls 372->373 374 4011bf wsprintfA 372->374 375 4013e2 CloseHandle Sleep GetProcAddress 373->375 376 4013cd GetLastError 373->376 434 401c18 6 API calls 374->434 385 40142d Sleep ExpandEnvironmentStringsA Sleep GetFileAttributesA 375->385 376->375 403 4013da 376->403 379 401212 lstrcpyA 382 401c18 8 API calls 379->382 380 4012db 440 401b6b 9 API calls 380->440 384 401247 wsprintfA 382->384 387 401c18 8 API calls 384->387 388 4014e2 GetTickCount wsprintfA Sleep 385->388 389 401466 385->389 386 4012fe 386->403 392 4012d7 387->392 419 401aee 388->419 390 401491 #537 389->390 393 401478 ExpandEnvironmentStringsA 389->393 441 4016eb 390->441 392->380 399 401aee 4 API calls 392->399 393->388 397 401528 451 401b6b 9 API calls 397->451 398 40153a Sleep 424 401794 LoadLibraryA GetProcAddress GetProcAddress GetProcAddress CreateToolhelp32Snapshot 398->424 399->380 400 4014e0 400->393 406 4015e0 Sleep GetProcAddress 409 401609 406->409 410 40160b 406->410 407 4016b3 408 4016d0 Sleep 407->408 433 401b6b 9 API calls 407->433 408->403 452 40187b LoadLibraryA GetProcAddress GetProcAddress GetProcAddress GetProcAddress 409->452 410->409 411 4016a6 FreeLibrary 410->411 415 401629 410->415 411->407 415->411 416 401688 417 401691 FreeLibrary 416->417 418 40169e Sleep 416->418 417->418 418->411 420 401b06 419->420 421 401b2f memcpy 420->421 423 40151f 420->423 458 401000 CreateFileA 421->458 423->397 423->398 425 401804 Process32First 424->425 426 401858 CloseHandle 424->426 429 401832 425->429 427 4015b2 LoadLibraryA 426->427 428 401868 FreeLibrary 426->428 427->406 427->407 428->427 429->426 430 401838 lstrcmpiA 429->430 432 401821 Process32Next 429->432 430->429 431 40184d 430->431 431->426 432->429 433->408 435 401ce4 434->435 436 401d14 lstrcpyA 435->436 437 401ce8 435->437 436->437 438 40120a 437->438 439 401d5b FreeLibrary 437->439 438->379 438->380 439->438 440->386 463 401e60 441->463 443 401713 _access 444 401722 443->444 445 4014bc #800 GetFileAttributesA 443->445 444->445 446 401730 #5683 #4129 444->446 445->388 445->400 447 4016eb 446->447 448 401763 #800 447->448 464 401e60 448->464 450 40177a _mkdir 450->445 451->403 453 40190f GetTickCount wsprintfA 452->453 455 401958 453->455 456 401972 FreeLibrary 455->456 457 401636 wsprintfA 455->457 456->457 457->416 459 401030 WriteFile 458->459 460 40102c 458->460 461 401052 CloseHandle 459->461 462 40104e 459->462 460->459 461->423 462->461 463->443 464->450 571 4020f5 #355 #2515 572 402166 571->572 573 40214f 571->573 584 402580 SendMessageA 572->584 574 4022c0 2 API calls 573->574 576 402161 574->576 577 402174 #540 #2818 578 4021a2 577->578 585 4025b0 #3998 578->585 580 4021b5 #3499 586 401e60 580->586 582 4021eb #6907 #800 #800 583 4022c0 2 API calls 582->583 583->576 584->577 585->580 586->582 587 401f35 #4710 596 402440 SendMessageA 587->596 589 401f58 597 402440 SendMessageA 589->597 591 401f6c #3996 598 4025e0 SendMessageA 591->598 593 401f93 #3996 599 4025e0 SendMessageA 593->599 595 401fbd 596->589 597->591 598->593 599->595 601 402af9 #693

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_00402240 28 Function_00401DE0 0->28 40 Function_00402270 0->40 1 Function_00401E40 2 Function_00402440 3 Function_004022C0 61 Function_00402510 3->61 4 Function_004024C0 5 Function_00402AC0 6 Function_00402A42 7 Function_00402B43 8 Function_00401FC6 12 Function_00402350 8->12 15 Function_004023D0 8->15 37 Function_00402470 8->37 42 Function_00402370 8->42 51 Function_00402400 8->51 68 Function_00402420 8->68 71 Function_00402320 8->71 72 Function_004023A0 8->72 80 Function_00402330 8->80 9 Function_004020C8 10 Function_00402ACC 11 Function_004010CE 81 Function_00401DB0 11->81 13 Function_00402550 13->28 14 Function_00402B50 16 Function_00401DD0 17 Function_004028D2 17->6 20 Function_00402A57 17->20 26 Function_00402A60 17->26 18 Function_00402A54 19 Function_00402AD6 21 Function_00402B59 22 Function_004020DC 22->15 23 Function_004010DD 24 Function_00402ADF 25 Function_00401E60 27 Function_004024E0 29 Function_004025E0 30 Function_00401063 31 Function_00401A63 55 Function_00401983 31->55 32 Function_00401B6B 33 Function_004016EB 33->25 33->33 69 Function_00401E20 33->69 34 Function_0040106D 35 Function_00401EED 59 Function_00402490 35->59 36 Function_00401AEE 36->23 36->31 50 Function_00401000 36->50 38 Function_00401E70 38->27 60 Function_00402310 38->60 79 Function_00402530 38->79 39 Function_00402870 41 Function_00402AF0 43 Function_00402B70 43->61 44 Function_004020F5 44->3 44->25 54 Function_00402580 44->54 82 Function_004025B0 44->82 45 Function_00402A78 46 Function_00402AF9 47 Function_00402B79 48 Function_0040187B 49 Function_0040107D 52 Function_00401E00 53 Function_00401D80 53->28 53->81 56 Function_00402B05 57 Function_00402B0F 58 Function_00401E10 62 Function_00401794 63 Function_00401C18 86 Function_00401D3A 63->86 64 Function_00402B18 65 Function_00401F1B 66 Function_0040289C 66->39 67 Function_0040109E 77 Function_004010AD 67->77 87 Function_004010BC 67->87 69->1 70 Function_004024A0 73 Function_00402AA1 73->45 74 Function_00402B22 74->3 75 Function_00402A24 76 Function_00401F25 77->49 78 Function_00402B2E 83 Function_00401134 83->32 83->33 83->36 83->48 83->62 83->63 84 Function_00401F35 84->2 84->29 85 Function_00402B37 87->66

                                  Control-flow Graph

                                  APIs
                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 004017A8
                                  • GetProcAddress.KERNEL32(?,CreateToolhelp32Snapshot), ref: 004017BA
                                  • GetProcAddress.KERNEL32(?,Process32First), ref: 004017CF
                                  • GetProcAddress.KERNEL32(?,Process32Next), ref: 004017E1
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004017F5
                                  • Process32First.KERNEL32(00000000,00000128), ref: 00401819
                                  • Process32Next.KERNEL32(00000000,00000128), ref: 0040182C
                                  • lstrcmpiA.KERNEL32(00000000,?), ref: 00401843
                                  • CloseHandle.KERNELBASE(00000000), ref: 0040185C
                                  • FreeLibrary.KERNEL32(00000000), ref: 0040186C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: AddressProc$LibraryProcess32$CloseCreateFirstFreeHandleLoadNextSnapshotToolhelp32lstrcmpi
                                  • String ID: CreateToolhelp32Snapshot$Process32First$Process32Next$kernel32.dll
                                  • API String ID: 653906424-4285911020
                                  • Opcode ID: 1fd417c11413756bd4715d1432974552d424e7ffcafe747e360662e6f791f9bc
                                  • Instruction ID: e698cd54efef0762fd02a762dd22e0b3df5000b7872fc78e3db917c3bca36737
                                  • Opcode Fuzzy Hash: 1fd417c11413756bd4715d1432974552d424e7ffcafe747e360662e6f791f9bc
                                  • Instruction Fuzzy Hash: 39210E75D41218EFDB10EFA0D949BEEBBB8FB48301F10846AE505B2290D7749B80CF54

                                  Control-flow Graph

                                  APIs
                                  • LoadLibraryA.KERNEL32(shell32.dll,?), ref: 00401B80
                                  • GetProcAddress.KERNEL32(?,ShellExecuteA), ref: 00401B98
                                  • __p__pgmptr.MSVCRT ref: 00401BBA
                                  • sprintf.MSVCRT ref: 00401BCF
                                  • GetCurrentProcess.KERNEL32(00000100), ref: 00401BDD
                                  • SetPriorityClass.KERNELBASE(00000000), ref: 00401BE4
                                  • GetCurrentThread.KERNEL32 ref: 00401BEC
                                  • SetThreadPriority.KERNELBASE(00000000), ref: 00401BF3
                                  • ShellExecuteA.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00401C10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: CurrentPriorityThread$AddressClassExecuteLibraryLoadProcProcessShell__p__pgmptrsprintf
                                  • String ID: /c ping 127.0.0.1 -n 1 && del /f/q "%s"$ShellExecuteA$cmd.exe$open$shell32.dll
                                  • API String ID: 239697722-3584563708
                                  • Opcode ID: 7249951d3074dcb4a7fe4bb46aef8e51ce1700dc43be1304f4320e222d999fe6
                                  • Instruction ID: 03b7caf6ff0ed763f8f9b181b84943af9cfe637eb8e7dbc85a8f0fb9157acd93
                                  • Opcode Fuzzy Hash: 7249951d3074dcb4a7fe4bb46aef8e51ce1700dc43be1304f4320e222d999fe6
                                  • Instruction Fuzzy Hash: 5A11A171E44208ABEB109FA4DD0ABD9BB7CAB08702F0000B5F645F61D1CBF45A848F69

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 401134-4011b9 #2621 Sleep GetCommandLineA strstr Sleep 1 401305-4013cb Sleep LoadLibraryA GetProcAddress Sleep LoadLibraryA GetProcAddress Sleep GetProcAddress wsprintfA CreateMutexA 0->1 2 4011bf-40120c wsprintfA call 401c18 0->2 3 4013e2-401464 CloseHandle Sleep GetProcAddress Sleep ExpandEnvironmentStringsA Sleep GetFileAttributesA 1->3 4 4013cd-4013d8 GetLastError 1->4 9 401212-4012d9 lstrcpyA call 401c18 wsprintfA call 401c18 2->9 10 4012df 2->10 19 4014e2-401526 GetTickCount wsprintfA Sleep call 401aee 3->19 20 401466-40146d 3->20 4->3 6 4013da-4013dd 4->6 8 4016da-4016ea 6->8 28 4012db 9->28 29 4012dd-4012ee call 401aee 9->29 12 4012f3-401300 call 401b6b 10->12 12->8 32 401528-401535 call 401b6b 19->32 33 40153a-4015b4 Sleep call 401794 19->33 21 401491-4014de #537 call 4016eb #800 GetFileAttributesA 20->21 22 40146f-401476 20->22 21->19 35 4014e0 21->35 22->21 25 401478-40148f ExpandEnvironmentStringsA 22->25 25->19 28->12 29->12 32->8 40 4015c0-4015da LoadLibraryA 33->40 41 4015b6 33->41 35->25 42 4015e0-401607 Sleep GetProcAddress 40->42 43 4016b3-4016ba 40->43 41->40 46 401609 42->46 47 40160b-401612 42->47 44 4016d0-4016d8 Sleep 43->44 45 4016bc-4016c3 43->45 44->8 45->44 48 4016c5-4016cb call 401b6b 45->48 49 40162b-40168f call 40187b wsprintfA 46->49 50 4016a6-4016ad FreeLibrary 47->50 51 401618-401627 47->51 48->44 58 401691-401698 FreeLibrary 49->58 59 40169e-4016a0 Sleep 49->59 50->43 51->49 56 401629 51->56 56->50 58->59 59->50
                                  APIs
                                  • #2621.MFC42 ref: 00401162
                                  • Sleep.KERNELBASE(00000000), ref: 0040116A
                                  • GetCommandLineA.KERNEL32 ref: 00401170
                                  • strstr.MSVCRT ref: 00401188
                                  • Sleep.KERNELBASE(00000000), ref: 004011AF
                                  • wsprintfA.USER32 ref: 004011DE
                                    • Part of subcall function 00401C18: memset.MSVCRT ref: 00401C59
                                    • Part of subcall function 00401C18: memset.MSVCRT ref: 00401C69
                                    • Part of subcall function 00401C18: LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 00401C76
                                    • Part of subcall function 00401C18: GetProcAddress.KERNEL32(?,RegOpenKeyExA), ref: 00401C8E
                                    • Part of subcall function 00401C18: GetProcAddress.KERNEL32(?,RegQueryValueExA), ref: 00401CA3
                                    • Part of subcall function 00401C18: GetProcAddress.KERNEL32(?,RegCloseKey), ref: 00401CB8
                                    • Part of subcall function 00401C18: FreeLibrary.KERNEL32(00000000), ref: 00401D62
                                  • lstrcpyA.KERNEL32(SySe,?,80000002,?,DisplayName,00000001,System Rete Da mula), ref: 0040121E
                                    • Part of subcall function 00401C18: lstrcpyA.KERNEL32(?,?), ref: 00401D1F
                                  • wsprintfA.USER32 ref: 0040125A
                                  • Sleep.KERNEL32(00000000), ref: 00401307
                                  • LoadLibraryA.KERNELBASE(shell32.dll), ref: 00401312
                                  • GetProcAddress.KERNEL32(?,ShellExecuteA), ref: 0040132A
                                  • Sleep.KERNELBASE(00000000), ref: 00401338
                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00401343
                                  • GetProcAddress.KERNEL32(?,CreateMutexA), ref: 0040135B
                                  • Sleep.KERNELBASE(00000001), ref: 00401369
                                  • GetProcAddress.KERNEL32(?,ReleaseMutex), ref: 0040137B
                                  • wsprintfA.USER32 ref: 004013A4
                                  • CreateMutexA.KERNELBASE(00000000,00000000,?), ref: 004013B8
                                  • GetLastError.KERNEL32 ref: 004013CD
                                  • CloseHandle.KERNEL32(00000000), ref: 004013F6
                                  • Sleep.KERNEL32(00000000), ref: 004013FE
                                  • GetProcAddress.KERNEL32(?,GetVersionExA), ref: 00401410
                                  • Sleep.KERNEL32(00000000), ref: 0040142F
                                  • ExpandEnvironmentStringsA.KERNEL32(%ProgramFiles%\,?,00000104), ref: 00401446
                                  • Sleep.KERNEL32(00000000), ref: 0040144E
                                  • GetFileAttributesA.KERNELBASE(?), ref: 0040145B
                                  • ExpandEnvironmentStringsA.KERNEL32(%Temp%\,?,00000104), ref: 00401489
                                  • #537.MFC42(?), ref: 0040149E
                                    • Part of subcall function 004016EB: _access.MSVCRT ref: 00401714
                                  • #800.MFC42(?,?), ref: 004014C9
                                  • GetFileAttributesA.KERNEL32(?,?,?), ref: 004014D5
                                  • GetTickCount.KERNEL32 ref: 004014E2
                                  • wsprintfA.USER32 ref: 004014FC
                                  • Sleep.KERNEL32(00000000), ref: 00401507
                                  • Sleep.KERNEL32(00000000,00000000), ref: 00401546
                                  • LoadLibraryA.KERNELBASE(00000000,360tray.exe), ref: 004015C7
                                  • Sleep.KERNELBASE(00000000), ref: 004015E2
                                  • GetProcAddress.KERNEL32(00000000,Install), ref: 004015F4
                                  • wsprintfA.USER32 ref: 00401662
                                  • FreeLibrary.KERNEL32(00000000), ref: 00401698
                                  • Sleep.KERNEL32(00000000), ref: 004016A0
                                  • FreeLibrary.KERNELBASE(00000000), ref: 004016AD
                                  • Sleep.KERNELBASE(00000000), ref: 004016D2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: Sleep$AddressProc$Library$wsprintf$Load$Free$AttributesEnvironmentExpandFileStringslstrcpymemset$#2621#537#800CloseCommandCountCreateErrorHandleLastLineMutexTick_accessstrstr
                                  • String ID: "%s",MainThread$%ProgramFiles%\$%Temp%\$%s%d.dll$%s:%d:%s$360tray.exe$CreateMutexA$Description$DisplayName$GUpdate$GetVersionExA$Install$ReleaseMutex$SYSTEM\CurrentControlSet\Services\%s$SYSTEM\CurrentControlSet\Services\%s\Parameters$ServiceDll$ShellExecuteA$SySe$System Rete Da mula$kernel32.dll$open$rundll32.exe$shell32.dll$www.sf2110.com
                                  • API String ID: 2440389195-460911923
                                  • Opcode ID: 33c2655f0df4c5bdb74095cc6ef8f893952d5ebb8828a241915ac991c88762e1
                                  • Instruction ID: 3e4d9021d073eed2ebaccca2140894c21fcc0a3ec56120faac2ae3b4723efbfb
                                  • Opcode Fuzzy Hash: 33c2655f0df4c5bdb74095cc6ef8f893952d5ebb8828a241915ac991c88762e1
                                  • Instruction Fuzzy Hash: 68E17E70945258DFEB20DB64CD49BDEBB79AB44306F0041EAE109B62E1CB795F84CF29

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                  • String ID:
                                  • API String ID: 801014965-0
                                  • Opcode ID: c6672fdfefc484d33459fe495202c256ca6675a5ab502eee85e92a4fdfc38f08
                                  • Instruction ID: 41b20fb36615245da369ed675267998572c4bc05a5f1d3210e4b8a6eebd3b03a
                                  • Opcode Fuzzy Hash: c6672fdfefc484d33459fe495202c256ca6675a5ab502eee85e92a4fdfc38f08
                                  • Instruction Fuzzy Hash: 1C415DB1A40308AFDB209FA4DA49A5ABFA8AB09711F20017FF451B73E1D7B84941CB59

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 92 401000-40102a CreateFileA 93 401030-40104c WriteFile 92->93 94 40102c 92->94 95 401052-401062 CloseHandle 93->95 96 40104e 93->96 94->93 96->95
                                  APIs
                                  • CreateFileA.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 0040101D
                                  • WriteFile.KERNELBASE(000000FF,004032A0,00006600,?,00000000), ref: 00401044
                                  • CloseHandle.KERNELBASE(000000FF), ref: 00401056
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: File$CloseCreateHandleWrite
                                  • String ID:
                                  • API String ID: 1065093856-0
                                  • Opcode ID: 503e30a7f5baba76d2006de02f8aabc9fecde34cd01d4e51a3acff696a7f97a2
                                  • Instruction ID: 0b57e97574c49083c60be4e0953d33bf3402ecf870afa031020ca03fe4ac14e9
                                  • Opcode Fuzzy Hash: 503e30a7f5baba76d2006de02f8aabc9fecde34cd01d4e51a3acff696a7f97a2
                                  • Instruction Fuzzy Hash: 36F06234E41348FBEB10DFA49D0AF9E7F785B04705F2081A4F6507B2C1C6B96B008B58

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 97 401aee-401b29 call 4010dd call 401a63 102 401b2b-401b2d 97->102 103 401b2f-401b4e memcpy call 401000 97->103 104 401b65-401b68 102->104 106 401b53-401b5d 103->106 107 401b63 106->107 108 401b5f-401b61 106->108 107->104 108->104
                                  APIs
                                  • memcpy.MSVCRT(-004032A0,www.sf2110.com,00000228,?,?,?,?,?,?,0040151F), ref: 00401B42
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: memcpy
                                  • String ID: www.sf2110.com
                                  • API String ID: 3510742995-1396719888
                                  • Opcode ID: 1d9d4e6a103436fa6d4a87c3801ee709b09ed6f15207dc39c5cfe36b8e263f2a
                                  • Instruction ID: 35b040e23320f7c57e1bee8842fc800d469dc723e7eedb9ee6c7bb718427654e
                                  • Opcode Fuzzy Hash: 1d9d4e6a103436fa6d4a87c3801ee709b09ed6f15207dc39c5cfe36b8e263f2a
                                  • Instruction Fuzzy Hash: CDF09671E80304B7EB10AE609D47B6A36685B21745F2040BBF904772D2F67E7725529D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 109 402a60-402a75 #1576
                                  APIs
                                  • #1576.MFC42(00402A06,00402A06,00402A06,00402A06,00402A06,00000000,?,0000000A), ref: 00402A70
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: #1576
                                  • String ID:
                                  • API String ID: 1976119259-0
                                  • Opcode ID: 371cf650558777b7497c1cc85ae61873b6a5021e63d3067b0ccf166c38b5e6e7
                                  • Instruction ID: 2e8f5fa0b2b7dc8462a5570c84725da21d48d42b60ee068d54710228b117be70
                                  • Opcode Fuzzy Hash: 371cf650558777b7497c1cc85ae61873b6a5021e63d3067b0ccf166c38b5e6e7
                                  • Instruction Fuzzy Hash: BFB00836118386ABCB12EE95890592ABAA6BB98304F484C1DB2A1500A287668428EB16
                                  APIs
                                  • IsIconic.USER32(E8844D8D), ref: 0040240E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: Iconic
                                  • String ID:
                                  • API String ID: 110040809-0
                                  • Opcode ID: 1ee85660d1dedbebd5f403de0e96ef1f5b119a627276ba2acc2b378afb4465c5
                                  • Instruction ID: 5de610e982ba27cc53666b937cb18e62fe31540b2012b128af7b5849c0221d0a
                                  • Opcode Fuzzy Hash: 1ee85660d1dedbebd5f403de0e96ef1f5b119a627276ba2acc2b378afb4465c5
                                  • Instruction Fuzzy Hash: 09C012B090820CAB8708CF98EA00C29BBACEB09301B0002DCF808933008A32AE009A98

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 110 40187b-401970 LoadLibraryA GetProcAddress * 4 GetTickCount wsprintfA 115 401972-401979 FreeLibrary 110->115 116 40197f-401982 110->116 115->116
                                  APIs
                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040188F
                                  • GetProcAddress.KERNEL32(?,GetModuleFileNameA), ref: 004018A7
                                  • GetProcAddress.KERNEL32(?,GetSystemDirectoryA), ref: 004018BF
                                  • GetProcAddress.KERNEL32(?,MoveFileA), ref: 004018D7
                                  • GetProcAddress.KERNEL32(?,MoveFileExA), ref: 004018EF
                                  • GetTickCount.KERNEL32 ref: 00401921
                                  • wsprintfA.USER32 ref: 0040193B
                                  • FreeLibrary.KERNEL32(00000000), ref: 00401979
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: AddressProc$Library$CountFreeLoadTickwsprintf
                                  • String ID: %s\%d.bak$GetModuleFileNameA$GetSystemDirectoryA$MoveFileA$MoveFileExA$kernel32.dll
                                  • API String ID: 2704705959-706646508
                                  • Opcode ID: 439d6103ebf8e8c0a2e54ea9977356cebfa60b531f2e9e129bb2cebecea63de2
                                  • Instruction ID: 278943a665a34f5de4912a77712433a3c03d867667eba4ba3f010f6a07107de3
                                  • Opcode Fuzzy Hash: 439d6103ebf8e8c0a2e54ea9977356cebfa60b531f2e9e129bb2cebecea63de2
                                  • Instruction Fuzzy Hash: B12151B5D85218ABEB20DF60CC8DBE9BB78EB54701F1041E5A649B2191DBB49FC0CF64

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 117 401c18-401ce6 memset * 2 LoadLibraryA GetProcAddress * 3 119 401ce8 117->119 120 401cea-401d12 117->120 121 401d2c-401d59 call 401d3a 119->121 120->121 124 401d14-401d25 lstrcpyA 120->124 127 401d68-401d7b 121->127 128 401d5b-401d62 FreeLibrary 121->128 124->121 128->127
                                  APIs
                                  • memset.MSVCRT ref: 00401C59
                                  • memset.MSVCRT ref: 00401C69
                                  • LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 00401C76
                                  • GetProcAddress.KERNEL32(?,RegOpenKeyExA), ref: 00401C8E
                                  • GetProcAddress.KERNEL32(?,RegQueryValueExA), ref: 00401CA3
                                  • GetProcAddress.KERNEL32(?,RegCloseKey), ref: 00401CB8
                                  • lstrcpyA.KERNEL32(?,?), ref: 00401D1F
                                  • FreeLibrary.KERNEL32(00000000), ref: 00401D62
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: AddressProc$Librarymemset$FreeLoadlstrcpy
                                  • String ID: ADVAPI32.dll$RegCloseKey$RegOpenKeyExA$RegQueryValueExA
                                  • API String ID: 3313493744-123098875
                                  • Opcode ID: 6cfc459c3633b96d3d6a7f6576698e4911ea3d3d1c7daab3c8c40142335194e9
                                  • Instruction ID: ee5ed84a35279ae09bc0a5aec9c8e8049356c5a81716acae3ba6bb287f67954d
                                  • Opcode Fuzzy Hash: 6cfc459c3633b96d3d6a7f6576698e4911ea3d3d1c7daab3c8c40142335194e9
                                  • Instruction Fuzzy Hash: 93314FB5940218ABDB10DF90DD85FDEBBB8AF48710F10416AF605B62D0D778AE44CF64

                                  Control-flow Graph

                                  APIs
                                  • #355.MFC42(00000000,00000000,00000000,00000004,All Files (*.*)|*.*||,?), ref: 00402133
                                  • #2515.MFC42(00000000,00000000,00000000,00000004,All Files (*.*)|*.*||,?), ref: 00402145
                                  • #540.MFC42(00000000,00000000,00000000,00000004,All Files (*.*)|*.*||,?), ref: 0040217A
                                  • #2818.MFC42(?,00409D58,?,00000000,00000000,00000000,00000004,All Files (*.*)|*.*||,?), ref: 00402190
                                  • #3499.MFC42(?,?,00000000,00000000,00000004,All Files (*.*)|*.*||,?), ref: 004021C5
                                  • #6907.MFC42(?,00000001,00000000,?,?,00000000,00000000,00000004,All Files (*.*)|*.*||,?), ref: 004021FB
                                  • #800.MFC42(?,00000001,00000000,?,?,00000000,00000000,00000004,All Files (*.*)|*.*||,?), ref: 0040220A
                                  • #800.MFC42(?,00000001,00000000,?,?,00000000,00000000,00000004,All Files (*.*)|*.*||,?), ref: 00402216
                                    • Part of subcall function 004022C0: #800.MFC42(?,00000000,00402B79,000000FF,?,0040222D,?,00000001,00000000,?,?,00000000), ref: 004022EC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: #800$#2515#2818#3499#355#540#6907
                                  • String ID: All Files (*.*)|*.*||
                                  • API String ID: 1584807323-1256402831
                                  • Opcode ID: 4922d2615448acd3483173aa7a39ffc0c03dd6e8f39ba40f8db02418d57e1958
                                  • Instruction ID: c5d4932d0e26176f48f047347bf5286b918a9edaf58949088f637132c46f74e5
                                  • Opcode Fuzzy Hash: 4922d2615448acd3483173aa7a39ffc0c03dd6e8f39ba40f8db02418d57e1958
                                  • Instruction Fuzzy Hash: D0316D7198011CABCB14EB94CE5ABEDB774BB10304F1042AEE115772C1DAB41E44CB69

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 144 4016eb-401720 call 401e60 _access 147 401722-40172c call 401e20 144->147 148 40172e 144->148 147->148 152 401730-401781 #5683 #4129 call 4016eb #800 call 401e60 _mkdir 147->152 150 401784-401791 148->150 152->150
                                  APIs
                                  • _access.MSVCRT ref: 00401714
                                  • #5683.MFC42(0000005C,?,?,?,?,?,?), ref: 00401735
                                  • #4129.MFC42(?,00000000,0000005C,?,?,?,?,?,?), ref: 00401742
                                  • #800.MFC42(?,00000000,0000005C,?,?,?,?,?), ref: 0040176D
                                  • _mkdir.MSVCRT ref: 0040177B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: #4129#5683#800_access_mkdir
                                  • String ID:
                                  • API String ID: 2252135049-0
                                  • Opcode ID: fe9398ada3c2d6f7717ef24858e2bc8e3691a59763239764df60b612b1b35ab5
                                  • Instruction ID: e64eea6ac71e0944d3c5090b23e1d4b3a6541fea866ff8cfdbd13ca0f40ae5ed
                                  • Opcode Fuzzy Hash: fe9398ada3c2d6f7717ef24858e2bc8e3691a59763239764df60b612b1b35ab5
                                  • Instruction Fuzzy Hash: A71160709001099BCB00EFA5CD45BAEBB79EB00354F10423EF826B72D0DB385A01CB99

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00402400: IsIconic.USER32(E8844D8D), ref: 0040240E
                                  • #470.MFC42(?), ref: 00402004
                                    • Part of subcall function 004023D0: SendMessageA.USER32(?,00000000,00000000,00000027), ref: 004023EA
                                  • GetSystemMetrics.USER32(0000000B), ref: 0040202A
                                  • GetSystemMetrics.USER32(0000000C), ref: 00402035
                                    • Part of subcall function 00402420: GetClientRect.USER32(?,U @), ref: 00402432
                                    • Part of subcall function 004023A0: DrawIcon.USER32(00000000,?,?,?), ref: 004023BA
                                  • #755.MFC42(?,?,?,?), ref: 004020A8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2165709493.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.2165685716.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165733449.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2165760094.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_9JQ3JboYdz.jbxd
                                  Similarity
                                  • API ID: MetricsSystem$#470#755ClientDrawIconIconicMessageRectSend
                                  • String ID:
                                  • API String ID: 2506822835-0
                                  • Opcode ID: 1c9899e63e8db84197f4d426d0ee9b49cb4c862dee0a21bfd3b4b5b287d3fdbe
                                  • Instruction ID: 4f4a8c447454e0b861ef3f698e30a861443d70d21ee0d95d9e798c61fe4189de
                                  • Opcode Fuzzy Hash: 1c9899e63e8db84197f4d426d0ee9b49cb4c862dee0a21bfd3b4b5b287d3fdbe
                                  • Instruction Fuzzy Hash: 15212D719001099BCB14EFB4DE4ABEDB774BB08304F14826EE515B32D1DF786904CB58

                                  Execution Graph

                                  Execution Coverage:9.9%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:15.8%
                                  Total number of Nodes:641
                                  Total number of Limit Nodes:4
                                  execution_graph 1303 10002182 1308 1000219e 1303->1308 1305 1000218a 1306 10002191 ??3@YAXPAX 1305->1306 1307 10002198 1305->1307 1306->1307 1309 100021a8 __EH_prolog 1308->1309 1310 100021e5 ctype 1309->1310 1311 100021c7 TerminateThread 1309->1311 1310->1305 1311->1309 1312 10004c46 ??1type_info@@UAE 1313 10004c55 ??3@YAXPAX 1312->1313 1314 10004c5c 1312->1314 1313->1314 1245 10004e0a 1246 10004e1d 1245->1246 1251 10004e26 1245->1251 1248 10004e4e 1246->1248 1260 10003822 1246->1260 1247 10004e42 1264 10004d5f 1247->1264 1251->1246 1251->1247 1251->1248 1254 10004e6e 1254->1248 1255 10004e77 1254->1255 1257 10004d5f 3 API calls 1255->1257 1256 10004e66 1258 10004d5f 3 API calls 1256->1258 1259 10004e7f 1257->1259 1258->1254 1259->1248 1261 10003832 1260->1261 1262 1000383c 1260->1262 1271 10003e6b 1261->1271 1262->1248 1262->1254 1262->1256 1265 10004d67 1264->1265 1266 10004dc7 1265->1266 1267 10004d88 malloc 1265->1267 1268 10004d9d 1265->1268 1266->1268 1270 10004df4 free 1266->1270 1267->1268 1269 10004da1 _initterm 1267->1269 1268->1246 1269->1268 1270->1268 1272 10003e74 1271->1272 1273 10003e78 71 API calls 1271->1273 1272->1262 1273->1262 1315 1000428a 1321 10004c68 1315->1321 1317 10004294 memcpy SetEvent 1318 100042c4 1317->1318 1319 100042ca 1317->1319 1322 10004467 LoadLibraryA GetProcAddress GetProcAddress GetProcAddress 1318->1322 1321->1317 1323 100044d9 1322->1323 1325 100044ef 1323->1325 1328 10004369 7 API calls 1323->1328 1332 1000451a 1325->1332 1329 100043ea 1328->1329 1335 1000444c 1329->1335 1333 10004506 1332->1333 1334 1000451f FreeLibrary 1332->1334 1333->1319 1334->1333 1336 10004450 FreeLibrary 1335->1336 1337 10004457 1335->1337 1336->1337 1338 10004437 1337->1338 1339 1000445d FreeLibrary 1337->1339 1338->1325 1339->1338 1340 100025ca memcpy MessageBoxA 1341 10001014 1346 10001030 1341->1346 1344 10001023 ??3@YAXPAX 1345 1000102a 1344->1345 1347 1000101c 1346->1347 1348 1000103d VirtualFree 1346->1348 1347->1344 1347->1345 1348->1347 1349 10002c96 strlen 1350 10002d31 1349->1350 1351 10002cad ??2@YAPAXI memcpy strrchr 1349->1351 1352 10002d24 1351->1352 1353 10002cd5 1351->1353 1355 10002d26 ??3@YAXPAX 1352->1355 1360 10004529 LoadLibraryA GetProcAddress 1353->1360 1355->1350 1359 10002ced CreateProcessA 1359->1355 1361 10004571 1360->1361 1362 10004597 1361->1362 1363 10004578 GetProcAddress 1361->1363 1364 10002cdc 1362->1364 1365 1000459b FreeLibrary 1362->1365 1366 10004590 1363->1366 1364->1352 1375 1000248b GetFileAttributesA 1364->1375 1365->1364 1366->1362 1370 100045a9 1366->1370 1367 10004637 Sleep GetProcAddress 1369 1000464e 1367->1369 1368 100045ca memset GetProcAddress 1368->1370 1369->1364 1372 10004657 FreeLibrary 1369->1372 1370->1367 1370->1368 1371 10004606 WriteFile 1370->1371 1373 10004628 1370->1373 1371->1370 1374 1000462b CloseHandle 1371->1374 1372->1364 1373->1374 1374->1367 1376 100024a5 1375->1376 1377 1000249a GetLastError 1375->1377 1376->1352 1376->1359 1377->1376 1378 10002d99 1379 10003e12 1378->1379 1380 10003e29 FreeLibrary 1379->1380 1381 10003e2c 1379->1381 1380->1381 1382 10003e33 FreeLibrary 1381->1382 1383 10003e36 1381->1383 1382->1383 1384 10003e40 1383->1384 1385 10003e3d FreeLibrary 1383->1385 1386 10003e47 FreeLibrary 1384->1386 1387 10003e4a 1384->1387 1385->1384 1386->1387 1388 10003e51 FreeLibrary 1387->1388 1389 10003e54 1387->1389 1388->1389 1390 10003e5b FreeLibrary 1389->1390 1391 10003e5e 1389->1391 1390->1391 1392 1000139a 1397 100013b6 1392->1397 1395 100013b0 1396 100013a9 ??3@YAXPAX 1396->1395 1412 10004c68 1397->1412 1399 100013c0 WaitForSingleObject 1400 100013f0 WSACleanup 1399->1400 1401 100013e9 1399->1401 1404 10001030 ctype VirtualFree 1400->1404 1413 1000180a setsockopt CancelIo InterlockedExchange closesocket SetEvent 1401->1413 1405 10001414 1404->1405 1406 10001030 ctype VirtualFree 1405->1406 1407 10001420 1406->1407 1408 10001030 ctype VirtualFree 1407->1408 1409 1000142c 1408->1409 1410 10001030 ctype VirtualFree 1409->1410 1411 100013a2 1410->1411 1411->1395 1411->1396 1412->1399 1413->1400 1414 1000389c 1415 100038b3 1414->1415 1426 100039ab 1414->1426 1416 100038c4 VirtualAlloc 1415->1416 1415->1426 1417 100038e1 VirtualAlloc 1416->1417 1418 100038f5 GetProcessHeap HeapAlloc VirtualAlloc VirtualAlloc memcpy 1416->1418 1417->1418 1417->1426 1427 100039ba 1418->1427 1420 10003961 1432 10003b9e LoadLibraryA GetProcAddress 1420->1432 1423 10003988 1423->1426 1445 10003d5d 1423->1445 1428 100039e3 1427->1428 1429 10003a62 1427->1429 1428->1429 1430 10003a25 VirtualAlloc memcpy 1428->1430 1431 10003a05 VirtualAlloc memset 1428->1431 1429->1420 1430->1428 1431->1428 1433 10003cb5 1432->1433 1438 10003be6 1432->1438 1434 10003cc4 FreeLibrary 1433->1434 1435 1000397d 1433->1435 1434->1435 1435->1423 1440 10003a67 1435->1440 1436 10003c0a LoadLibraryA 1436->1433 1437 10003c1e realloc 1436->1437 1437->1433 1437->1438 1438->1433 1438->1436 1439 10003c81 GetProcAddress 1438->1439 1439->1438 1441 10003b1f 1440->1441 1443 10003a88 1440->1443 1441->1423 1442 10003aad VirtualFree 1442->1443 1443->1441 1443->1442 1444 10003af8 VirtualProtect 1443->1444 1444->1443 1446 10003dd3 1445->1446 1447 10003d69 1445->1447 1446->1426 1448 10003db0 1447->1448 1449 10003da5 free 1447->1449 1452 10003d98 FreeLibrary 1447->1452 1450 10003dc4 GetProcessHeap HeapFree 1448->1450 1451 10003db7 VirtualFree 1448->1451 1449->1448 1450->1446 1451->1450 1452->1447 1453 1000315d 1457 100042ee CreateEventA _beginthreadex WaitForSingleObject CloseHandle 1453->1457 1455 10003170 WaitForSingleObject 1456 10003185 1455->1456 1457->1455 1458 10002d9e 1459 10002da8 __EH_prolog 1458->1459 1460 10002db2 wsprintfA CreateMutexA 1459->1460 1461 10002df0 GetLastError 1460->1461 1462 10002e12 1460->1462 1461->1462 1463 10002dfd ReleaseMutex 1461->1463 1483 100012d4 1462->1483 1465 10002e0b 1463->1465 1466 10002e28 rand Sleep 1467 10002e3d lstrcatA strcmp 1466->1467 1468 10002e84 GetTickCount 1467->1468 1475 10002e1b 1467->1475 1486 10001445 1468->1486 1470 10002ea6 GetTickCount 1496 10002144 1470->1496 1473 10002f0a WaitForSingleObject Sleep 1473->1475 1475->1466 1475->1467 1475->1470 1475->1473 1476 10002f33 1475->1476 1477 1000219e ctype TerminateThread 1475->1477 1501 100036ba memset wsprintfA lstrlenA 1475->1501 1517 1000180a setsockopt CancelIo InterlockedExchange closesocket SetEvent 1475->1517 1518 1000180a setsockopt CancelIo InterlockedExchange closesocket SetEvent 1476->1518 1477->1475 1479 10002f3b 1480 1000219e ctype TerminateThread 1479->1480 1481 10002f4a 1480->1481 1482 100013b6 ctype 8 API calls 1481->1482 1482->1465 1484 100012de __EH_prolog 1483->1484 1485 1000131c _CxxThrowException WSAStartup CreateEventA memcpy 1484->1485 1485->1475 1519 1000180a setsockopt CancelIo InterlockedExchange closesocket SetEvent 1486->1519 1488 10001455 ResetEvent socket 1489 10001477 gethostbyname 1488->1489 1495 100014b7 1488->1495 1490 10001486 htons connect 1489->1490 1489->1495 1491 100014bb setsockopt 1490->1491 1490->1495 1492 10001508 1491->1492 1493 100014db WSAIoctl 1491->1493 1520 100042ee CreateEventA _beginthreadex WaitForSingleObject CloseHandle 1492->1520 1493->1492 1495->1475 1521 10003842 1496->1521 1498 10002150 1499 1000216c 1498->1499 1500 1000215d lstrcpyA 1498->1500 1499->1475 1500->1499 1525 10004822 9 API calls 1501->1525 1507 100037a4 GlobalMemoryStatusEx 1508 100037c4 1507->1508 1544 100031d2 6 API calls 1508->1544 1517->1475 1518->1479 1519->1488 1520->1495 1524 10001a39 1521->1524 1523 10003858 CreateEventA 1523->1498 1524->1523 1526 100048f8 1525->1526 1527 100048fc 1526->1527 1531 100049aa 1526->1531 1533 1000499f 1526->1533 1534 10004932 1526->1534 1528 1000372e memset getsockname memcpy 1527->1528 1529 10004a5d FreeLibrary 1527->1529 1536 100035ea 1528->1536 1529->1528 1530 10004a3b lstrcpyA 1530->1527 1531->1527 1532 10004a04 wsprintfA 1531->1532 1532->1527 1533->1527 1533->1530 1534->1527 1534->1533 1535 1000498f strchr 1534->1535 1535->1534 1537 10004822 13 API calls 1536->1537 1538 1000360b lstrlenA 1537->1538 1539 10003627 GetVersionExA 1538->1539 1540 1000361b gethostname 1538->1540 1541 1000358c 1539->1541 1540->1539 1542 10004822 13 API calls 1541->1542 1543 100035c2 GetSystemInfo wsprintfA 1542->1543 1543->1507 1548 1000322b 1544->1548 1545 1000325d 1550 1000366a LoadLibraryA GetProcAddress GetProcAddress 1545->1550 1546 100032e2 FreeLibrary 1547 100032e5 1546->1547 1547->1545 1549 100032ea FreeLibrary 1547->1549 1548->1545 1548->1546 1548->1547 1549->1545 1551 1000369e 1550->1551 1552 100036b2 1551->1552 1553 100036ab FreeLibrary 1551->1553 1554 10003629 1552->1554 1553->1552 1555 10004822 13 API calls 1554->1555 1556 1000364a lstrlenA 1555->1556 1557 10003668 lstrcpyA 1556->1557 1558 1000365a lstrcpyA 1556->1558 1559 10001863 1557->1559 1558->1557 1588 100012a4 1559->1588 1562 10001883 ??2@YAPAXI 1564 10001895 memcpy 1562->1564 1565 10001978 1562->1565 1563 1000193a 1566 1000104c 6 API calls 1563->1566 1591 1000104c 1564->1591 1565->1475 1568 10001947 1566->1568 1570 100012a4 VirtualFree 1568->1570 1572 1000194f 1570->1572 1571 1000104c 6 API calls 1573 100018c4 1571->1573 1574 1000104c 6 API calls 1572->1574 1575 1000104c 6 API calls 1573->1575 1579 1000195a 1574->1579 1576 100018d1 1575->1576 1577 1000104c 6 API calls 1576->1577 1578 100018e5 1577->1578 1580 1000104c 6 API calls 1578->1580 1597 1000199f 1579->1597 1581 100018f0 ??3@YAXPAX ??2@YAPAXI memcpy 1580->1581 1583 100012a4 VirtualFree 1581->1583 1584 1000191c 1583->1584 1585 1000104c 6 API calls 1584->1585 1586 10001929 1585->1586 1586->1579 1587 1000192f ??3@YAXPAX 1586->1587 1587->1579 1589 100012bc 1588->1589 1590 100012ae VirtualFree 1588->1590 1589->1562 1589->1563 1590->1589 1592 10001055 1591->1592 1604 10001155 1592->1604 1595 10001068 1595->1571 1596 1000106c memcpy 1596->1595 1598 100019b5 1597->1598 1600 100019ca send 1598->1600 1601 100019ff 1598->1601 1602 10001a1f 1598->1602 1603 100019ea Sleep 1598->1603 1599 10001a06 send 1599->1601 1599->1602 1600->1598 1601->1599 1601->1602 1602->1565 1603->1598 1603->1601 1605 10001164 1604->1605 1606 10001172 ceil _ftol VirtualAlloc 1605->1606 1607 10001063 1605->1607 1606->1607 1608 100011b4 1606->1608 1607->1595 1607->1596 1609 100011c2 memcpy 1608->1609 1610 100011cf 1608->1610 1609->1610 1610->1607 1611 100011d6 VirtualFree 1610->1611 1611->1607 1612 10002f67 1617 100020c8 6 API calls 1612->1617 1614 10002f6c 1618 10001f48 strlen 1614->1618 1617->1614 1619 10001f58 1618->1619 1627 10001fb6 1618->1627 1628 10001acf OpenSCManagerA 1619->1628 1622 10001fa1 1638 10004a93 7 API calls 1622->1638 1623 10001f77 OpenServiceA 1624 10001f99 CloseServiceHandle 1623->1624 1625 10001f8b DeleteService CloseServiceHandle 1623->1625 1624->1622 1625->1624 1629 10001b56 OpenSCManagerA 1628->1629 1630 10001aeb OpenServiceA 1628->1630 1629->1622 1629->1623 1631 10001b01 QueryServiceStatus 1630->1631 1632 10001b49 CloseServiceHandle 1630->1632 1633 10001b10 1631->1633 1634 10001b42 CloseServiceHandle 1631->1634 1632->1629 1633->1634 1635 10001b16 ControlService 1633->1635 1634->1632 1635->1634 1636 10001b27 1635->1636 1636->1634 1637 10001b2d Sleep QueryServiceStatus 1636->1637 1637->1636 1642 10004b1d 1638->1642 1639 10004c01 FreeLibrary 1640 10004c08 1639->1640 1640->1627 1641 10004bd0 lstrlenA 1643 10004b20 1641->1643 1642->1641 1642->1643 1643->1639 1643->1640 1644 1000152b 1645 10001538 1644->1645 1646 10001563 select 1645->1646 1648 10001590 memset recv 1645->1648 1650 100015eb 1645->1650 1652 10001603 1645->1652 1646->1645 1647 100015ed 1646->1647 1679 1000180a setsockopt CancelIo InterlockedExchange closesocket SetEvent 1647->1679 1648->1645 1648->1647 1653 1000160d __EH_prolog 1652->1653 1654 10001672 1653->1654 1655 1000162c memcmp 1653->1655 1656 1000104c 6 API calls 1654->1656 1655->1654 1657 10001641 1655->1657 1667 10001680 1656->1667 1659 10001863 16 API calls 1657->1659 1658 10001661 1658->1645 1659->1658 1660 10001697 memcpy memcmp 1661 100016b9 _CxxThrowException 1660->1661 1660->1667 1661->1667 1662 100016da memcpy 1662->1658 1662->1667 1663 100010cf 6 API calls 1663->1667 1666 100017bd _CxxThrowException 1668 100017e2 1666->1668 1669 100017d9 ??3@YAXPAX 1666->1669 1667->1658 1667->1660 1667->1662 1667->1663 1667->1666 1673 100017a4 ??3@YAXPAX ??3@YAXPAX 1667->1673 1675 100012a4 VirtualFree 1667->1675 1678 1000104c 6 API calls 1667->1678 1680 100010cf 1667->1680 1670 100017f0 1668->1670 1671 100017e7 ??3@YAXPAX 1668->1671 1669->1668 1672 100012a4 VirtualFree 1670->1672 1671->1670 1674 100017fb 1672->1674 1673->1667 1676 10001863 16 API calls 1674->1676 1675->1667 1677 10001804 1676->1677 1677->1645 1678->1667 1679->1650 1683 100010d8 1680->1683 1681 100010e0 ??2@YAPAXI ??2@YAPAXI 1681->1666 1681->1667 1682 100010fc memcpy 1684 10001117 1682->1684 1683->1681 1683->1682 1683->1684 1686 100011fb 1684->1686 1687 1000120a 1686->1687 1688 10001211 ceil _ftol 1687->1688 1689 10001243 1687->1689 1690 1000123f 1688->1690 1689->1681 1690->1689 1691 10001247 VirtualAlloc 1690->1691 1691->1689 1692 10001262 1691->1692 1693 10001270 memcpy 1692->1693 1694 1000127d VirtualFree 1692->1694 1693->1694 1694->1689 1695 100024ac printf 1696 100024c4 printf 1695->1696 1698 100024d3 1695->1698 1697 1000257f 1696->1697 1699 100024ef memset memcpy ??2@YAPAXI memcpy 1698->1699 1710 1000389d 1699->1710 1702 10002540 1723 10003cd2 1702->1723 1703 10002532 printf 1704 10002559 1703->1704 1707 10002560 ??3@YAXPAX 1704->1707 1708 10002567 printf 1704->1708 1707->1708 1708->1697 1709 10003d5d 5 API calls 1709->1704 1711 100038b3 1710->1711 1722 10002526 1710->1722 1712 100038c4 VirtualAlloc 1711->1712 1711->1722 1713 100038e1 VirtualAlloc 1712->1713 1714 100038f5 GetProcessHeap HeapAlloc VirtualAlloc VirtualAlloc memcpy 1712->1714 1713->1714 1713->1722 1715 100039ba 4 API calls 1714->1715 1716 10003961 1715->1716 1717 10003b9e 6 API calls 1716->1717 1718 1000397d 1717->1718 1719 10003988 1718->1719 1720 10003a67 2 API calls 1718->1720 1721 10003d5d 5 API calls 1719->1721 1719->1722 1720->1719 1721->1722 1722->1702 1722->1703 1725 1000254b 1723->1725 1726 10003cee 1723->1726 1724 10003d15 _stricmp 1724->1725 1724->1726 1725->1709 1726->1724 1726->1725 1727 1000246d 1730 100023fa printf 1727->1730 1731 1000389d 24 API calls 1730->1731 1732 10002414 1731->1732 1733 10002429 1732->1733 1734 1000241c OutputDebugStringA 1732->1734 1736 10003cd2 _stricmp 1733->1736 1735 10002448 printf 1734->1735 1737 10002468 1735->1737 1738 10002458 VirtualFree 1735->1738 1739 10002434 1736->1739 1738->1737 1740 10003d5d 5 API calls 1739->1740 1741 10002445 1740->1741 1741->1735 1274 1000336e strncpy wcstombs RegisterServiceCtrlHandlerA 1275 10003585 1274->1275 1276 100033c6 FreeConsole 1274->1276 1294 1000318a SetServiceStatus 1276->1294 1278 100033d6 1295 1000318a SetServiceStatus 1278->1295 1280 100033df GetVersionExA 1281 10003566 Sleep 1280->1281 1282 10003406 1280->1282 1281->1275 1283 10003578 1281->1283 1284 10003419 8 API calls 1282->1284 1285 1000340f MainThread 1282->1285 1283->1275 1283->1281 1286 100034aa GetLastError 1284->1286 1287 100034cb GetModuleFileNameA wsprintfA 1284->1287 1285->1281 1286->1287 1288 100034b5 wsprintfA 1286->1288 1289 10003507 Sleep GetExitCodeProcess 1287->1289 1288->1287 1290 10003526 1289->1290 1290->1289 1291 10003556 WaitForSingleObject 1290->1291 1292 1000352d Sleep 1290->1292 1291->1281 1296 10001fbd 7 API calls 1292->1296 1294->1278 1295->1280 1297 10002059 SetTokenInformation 1296->1297 1302 100020a6 1296->1302 1301 10002079 CreateProcessAsUserA 1297->1301 1298 100020c1 1298->1290 1299 100020b8 FreeLibrary 1299->1298 1301->1302 1302->1298 1302->1299 1742 1000386e 1743 10003876 ctype 1742->1743 1744 10003884 1743->1744 1745 1000387d ??3@YAXPAX 1743->1745 1745->1744 1746 10003134 1751 10001e37 1746->1751 1771 10004c68 1751->1771 1753 10001e41 wsprintfA 1772 10001b5b OpenSCManagerA 1753->1772 1756 10004a93 9 API calls 1757 10001ede memset lstrcpyA lstrlenA 1756->1757 1758 10004a93 9 API calls 1757->1758 1759 10001f23 1758->1759 1784 10001a43 OpenSCManagerA 1759->1784 1762 1000304f wsprintfA strlen 1763 1000308c strlen 1762->1763 1764 100030ad strlen 1762->1764 1766 10004a93 9 API calls 1763->1766 1765 10004a93 9 API calls 1764->1765 1768 100030d0 GetLocalTime wsprintfA strlen 1765->1768 1767 100030aa 1766->1767 1767->1764 1769 10004a93 9 API calls 1768->1769 1770 1000312c 1769->1770 1771->1753 1773 10001ba3 _local_unwind2 1772->1773 1774 10001bb8 CreateServiceA 1772->1774 1775 10001e06 wsprintfA strlen 1773->1775 1776 10001c25 ChangeServiceConfig2A ChangeServiceConfig2A wsprintfA strlen 1774->1776 1777 10001bf5 GetLastError 1774->1777 1775->1756 1778 10004a93 9 API calls 1776->1778 1777->1776 1779 10001c02 OpenServiceA 1777->1779 1782 10001dea StartServiceA 1778->1782 1780 10001c1c StartServiceA 1779->1780 1781 10001dfa 1779->1781 1780->1776 1796 10001e1d 1781->1796 1782->1781 1785 10001a60 OpenServiceA 1784->1785 1786 10001ac8 1784->1786 1787 10001ac1 1785->1787 1788 10001a75 StartServiceA 1785->1788 1786->1762 1789 10001ac2 CloseServiceHandle 1787->1789 1788->1786 1790 10001a84 GetLastError 1788->1790 1789->1786 1791 10001a91 CloseServiceHandle 1790->1791 1792 10001a9b QueryServiceStatus 1790->1792 1791->1789 1793 10001aba CloseServiceHandle 1792->1793 1794 10001aaa 1792->1794 1793->1787 1794->1793 1795 10001ab0 Sleep 1794->1795 1795->1792 1797 10001e21 CloseServiceHandle 1796->1797 1798 10001e28 1796->1798 1797->1798 1799 10001e36 1798->1799 1800 10001e2d CloseServiceHandle 1798->1800 1799->1775 1800->1799 1801 10002d74 1802 10002d79 1801->1802 1805 10004d20 1802->1805 1808 10004cf4 1805->1808 1807 10002d92 1809 10004d09 __dllonexit 1808->1809 1810 10004cfd _onexit 1808->1810 1809->1807 1810->1807 1811 10002d35 strrchr 1812 10002d70 1811->1812 1813 10002d49 1811->1813 1814 10004529 11 API calls 1813->1814 1815 10002d53 1814->1815 1815->1812 1816 1000248b 2 API calls 1815->1816 1817 10002d5f 1816->1817 1817->1812 1820 1000273d GetModuleFileNameA 1817->1820 1819 10002d6a 1821 10002764 wsprintfA 1820->1821 1822 10002785 wsprintfA 1820->1822 1823 100027a1 WinExec 1821->1823 1822->1823 1823->1819 1824 10003df6 1829 10003e12 1824->1829 1827 10003e05 ??3@YAXPAX 1828 10003e0c 1827->1828 1830 10003e29 FreeLibrary 1829->1830 1831 10003e2c 1829->1831 1830->1831 1832 10003e33 FreeLibrary 1831->1832 1833 10003e36 1831->1833 1832->1833 1834 10003e40 1833->1834 1835 10003e3d FreeLibrary 1833->1835 1836 10003e47 FreeLibrary 1834->1836 1837 10003e4a 1834->1837 1835->1834 1836->1837 1838 10003e51 FreeLibrary 1837->1838 1839 10003e54 1837->1839 1838->1839 1840 10003e5b FreeLibrary 1839->1840 1841 10003dfe 1839->1841 1840->1841 1841->1827 1841->1828 1842 100032f7 1843 10003347 1842->1843 1844 100032ff 1842->1844 1860 1000318a SetServiceStatus 1843->1860 1846 10003302 1844->1846 1847 10003335 1844->1847 1850 1000331b 1846->1850 1853 10003305 1846->1853 1859 1000318a SetServiceStatus 1847->1859 1849 10003353 Sleep 1849->1853 1857 1000318a SetServiceStatus 1850->1857 1852 10003327 1858 1000318a SetServiceStatus 1852->1858 1854 10003330 1853->1854 1861 1000318a SetServiceStatus 1853->1861 1857->1852 1858->1854 1859->1852 1860->1849 1861->1854 1862 10002f7b 1863 10001acf 8 API calls 1862->1863 1864 10002f90 1863->1864 1865 10003043 1864->1865 1873 100020c8 6 API calls 1864->1873 1867 10002f9f wsprintfA CreateProcessA GetModuleFileNameA GetFileAttributesA 1868 10003013 1867->1868 1869 10003018 GetLastError 1868->1869 1870 1000303d 1868->1870 1869->1870 1871 10003023 Sleep GetFileAttributesA 1869->1871 1872 10001a43 9 API calls 1870->1872 1871->1868 1872->1865 1873->1867 1874 100021ff 1875 10002216 1874->1875 1904 10002239 1874->1904 1876 1000235f VirtualAlloc 1875->1876 1877 1000221f 1875->1877 1878 1000237e memcpy 1876->1878 1876->1904 1879 10002284 1877->1879 1880 10002308 1877->1880 1881 100022aa 1877->1881 1882 1000222f 1877->1882 1883 100022cf 1877->1883 1884 10002251 1877->1884 1885 10002312 VirtualAlloc 1877->1885 1886 10002293 1877->1886 1887 10002353 1877->1887 1888 100022b5 1877->1888 1889 1000229f 1877->1889 1896 100022c0 1877->1896 1899 1000223e 1877->1899 1877->1904 1970 100042ee CreateEventA _beginthreadex WaitForSingleObject CloseHandle 1878->1970 1920 10002bc3 strlen 1879->1920 1960 10002583 1880->1960 1943 10002b96 1881->1943 1909 100025a2 1882->1909 1954 1000260e LocalAlloc 1883->1954 1919 100042ee CreateEventA _beginthreadex WaitForSingleObject CloseHandle 1884->1919 1902 10002330 memcpy 1885->1902 1885->1904 1892 1000273d 4 API calls 1886->1892 1965 1000265e 1887->1965 1949 10002b58 EnumWindows 1888->1949 1930 100029b6 memcpy 1889->1930 1892->1904 1959 100042ee CreateEventA _beginthreadex WaitForSingleObject CloseHandle 1896->1959 1914 100026df wsprintfA 1899->1914 1908 100023fa 29 API calls 1902->1908 1907 10002264 Sleep 1907->1904 1908->1904 1971 10004666 6 API calls 1909->1971 1912 10004666 11 API calls 1913 100025c6 1912->1913 1913->1904 1915 10002713 strlen 1914->1915 1916 1000270e 1914->1916 1917 10004a93 9 API calls 1915->1917 1916->1915 1918 10002737 1917->1918 1918->1904 1919->1907 1921 10002c90 1920->1921 1922 10002bdf memset 1920->1922 1921->1904 1923 10004822 13 API calls 1922->1923 1924 10002c10 1923->1924 1924->1921 1925 10002c17 lstrlenA 1924->1925 1925->1921 1926 10002c28 strstr 1925->1926 1926->1921 1927 10002c40 lstrcpyA 1926->1927 1928 10002c60 CreateProcessA 1927->1928 1928->1921 1931 10002a0b 1930->1931 1932 10002a12 WriteFile 1931->1932 1941 10002a32 1931->1941 1933 10002a39 strlen 1932->1933 1932->1941 1935 10002a51 wsprintfA 1933->1935 1936 10002a76 lstrcpyA 1933->1936 1937 10002a8a 1935->1937 1936->1937 1938 10002aa9 1937->1938 1939 10002a97 1937->1939 1980 100027bc memset strrchr 1938->1980 1939->1941 1942 1000273d 4 API calls 1939->1942 1941->1904 1942->1941 1999 1000473f LoadLibraryA GetProcAddress GetProcAddress GetProcAddress 1943->1999 1946 10002bbf 1946->1904 1947 10001863 16 API calls 1948 10002bba 1947->1948 1948->1904 1950 10002b74 1949->1950 1951 10002b8b 1949->1951 2006 10002ac4 IsWindowVisible 1949->2006 1952 10001863 16 API calls 1950->1952 1951->1904 1953 10002b86 1952->1953 1953->1904 1955 10002622 memcpy LocalSize 1954->1955 1956 1000265c 1954->1956 1957 10001863 16 API calls 1955->1957 1956->1904 1958 1000264d Sleep LocalFree 1957->1958 1958->1956 1959->1904 1961 1000258c 1960->1961 1962 1000259f 1960->1962 1963 10003cd2 _stricmp 1961->1963 1962->1904 1964 10002597 1963->1964 1964->1904 1968 10002680 1965->1968 1966 100026b4 OpenEventLogA 1967 100026c4 ClearEventLogA CloseEventLog 1966->1967 1966->1968 1967->1968 1968->1966 1969 100026da 1968->1969 1969->1904 1970->1904 1972 100046c3 1971->1972 1973 100046fc LoadLibraryA GetProcAddress 1972->1973 1979 100025b0 ExitWindowsEx 1972->1979 1974 1000470d CloseHandle 1973->1974 1976 10004728 FreeLibrary 1974->1976 1977 1000472b 1974->1977 1976->1977 1978 10004731 FreeLibrary 1977->1978 1977->1979 1978->1979 1979->1912 1981 100028f3 1980->1981 1982 100027f6 strrchr 1980->1982 1981->1941 1983 10002846 strcpy 1982->1983 1984 1000281d strlen 1982->1984 1985 10002857 1983->1985 1986 10002827 1984->1986 1987 10004822 13 API calls 1985->1987 1986->1985 1988 10002832 strncpy 1986->1988 1989 10002875 1987->1989 1988->1985 1989->1981 1990 1000287c memset wsprintfA memset 1989->1990 1991 10004822 13 API calls 1990->1991 1992 100028ec 1991->1992 1992->1981 1993 100028fa ExpandEnvironmentStringsA strstr 1992->1993 1994 10002929 strstr 1993->1994 1995 1000295f lstrcpyA 1993->1995 1994->1995 1997 1000293d lstrcatA lstrcatA 1994->1997 1996 10002969 CreateProcessA 1995->1996 1996->1981 1997->1996 2005 10004788 1999->2005 2000 100047cf CloseHandle 2001 10002ba3 2000->2001 2002 100047da FreeLibrary 2000->2002 2001->1946 2001->1947 2002->2001 2003 100047a7 lstrcmpiA 2004 100047c8 2003->2004 2003->2005 2004->2000 2005->2000 2005->2003 2007 10002b43 2006->2007 2008 10002ada SendMessageA lstrlenA 2006->2008 2008->2007 2009 10002b1d _strupr _strupr strstr 2008->2009 2009->2007

                                  Control-flow Graph

                                  APIs
                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,1000383C,10004E5A,?,?,?,?,?,?), ref: 10003E85
                                  • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 10003E96
                                  • GetProcAddress.KERNEL32(76210000,GetModuleFileNameA), ref: 10003EA3
                                  • GetProcAddress.KERNEL32(76210000,CreateMutexA), ref: 10003EB0
                                  • GetProcAddress.KERNEL32(76210000,ReleaseMutex), ref: 10003EBD
                                  • GetProcAddress.KERNEL32(76210000,GetLastError), ref: 10003ECA
                                  • GetProcAddress.KERNEL32(76210000,CloseHandle), ref: 10003ED7
                                  • GetProcAddress.KERNEL32(76210000,Sleep), ref: 10003EE4
                                  • GetProcAddress.KERNEL32(76210000,lstrcatA), ref: 10003EF1
                                  • GetProcAddress.KERNEL32(76210000,GetTickCount), ref: 10003EFE
                                  • GetProcAddress.KERNEL32(76210000,WaitForSingleObject), ref: 10003F0B
                                  • GetProcAddress.KERNEL32(76210000,GetFileAttributesA), ref: 10003F18
                                  • GetProcAddress.KERNEL32(76210000,CreateEventA), ref: 10003F25
                                  • GetProcAddress.KERNEL32(76210000,ResetEvent), ref: 10003F32
                                  • GetProcAddress.KERNEL32(76210000,CancelIo), ref: 10003F3F
                                  • GetProcAddress.KERNEL32(76210000,SetEvent), ref: 10003F4C
                                  • GetProcAddress.KERNEL32(76210000,TerminateThread), ref: 10003F59
                                  • GetProcAddress.KERNEL32(76210000,GetVersionExA), ref: 10003F66
                                  • GetProcAddress.KERNEL32(76210000,GetExitCodeProcess), ref: 10003F73
                                  • GetProcAddress.KERNEL32(76210000,ExpandEnvironmentStringsA), ref: 10003F80
                                  • GetProcAddress.KERNEL32(76210000,GetSystemInfo), ref: 10003F8D
                                  • GetProcAddress.KERNEL32(76210000,GetSystemDirectoryA), ref: 10003F9A
                                  • GetProcAddress.KERNEL32(76210000,MoveFileA), ref: 10003FA7
                                  • GetProcAddress.KERNEL32(76210000,MoveFileExA), ref: 10003FB4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: ADVAPI32.dll$CancelIo$ChangeServiceConfig2A$CloseHandle$CloseServiceHandle$ControlService$CreateEventA$CreateMutexA$CreateProcessA$CreateProcessAsUserA$CreateServiceA$DeleteService$DuplicateTokenEx$EnumWindows$ExitWindowsEx$ExpandEnvironmentStringsA$GetCurrentProcess$GetExitCodeProcess$GetFileAttributesA$GetLastError$GetModuleFileNameA$GetSystemDirectoryA$GetSystemInfo$GetTickCount$GetVersionExA$IsWindowVisible$MSVCRT.dll$MessageBoxA$MoveFileA$MoveFileExA$OpenProcessToken$OpenSCManagerA$OpenServiceA$QueryServiceStatus$RegisterServiceCtrlHandlerA$ReleaseMutex$ResetEvent$SendMessageA$SetEvent$SetServiceStatus$SetTokenInformation$Sleep$StartServiceA$TerminateThread$User32.dll$WSACleanup$WSAIoctl$WSAStartup$WTSGetActiveConsoleSessionId$WaitForSingleObject$closesocket$connect$gethostbyname$gethostname$getsockname$htons$kernel32.dll$lstrcatA$memcpy$memset$recv$select$send$setsockopt$socket$strcmp$strlen$strstr$wininet.dll$ws2_32.dll$wsprintfA
                                  • API String ID: 2238633743-2593546367
                                  • Opcode ID: c0ece4e7efd5b4c6edabd0fb5669f7d958223cf09bcca4ca1208277cbc57487f
                                  • Instruction ID: 1d4e4a84f7054c9bea1b663399dca5a43fab5260fb22e9cb011038ddc9d5f956
                                  • Opcode Fuzzy Hash: c0ece4e7efd5b4c6edabd0fb5669f7d958223cf09bcca4ca1208277cbc57487f
                                  • Instruction Fuzzy Hash: F5B16970800B45AEE731AF32CD04EA7BEF6FF84340B118D2DE5AA56924DB32A855DF51

                                  Control-flow Graph

                                  APIs
                                  • strncpy.MSVCRT ref: 1000338C
                                  • wcstombs.MSVCRT ref: 1000339C
                                  • RegisterServiceCtrlHandlerA.ADVAPI32(?,100032F7), ref: 100033B1
                                  • FreeConsole.KERNEL32 ref: 100033C6
                                    • Part of subcall function 1000318A: SetServiceStatus.SECHOST(00000010), ref: 100031CA
                                  • GetVersionExA.KERNEL32(?), ref: 100033F3
                                  • MainThread.4293750 ref: 1000340F
                                    • Part of subcall function 1000315D: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 10003178
                                    • Part of subcall function 1000315D: CloseHandle.KERNEL32(00000000), ref: 1000317F
                                  • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 10003426
                                  • lstrcatA.KERNEL32(?,1000660C), ref: 10003438
                                  • lstrcatA.KERNEL32(?,SySe), ref: 1000344A
                                  • lstrcatA.KERNEL32(?,.exe), ref: 1000345C
                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1000346A
                                  • lstrcatA.KERNEL32(?,\Rundll32.exe), ref: 1000347C
                                  • CopyFileA.KERNEL32(?,?,00000001), ref: 10003492
                                  • GetFileAttributesA.KERNELBASE(?), ref: 1000349F
                                  • GetLastError.KERNEL32 ref: 100034AA
                                  • wsprintfA.USER32 ref: 100034C3
                                  • GetModuleFileNameA.KERNEL32(?,00000104), ref: 100034DE
                                  • wsprintfA.USER32 ref: 100034FE
                                  • Sleep.KERNELBASE(000003E8), ref: 1000350C
                                  • GetExitCodeProcess.KERNELBASE(00000000,?), ref: 10003517
                                  • CloseHandle.KERNELBASE(00000000), ref: 10003527
                                  • Sleep.KERNELBASE(00000BB8), ref: 10003532
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 10003559
                                  • CloseHandle.KERNEL32(00000000), ref: 10003560
                                  • Sleep.KERNEL32(00000064), ref: 10003568
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: lstrcat$CloseFileHandleSleep$DirectoryObjectServiceSingleWaitwsprintf$AttributesCodeConsoleCopyCtrlCurrentErrorExitFreeHandlerLastMainModuleNameProcessRegisterStatusSystemThreadVersionstrncpywcstombs
                                  • String ID: %s "%s",MainThread$.exe$SySe$\Rundll32.exe$.#v
                                  • API String ID: 2268562214-2619658641
                                  • Opcode ID: edc6bb86fa15e14382b8bf422a5a5e13054f2286661d091575d839084948f042
                                  • Instruction ID: 41d25408302aabc459f6968b7f59f59ff79b25a4c4978eb5c8748b31ff7b5c46
                                  • Opcode Fuzzy Hash: edc6bb86fa15e14382b8bf422a5a5e13054f2286661d091575d839084948f042
                                  • Instruction Fuzzy Hash: 06515275800269AFEB11DBA0CCC99DF77BEEB09395F604465F209D2058DB719A84CF61

                                  Control-flow Graph

                                  APIs
                                  • LoadLibraryA.KERNELBASE(userenv.dll,00000000,00000104,00000000), ref: 10001FCB
                                  • GetProcAddress.KERNEL32(00000000,CreateEnvironmentBlock), ref: 10001FDA
                                  • memset.MSVCRT ref: 10001FF9
                                  • memset.MSVCRT ref: 10002005
                                  • GetCurrentProcess.KERNEL32 ref: 10002023
                                  • OpenProcessToken.ADVAPI32(00000000,000F01FF,10003544), ref: 10002033
                                  • DuplicateTokenEx.ADVAPI32(10003544,02000000,00000000,00000001,00000001,?), ref: 1000204A
                                  • SetTokenInformation.ADVAPI32(?,0000000C,?,00000004), ref: 10002069
                                  • CreateProcessAsUserA.KERNELBASE(?,00000000,10003544,00000000,00000000,00000000,00000430,?,00000000,?,?), ref: 10002094
                                  • CloseHandle.KERNEL32(?), ref: 100020A0
                                  • CloseHandle.KERNEL32(10003544), ref: 100020A9
                                  • FreeLibrary.KERNELBASE(?), ref: 100020BB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: ProcessToken$CloseHandleLibrarymemset$AddressCreateCurrentDuplicateFreeInformationLoadOpenProcUser
                                  • String ID: CreateEnvironmentBlock$WinSta0\Default$userenv.dll$.#v
                                  • API String ID: 389336417-1936089592
                                  • Opcode ID: b17ba00ba64db28f18bd6f450c5a4aff0af55f28d04f5de357443b33628a04c7
                                  • Instruction ID: 393253a686a726e0e40b90c7e54b6c9b8ea898aa750e1207ba5c491074f34e4f
                                  • Opcode Fuzzy Hash: b17ba00ba64db28f18bd6f450c5a4aff0af55f28d04f5de357443b33628a04c7
                                  • Instruction Fuzzy Hash: E13104B2D11229BBEB11DFD5CD89DDEBFBAEF08781F200056F605A2154C7B15A00DBA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 37 1000318a-100031d1 SetServiceStatus
                                  APIs
                                  • SetServiceStatus.SECHOST(00000010), ref: 100031CA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: ServiceStatus
                                  • String ID:
                                  • API String ID: 3969395364-0
                                  • Opcode ID: 27465d0ccf9c2ca7f2eb77ed8655f8ffd3fcd3240fb6f93fded1e015b92d134b
                                  • Instruction ID: 42df913d68a79b1f62ab0f840a1365e4bfcb694bfd220718bb7b564d1378dfbb
                                  • Opcode Fuzzy Hash: 27465d0ccf9c2ca7f2eb77ed8655f8ffd3fcd3240fb6f93fded1e015b92d134b
                                  • Instruction Fuzzy Hash: 24F0A5B0D0021EDFDB40DF99D8857AEBBF4BB08348F108069E818A7244D7B496048F90

                                  Control-flow Graph

                                  APIs
                                  • wsprintfA.USER32 ref: 1000306C
                                  • strlen.MSVCRT ref: 10003078
                                  • strlen.MSVCRT ref: 1000308E
                                    • Part of subcall function 10004A93: LoadLibraryA.KERNEL32(ADVAPI32.dll,?,00000000,?), ref: 10004AC0
                                    • Part of subcall function 10004A93: GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 10004AD7
                                    • Part of subcall function 10004A93: GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10004AE2
                                    • Part of subcall function 10004A93: GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 10004AED
                                    • Part of subcall function 10004A93: GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10004AF8
                                    • Part of subcall function 10004A93: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10004B03
                                    • Part of subcall function 10004A93: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 10004B0E
                                    • Part of subcall function 10004A93: FreeLibrary.KERNEL32(00000000,?,00000000,?), ref: 10004C02
                                  • strlen.MSVCRT ref: 100030B4
                                  • GetLocalTime.KERNEL32(?), ref: 100030D7
                                  • wsprintfA.USER32 ref: 100030FF
                                  • strlen.MSVCRT ref: 1000310D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$strlen$Librarywsprintf$FreeLoadLocalTime
                                  • String ID: %4d-%.2d-%.2d %.2d:%.2d$1000$Group$InstallTime$Remark$SYSTEM\CurrentControlSet\Services\%s$SySe
                                  • API String ID: 124699875-1081287659
                                  • Opcode ID: 01154ca105bfda5f078472489b81bc39b1063e4cdbc4f1aa553d48ab01563500
                                  • Instruction ID: 2672780922b42b35e2a89e682ca47f3d516b1e1a70e82393c56e9bdbe1b2b31e
                                  • Opcode Fuzzy Hash: 01154ca105bfda5f078472489b81bc39b1063e4cdbc4f1aa553d48ab01563500
                                  • Instruction Fuzzy Hash: CE211DA28001287BF710E794DC89DFF76BDEB4D695F5400A6FA01E1049EB39AE418775

                                  Control-flow Graph

                                  APIs
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,?,00000000), ref: 10001B96
                                  • _local_unwind2.MSVCRT ref: 10001BA9
                                  • CreateServiceA.ADVAPI32(00000000,00000000,00000000,000F01FF,?,10001E9B,00000000,?,00000000,00000000,?,00000000,00000000,?,00000000), ref: 10001BE6
                                  • GetLastError.KERNEL32(?,00000000), ref: 10001BF5
                                  • OpenServiceA.ADVAPI32(10001E9B,00000000,000F01FF,?,00000000), ref: 10001C09
                                  • StartServiceA.ADVAPI32(00000000,00000000,00000000,?,00000000), ref: 10001C1F
                                  • ChangeServiceConfig2A.ADVAPI32(00000000,00000001,?,?,00000000), ref: 10001C43
                                  • ChangeServiceConfig2A.ADVAPI32(00000000,00000002,?), ref: 10001CA3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: Service$ChangeConfig2Open$CreateErrorLastManagerStart_local_unwind2
                                  • String ID: Description$SYSTEM\CurrentControlSet\Services\%s
                                  • API String ID: 1109860625-2908613140
                                  • Opcode ID: ae27365f3abc695d381728d134456e741ffe8850672492339ff11c7de2e79d22
                                  • Instruction ID: 34160cdb049149ef51204cb724d21122ba78e6005a4a2cbc3d1f025aef1d8869
                                  • Opcode Fuzzy Hash: ae27365f3abc695d381728d134456e741ffe8850672492339ff11c7de2e79d22
                                  • Instruction Fuzzy Hash: E6813270C086A8DEEB21CB64CC88BDEBFB5AB19344F0401D9E55C66291C77A0F94CF65
                                  APIs
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,SySe,?,?,?,?,?,?,?,10003043,SySe), ref: 10001A54
                                  • OpenServiceA.ADVAPI32(00000000,?,000F01FF,?,?,?,?,?,?,?,10003043,SySe), ref: 10001A69
                                  • StartServiceA.ADVAPI32(00000000,00000000,00000000,?,?,?,?,?,?,?,10003043,SySe), ref: 10001A7A
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,10003043,SySe), ref: 10001A84
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,?,10003043,SySe), ref: 10001A92
                                  • QueryServiceStatus.ADVAPI32(00000000,?,?,?,?,?,?,?,?,10003043,SySe), ref: 10001AA0
                                  • Sleep.KERNEL32(00000064), ref: 10001AB2
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,?,10003043,SySe), ref: 10001ABB
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,?,10003043,SySe), ref: 10001AC2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ErrorLastManagerQuerySleepStartStatus
                                  • String ID: SySe
                                  • API String ID: 191932718-261273551
                                  • Opcode ID: 014086cccfa01bbc5a08c9c9583791d5995df2f921ac7ee13cb4fdb749c4e3c5
                                  • Instruction ID: 9ee7ec8bb55b1ac22ac6ce330aaae550d3e81ab1b6a3f2d0b0f6497ceb73b83b
                                  • Opcode Fuzzy Hash: 014086cccfa01bbc5a08c9c9583791d5995df2f921ac7ee13cb4fdb749c4e3c5
                                  • Instruction Fuzzy Hash: 33012531746327EBF711ABA05CC9FEF36A9EB0A7C1F200420F602D9099DB65884186E6
                                  APIs
                                  • strlen.MSVCRT ref: 10002BD1
                                  • memset.MSVCRT ref: 10002BEF
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 10004857
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 1000486A
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 10004878
                                    • Part of subcall function 10004822: LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004885
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 1000489D
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegOpenKeyExA), ref: 100048AD
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegEnumValueA), ref: 100048BD
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegEnumKeyExA), ref: 100048CA
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegCloseKey), ref: 100048D7
                                    • Part of subcall function 10004822: FreeLibrary.KERNEL32(?,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004A63
                                  • lstrlenA.KERNEL32(?), ref: 10002C1E
                                  • strstr.MSVCRT ref: 10002C34
                                  • lstrcpyA.KERNEL32(00000000,?), ref: 10002C44
                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 10002C8A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$memset$Library$CreateFreeLoadProcesslstrcpylstrlenstrlenstrstr
                                  • String ID: Applications\iexplore.exe\shell\open\command$D$WinSta0\Default
                                  • API String ID: 2952214944-490771695
                                  • Opcode ID: 7fd2577a0a9b6326ac895a1fa05e515703ef0ef4a7097cdaa6f8a03547f7ada4
                                  • Instruction ID: 41262b3153465784fb7137690828f40fbae5b7cfa485d5802afb8d228550aeb8
                                  • Opcode Fuzzy Hash: 7fd2577a0a9b6326ac895a1fa05e515703ef0ef4a7097cdaa6f8a03547f7ada4
                                  • Instruction Fuzzy Hash: 46216A72900128AAFF60CBE1CD48EDF7BBCEF453D2F100015BA09E6048DA719A84CBA0
                                  APIs
                                  • OpenEventLogA.ADVAPI32(00000000,Application), ref: 100026B8
                                  • ClearEventLogA.ADVAPI32(00000000,00000000), ref: 100026C7
                                  • CloseEventLog.ADVAPI32(00000000), ref: 100026CE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: Event$ClearCloseOpen
                                  • String ID: (b$Application$Security$System
                                  • API String ID: 1391105993-346596376
                                  • Opcode ID: 979e5dc6c9d061fd1560a2a7781cfa77c6718ec7c1a2c36edda2fbc21b44326a
                                  • Instruction ID: bc44e267b22650a43e45f5af2b99767b5e3e23e3035c63c9d4cfe444952d6dd8
                                  • Opcode Fuzzy Hash: 979e5dc6c9d061fd1560a2a7781cfa77c6718ec7c1a2c36edda2fbc21b44326a
                                  • Instruction Fuzzy Hash: 5D018F71E00A99BBFB00DF94984479DBFB4EB097C9FA04095E506EB248D73A8E408F95
                                  APIs
                                  • strlen.MSVCRT ref: 10001F4E
                                    • Part of subcall function 10001ACF: OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 10001ADF
                                    • Part of subcall function 10001ACF: OpenServiceA.ADVAPI32(00000000,?,000F01FF), ref: 10001AF5
                                    • Part of subcall function 10001ACF: QueryServiceStatus.ADVAPI32(00000000,?), ref: 10001B06
                                    • Part of subcall function 10001ACF: ControlService.ADVAPI32(00000000,00000001,?), ref: 10001B1D
                                    • Part of subcall function 10001ACF: Sleep.KERNEL32(0000000A), ref: 10001B2F
                                    • Part of subcall function 10001ACF: QueryServiceStatus.ADVAPI32(00000000,?), ref: 10001B3A
                                    • Part of subcall function 10001ACF: CloseServiceHandle.ADVAPI32(00000000), ref: 10001B43
                                    • Part of subcall function 10001ACF: CloseServiceHandle.ADVAPI32(00000000), ref: 10001B4A
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,?,?,?,?,10002F76,SySe), ref: 10001F6B
                                  • OpenServiceA.ADVAPI32(00000000,?,000F01FF,?,?,?,?,10002F76,SySe), ref: 10001F7F
                                  • DeleteService.ADVAPI32(00000000,?,?,?,?,10002F76,SySe), ref: 10001F8C
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,10002F76,SySe), ref: 10001F93
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,10002F76,SySe), ref: 10001F9A
                                  Strings
                                  • SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost, xrefs: 10001FA7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: Service$CloseHandleOpen$ManagerQueryStatus$ControlDeleteSleepstrlen
                                  • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost
                                  • API String ID: 625463800-1784019800
                                  • Opcode ID: 02807cd9fc2c2d172a8d2777ce926d73bc9f3961fff41b6754e738332fe71101
                                  • Instruction ID: 320e00f64ca60edd69a113f9dbbd44adb98dc69d7bce9bbf9f1d19ab5e200103
                                  • Opcode Fuzzy Hash: 02807cd9fc2c2d172a8d2777ce926d73bc9f3961fff41b6754e738332fe71101
                                  • Instruction Fuzzy Hash: 39F096B610912A7FF1106771ECCCDBF7E6DDB4E2D6B120428F5055600ECF2658418571
                                  APIs
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 10004857
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 1000486A
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 10004878
                                    • Part of subcall function 10004822: LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004885
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 1000489D
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegOpenKeyExA), ref: 100048AD
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegEnumValueA), ref: 100048BD
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegEnumKeyExA), ref: 100048CA
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegCloseKey), ref: 100048D7
                                    • Part of subcall function 10004822: FreeLibrary.KERNEL32(?,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004A63
                                  • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 100035C9
                                  • wsprintfA.USER32 ref: 100035DE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$memset$Library$FreeInfoLoadSystemwsprintf
                                  • String ID: %d*%sMHz$HARDWARE\DESCRIPTION\System\CentralProcessor\0$~MHz
                                  • API String ID: 86330591-2169120903
                                  • Opcode ID: dc211f4c5e3334b9a75a581acafed69773f2644d7a1948e9a9c8f06f08de0db5
                                  • Instruction ID: e0e52339f3a0edf701dd4b0822ed73eda2d577ef34cae91861143d544cce4ff8
                                  • Opcode Fuzzy Hash: dc211f4c5e3334b9a75a581acafed69773f2644d7a1948e9a9c8f06f08de0db5
                                  • Instruction Fuzzy Hash: 93F054B1900149BFFB04DBE8CD05DEEBB6DDB1C144F200464FB01F5055E6629A148766
                                  APIs
                                  • FreeLibrary.KERNEL32(?,00000000,?,?,100039AB,00000000), ref: 10003D99
                                  • free.MSVCRT ref: 10003DA8
                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,?,100039AB,00000000), ref: 10003DBE
                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,100039AB,00000000), ref: 10003DC6
                                  • HeapFree.KERNEL32(00000000), ref: 10003DCD
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: Free$Heap$LibraryProcessVirtualfree
                                  • String ID:
                                  • API String ID: 831075735-0
                                  • Opcode ID: 667178307696715c23ee8a0b861fe9ca313d72f521eb66f714d6403ad810cf37
                                  • Instruction ID: 71511c0ad6a298159b0eec715adc94005effd13d7d75cd72595928e5cffca51a
                                  • Opcode Fuzzy Hash: 667178307696715c23ee8a0b861fe9ca313d72f521eb66f714d6403ad810cf37
                                  • Instruction Fuzzy Hash: DC01ED72500611AFE7219FA5DCC895BB7EDFB443A1311892EF19A93554C731BC45CB50
                                  APIs
                                  • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 10001581
                                  • memset.MSVCRT ref: 10001599
                                  • recv.WS2_32(?,?,00002000,00000000), ref: 100015B0
                                    • Part of subcall function 10001603: __EH_prolog.LIBCMT ref: 10001608
                                    • Part of subcall function 10001603: memcmp.MSVCRT(?,?,00000003,00000000,00000000,00002000), ref: 10001635
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: H_prologmemcmpmemsetrecvselect
                                  • String ID:
                                  • API String ID: 845096623-0
                                  • Opcode ID: 75ccf4472247f99d1fc82cf152b3949a0f6c798424c0c4ef67da7dbc52851d33
                                  • Instruction ID: b249bad086b58afcbe69b5c97c14a2d47d410cce536c228878a31608307147f8
                                  • Opcode Fuzzy Hash: 75ccf4472247f99d1fc82cf152b3949a0f6c798424c0c4ef67da7dbc52851d33
                                  • Instruction Fuzzy Hash: E3216376500128ABEB20CBA5DC88DCF7BADEF853E1F100565F51A9B195DB30AE85CA90
                                  APIs
                                    • Part of subcall function 10004666: LoadLibraryA.KERNEL32(ADVAPI32.dll,?,SeShutdownPrivilege), ref: 1000467E
                                    • Part of subcall function 10004666: GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 1000468E
                                    • Part of subcall function 10004666: GetProcAddress.KERNEL32(00000000,AdjustTokenPrivileges), ref: 10004699
                                    • Part of subcall function 10004666: GetProcAddress.KERNEL32(00000000,LookupPrivilegeValueA), ref: 100046A4
                                    • Part of subcall function 10004666: LoadLibraryA.KERNEL32(kernel32.dll,?,SeShutdownPrivilege), ref: 100046AE
                                    • Part of subcall function 10004666: GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 100046B9
                                    • Part of subcall function 10004666: LoadLibraryA.KERNEL32(KERNEL32.dll,?,SeShutdownPrivilege), ref: 10004701
                                    • Part of subcall function 10004666: GetProcAddress.KERNEL32(00000000,GetLastError), ref: 10004709
                                    • Part of subcall function 10004666: CloseHandle.KERNEL32(?,?,SeShutdownPrivilege), ref: 10004718
                                    • Part of subcall function 10004666: FreeLibrary.KERNEL32(00000000,?,SeShutdownPrivilege), ref: 10004729
                                    • Part of subcall function 10004666: FreeLibrary.KERNEL32(00000000,?,SeShutdownPrivilege), ref: 10004734
                                  • ExitWindowsEx.USER32(?,00000000), ref: 100025B8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressLibraryProc$Load$Free$CloseExitHandleWindows
                                  • String ID: SeShutdownPrivilege
                                  • API String ID: 3789203340-3733053543
                                  • Opcode ID: e4fba66ba179fd9c90d11779b271753c7a602678899a700a7ffa0e43bc127d12
                                  • Instruction ID: 24361d1f74b491916104d0b65e9654eb6268adfd09238d66ad51a9c89c1c7c7a
                                  • Opcode Fuzzy Hash: e4fba66ba179fd9c90d11779b271753c7a602678899a700a7ffa0e43bc127d12
                                  • Instruction Fuzzy Hash: 55D0C93614D7203AF6259310FC07F891386DB46A60F32005AF100281D9EE97394101DE

                                  Control-flow Graph

                                  APIs
                                  • memset.MSVCRT ref: 10004857
                                  • memset.MSVCRT ref: 1000486A
                                  • memset.MSVCRT ref: 10004878
                                  • LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004885
                                  • GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 1000489D
                                  • GetProcAddress.KERNEL32(?,RegOpenKeyExA), ref: 100048AD
                                  • GetProcAddress.KERNEL32(?,RegEnumValueA), ref: 100048BD
                                  • GetProcAddress.KERNEL32(?,RegEnumKeyExA), ref: 100048CA
                                  • GetProcAddress.KERNEL32(?,RegCloseKey), ref: 100048D7
                                  • strchr.MSVCRT ref: 10004991
                                  • lstrcpyA.KERNEL32(?,?,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004A3F
                                  • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004A63
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$memset$Library$FreeLoadlstrcpystrchr
                                  • String ID: %08X$ADVAPI32.dll$RegCloseKey$RegEnumKeyExA$RegEnumValueA$RegOpenKeyExA$RegQueryValueExA
                                  • API String ID: 3659255042-2913591164
                                  • Opcode ID: 7424f0aa0fc5f41e5269731e09dcfb498a038a30a4bf35bef428207efb807e24
                                  • Instruction ID: 7827c6d97ea14ff7f97f876e2ede93deda3ff4f1abfb71c7f8a3dc5e2b71a7d8
                                  • Opcode Fuzzy Hash: 7424f0aa0fc5f41e5269731e09dcfb498a038a30a4bf35bef428207efb807e24
                                  • Instruction Fuzzy Hash: 3761F9B190111DABEF21DFA0CD84EEFBBB9FB49390F1101A6F609A2114DB319E548F65

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: memset$lstrcatstrrchrstrstr$CreateEnvironmentExpandProcessStringslstrcpystrcpystrlenstrncpywsprintf
                                  • String ID: "%1$%s\shell\open\command$D$WinSta0\Default
                                  • API String ID: 4079107157-33419044
                                  • Opcode ID: 04d3fabc052defb42953b4d487a01b0e0a3a75e7128b93fa4fdb2158ee315547
                                  • Instruction ID: 1dae266835ad86fc393f082bb566385ae5bfce16840cf251a65e311cd9e83007
                                  • Opcode Fuzzy Hash: 04d3fabc052defb42953b4d487a01b0e0a3a75e7128b93fa4fdb2158ee315547
                                  • Instruction Fuzzy Hash: 86514FB690062DBFFB10CBE0CD89EDF777CEB05395F1044A6F604E6144DA719A498BA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 97 10004529-10004576 LoadLibraryA GetProcAddress 99 10004597-10004599 97->99 100 10004578-10004595 GetProcAddress 97->100 101 100045a2-100045a4 99->101 102 1000459b-1000459c FreeLibrary 99->102 100->99 105 100045a9-100045c3 100->105 104 10004661-10004665 101->104 102->101 107 100045c5 105->107 108 10004637-10004655 Sleep GetProcAddress 105->108 109 100045ca-100045f9 memset GetProcAddress 107->109 115 10004657-10004658 FreeLibrary 108->115 116 1000465e 108->116 113 10004606-10004624 WriteFile 109->113 114 100045fb-10004604 109->114 118 10004626 113->118 119 1000462b-10004634 CloseHandle 113->119 114->113 117 10004628 114->117 115->116 116->104 117->119 118->109 119->108
                                  APIs
                                  • LoadLibraryA.KERNEL32(wininet.dll,?,00000001,00000000), ref: 1000454D
                                  • GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 10004564
                                  • GetProcAddress.KERNEL32(00000000,InternetOpenUrlA), ref: 1000457E
                                  • FreeLibrary.KERNEL32(00000000,?,00000001,00000000), ref: 1000459C
                                  • CreateFileA.KERNEL32(10002CDC,40000000,00000000,00000000,00000002,00000000,00000000,?,00000001,00000000), ref: 100045B7
                                  • memset.MSVCRT ref: 100045D3
                                  • GetProcAddress.KERNEL32(10002CDC,InternetReadFile), ref: 100045E3
                                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,00000001,00000000), ref: 1000461B
                                  • CloseHandle.KERNEL32(00000000,?,00000001,00000000), ref: 1000462E
                                  • Sleep.KERNEL32(00000001,?,00000001,00000000), ref: 10004639
                                  • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 10004645
                                  • FreeLibrary.KERNEL32(00000000,?,00000001,00000000), ref: 10004658
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWritememset
                                  • String ID: 01#v$InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$MSIE 6.0$MZ$wininet.dll
                                  • API String ID: 2364563185-1782425846
                                  • Opcode ID: 4ccd4711cf4494772635a2f590ae23fe1c53700288b07bfeed38bb136e3ef3db
                                  • Instruction ID: cfdd7e431f84bb68211a12104eaec753c658bf1fa5ec063c49e3443a626c7788
                                  • Opcode Fuzzy Hash: 4ccd4711cf4494772635a2f590ae23fe1c53700288b07bfeed38bb136e3ef3db
                                  • Instruction Fuzzy Hash: 0E3149B180011CBEEB109FA0CC84EEFBFB9EB483D5F118069F605A2154DB365E858AA5

                                  Control-flow Graph

                                  APIs
                                  • LoadLibraryA.KERNEL32(ADVAPI32.dll,?,SeShutdownPrivilege), ref: 1000467E
                                  • GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 1000468E
                                  • GetProcAddress.KERNEL32(00000000,AdjustTokenPrivileges), ref: 10004699
                                  • GetProcAddress.KERNEL32(00000000,LookupPrivilegeValueA), ref: 100046A4
                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,SeShutdownPrivilege), ref: 100046AE
                                  • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 100046B9
                                  • LoadLibraryA.KERNEL32(KERNEL32.dll,?,SeShutdownPrivilege), ref: 10004701
                                  • GetProcAddress.KERNEL32(00000000,GetLastError), ref: 10004709
                                  • CloseHandle.KERNEL32(?,?,SeShutdownPrivilege), ref: 10004718
                                  • FreeLibrary.KERNEL32(00000000,?,SeShutdownPrivilege), ref: 10004729
                                  • FreeLibrary.KERNEL32(00000000,?,SeShutdownPrivilege), ref: 10004734
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressLibraryProc$Load$Free$CloseHandle
                                  • String ID: ADVAPI32.dll$AdjustTokenPrivileges$GetCurrentProcess$GetLastError$KERNEL32.dll$LookupPrivilegeValueA$OpenProcessToken$SeShutdownPrivilege$kernel32.dll
                                  • API String ID: 2887716753-2040270271
                                  • Opcode ID: 2c02e0a2dce957ed4b170e4857a5501a8461009b11209441a4d50c6b9b6a2af3
                                  • Instruction ID: 8d4d7167a0abf61afb389703d9ccc16411aa1da686c4766c6b67e9c280f51853
                                  • Opcode Fuzzy Hash: 2c02e0a2dce957ed4b170e4857a5501a8461009b11209441a4d50c6b9b6a2af3
                                  • Instruction Fuzzy Hash: DD2148B1D04218BAEB01EBF58C48FEFBFB8EF48391F114465E605E2144DB759A448BA0

                                  Control-flow Graph

                                  APIs
                                  • __EH_prolog.LIBCMT ref: 10002DA3
                                  • wsprintfA.USER32 ref: 10002DD0
                                  • CreateMutexA.KERNEL32(00000000,00000000,?), ref: 10002DE4
                                  • GetLastError.KERNEL32 ref: 10002DF0
                                  • ReleaseMutex.KERNEL32(00000000), ref: 10002DFE
                                  • CloseHandle.KERNEL32(00000000), ref: 10002E05
                                  • rand.MSVCRT ref: 10002E28
                                  • Sleep.KERNEL32 ref: 10002E37
                                  • lstrcatA.KERNEL32(00000000,www.sf2110.com), ref: 10002E60
                                  • strcmp.MSVCRT ref: 10002E72
                                  • GetTickCount.KERNEL32 ref: 10002E8A
                                  • GetTickCount.KERNEL32 ref: 10002EA6
                                  • WaitForSingleObject.KERNEL32(?,00000064,?,?,?,0000213A), ref: 10002F0F
                                  • Sleep.KERNEL32(000001F4), ref: 10002F1C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: CountMutexSleepTick$CloseCreateErrorH_prologHandleLastObjectReleaseSingleWaitlstrcatrandstrcmpwsprintf
                                  • String ID: %s:%d:%s$SySe$www.sf2110.com$.#v
                                  • API String ID: 4065721159-3036444230
                                  • Opcode ID: a5af5a3d6a9359322f04e457a363fbda1204055e8f71d46e8cb9e8ff8e7e396c
                                  • Instruction ID: 0aef3fa4da984b37d72cd036fbc76a84f9d8f20caef5abb9300e459f48f97b0e
                                  • Opcode Fuzzy Hash: a5af5a3d6a9359322f04e457a363fbda1204055e8f71d46e8cb9e8ff8e7e396c
                                  • Instruction Fuzzy Hash: 4F41A8358042A5ABFB15DBB4CC88BDE7BB9EF093C0F1040A5E509E3199DF716A44CB51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 176 10004a93-10004b1b LoadLibraryA GetProcAddress * 6 177 10004b79-10004b95 176->177 178 10004b1d-10004b1e 176->178 180 10004b97-10004bac 177->180 184 10004bf4-10004bff call 10004c1f 177->184 179 10004b20-10004b21 178->179 178->180 182 10004b53-10004b68 179->182 183 10004b23-10004b24 179->183 180->184 189 10004bae-10004bb3 180->189 182->184 190 10004b6e-10004b77 182->190 183->184 185 10004b2a-10004b3f 183->185 194 10004c01-10004c02 FreeLibrary 184->194 195 10004c08-10004c19 184->195 185->184 196 10004b45-10004b4e 185->196 189->184 193 10004bb5-10004bb8 189->193 205 10004be9-10004beb 190->205 197 10004bd0-10004bde lstrlenA 193->197 198 10004bba-10004bbd 193->198 194->195 196->205 201 10004bdf-10004be3 197->201 199 10004bc6-10004bce 198->199 200 10004bbf-10004bc2 198->200 199->201 200->197 204 10004bc4 200->204 201->205 204->184 205->184 206 10004bed 205->206 206->184
                                  APIs
                                  • LoadLibraryA.KERNEL32(ADVAPI32.dll,?,00000000,?), ref: 10004AC0
                                  • GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 10004AD7
                                  • GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10004AE2
                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 10004AED
                                  • GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10004AF8
                                  • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10004B03
                                  • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 10004B0E
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,?), ref: 10004C02
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$Library$FreeLoad
                                  • String ID: ADVAPI32.dll$RegCloseKey$RegCreateKeyExA$RegDeleteKeyA$RegDeleteValueA$RegOpenKeyExA$RegSetValueExA
                                  • API String ID: 2449869053-3188892968
                                  • Opcode ID: b9fec3eb9a562a6a9266f8090f520ea499f34599839294b39172511a198aaae8
                                  • Instruction ID: 2058804bda021c861d2603192b8c2d3dc199326d0aa42d29f4cfa0892e9c0375
                                  • Opcode Fuzzy Hash: b9fec3eb9a562a6a9266f8090f520ea499f34599839294b39172511a198aaae8
                                  • Instruction Fuzzy Hash: E741E3B1900259BFFF11DF94DC84EEEBAB9FB08695F114026FA24A2168DB318C159B64

                                  Control-flow Graph

                                  APIs
                                  • __EH_prolog.LIBCMT ref: 10001608
                                  • memcmp.MSVCRT(?,?,00000003,00000000,00000000,00002000), ref: 10001635
                                  • memcpy.MSVCRT(00000003,00000000,00000003,00000000,?,00000003,00000000,00000000,00002000), ref: 1000169E
                                  • memcmp.MSVCRT(00000003,00000003,00000003,00000003,00000000,00000003,00000000,?,00000003,00000000,00000000,00002000), ref: 100016AD
                                  • _CxxThrowException.MSVCRT(?,10005370), ref: 100016C9
                                  • memcpy.MSVCRT(?,00000000,00000004,00000003,00000000,?,00000003,00000000,00000000,00002000), ref: 100016E1
                                  • ??2@YAPAXI@Z.MSVCRT(?,?,00000004,?,00000004,?,00000004,00000003,00000003,?,?,00000003,00000000,?,00000003,00000000), ref: 10001743
                                  • ??2@YAPAXI@Z.MSVCRT(?,?,00000004,?,00000004,?,00000004,00000003,00000003,?,?,00000003,00000000,?,00000003,00000000), ref: 1000174F
                                  • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,?,00000004,?,00000004,?,00000004,00000003,00000003,?,?,00000003,00000000,?), ref: 100017A7
                                  • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,00000004,?,00000004,?,00000004,00000003,00000003,?,?,00000003,00000000,?), ref: 100017B0
                                  • _CxxThrowException.MSVCRT(?,10005370), ref: 100017CD
                                  • ??3@YAXPAX@Z.MSVCRT(00000000,?,10005370,?,00000004,?,00000004,?,00000004,00000003,00000003,?,?,00000003,00000000,?), ref: 100017DC
                                  • ??3@YAXPAX@Z.MSVCRT(?,?,10005370,?,00000004,?,00000004,?,00000004,00000003,00000003,?,?,00000003,00000000,?), ref: 100017EA
                                    • Part of subcall function 10001863: ??2@YAPAXI@Z.MSVCRT(1000381E,?,00000144,00000000,1000381E,000000C8,00000144), ref: 10001884
                                    • Part of subcall function 10001863: memcpy.MSVCRT(00000000,000000C8,1000381E,?,00000144,00000000,1000381E,000000C8,00000144), ref: 1000189C
                                    • Part of subcall function 10001863: ??3@YAXPAX@Z.MSVCRT(00000144,00000144,1000381E,1000381E,00000004,1000381E,00000004,000000C8,00000004,?,00000003,?,00000144,00000000), ref: 100018F3
                                    • Part of subcall function 10001863: ??2@YAPAXI@Z.MSVCRT(00000001,00000144,00000144,1000381E,1000381E,00000004,1000381E,00000004,000000C8,00000004,?,00000003,?,00000144,00000000), ref: 100018FB
                                    • Part of subcall function 10001863: memcpy.MSVCRT(00000000,000000C8,00000001,00000001,00000144,00000144,1000381E,1000381E,00000004,1000381E,00000004,000000C8,00000004,?,00000003,?), ref: 1000190A
                                    • Part of subcall function 10001863: ??3@YAXPAX@Z.MSVCRT(00000000,00000144,00000001,00000004,000000C8,00000004,?,00000003,?,00000144,00000000), ref: 10001932
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: ??3@$??2@memcpy$ExceptionThrowmemcmp$H_prolog
                                  • String ID: P`$``
                                  • API String ID: 1493374972-3525061398
                                  • Opcode ID: 10262e34717a2dc6bb8153166a79431bc9c49f8163c052bb3b4c512cb2356511
                                  • Instruction ID: 8fe5d1832865b8ccca8e0fc317077c96d8ecfcaf39360939d2f87a7bcfb0ed6c
                                  • Opcode Fuzzy Hash: 10262e34717a2dc6bb8153166a79431bc9c49f8163c052bb3b4c512cb2356511
                                  • Instruction Fuzzy Hash: 1E51B4B5A00109ABFF44DFA4CD82EEEB7BAFF48680F004019F605A7185DF75AA50CB95

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 265 100031d2-10003244 LoadLibraryA GetProcAddress * 3 LoadLibraryA GetProcAddress 268 10003246-1000325b 265->268 269 1000325d-1000325f 265->269 268->269 272 10003264-10003268 268->272 270 100032f2-100032f6 269->270 273 1000326d-10003282 272->273 275 10003284-1000329a 273->275 276 100032d5-100032e0 273->276 281 100032ca-100032d3 275->281 282 1000329c-100032b7 275->282 279 100032e2-100032e3 FreeLibrary 276->279 280 100032e5-100032e8 276->280 279->280 283 100032ea-100032ed FreeLibrary 280->283 284 100032ef 280->284 281->273 287 100032c1-100032c5 282->287 288 100032b9-100032bc 282->288 283->284 284->270 287->281 288->287
                                  APIs
                                  • LoadLibraryA.KERNEL32(Ole32.dll,?,00000144,00000000), ref: 100031E6
                                  • GetProcAddress.KERNEL32(00000000,CoInitialize), ref: 100031F6
                                  • GetProcAddress.KERNEL32(00000000,CoUninitialize), ref: 10003201
                                  • GetProcAddress.KERNEL32(00000000,CoCreateInstance), ref: 1000320C
                                  • LoadLibraryA.KERNEL32(Oleaut32.dll,?,?,?,?,?,?,?,?,?,?,?,?,100037D5), ref: 10003216
                                  • GetProcAddress.KERNEL32(00000000,SysFreeString), ref: 10003221
                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,100037D5), ref: 100032E3
                                  • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,100037D5), ref: 100032ED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressLibraryProc$FreeLoad
                                  • String ID: CoCreateInstance$CoInitialize$CoUninitialize$FriendlyName$Ole32.dll$Oleaut32.dll$SysFreeString
                                  • API String ID: 2256533930-3340630095
                                  • Opcode ID: f1eadba59b2ebd071f72d2f7cbb709308b938fb940b81a85d55ffd123040d419
                                  • Instruction ID: 1885695b6b8551886770f00f979ae30a25f1f1d427a69892d216d7985a67bda5
                                  • Opcode Fuzzy Hash: f1eadba59b2ebd071f72d2f7cbb709308b938fb940b81a85d55ffd123040d419
                                  • Instruction Fuzzy Hash: 1641EA70A00219AFEB01DBA5CC88DEFBBBDFF89795B208459F505E7258D7719901CBA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 298 10004369-10004416 LoadLibraryA GetProcAddress * 4 LoadLibraryA GetProcAddress 302 10004425-10004428 298->302 303 10004418-10004423 298->303 304 1000442e-10004448 call 1000444c 302->304 303->302 307 1000442a 303->307 307->304
                                  APIs
                                  • LoadLibraryA.KERNEL32(user32.dll,00000000,00000000,00000000), ref: 1000439A
                                  • GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 100043AD
                                  • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 100043B8
                                  • GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 100043C3
                                  • GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 100043D1
                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 100043DB
                                  • GetProcAddress.KERNEL32(00000000,GetCurrentThreadId), ref: 100043E6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: CloseDesktop$GetCurrentThreadId$GetThreadDesktop$GetUserObjectInformationA$SetThreadDesktop$kernel32.dll$user32.dll
                                  • API String ID: 2238633743-588083535
                                  • Opcode ID: 4c1376e7f27bce54e3710619517fe6f641db0fdfb4de06b67931ee9d63f56ed5
                                  • Instruction ID: 67ebd5df9d46fa76e82372fdf0c3b5a8e4a25dc64441a3b0318b74b919e85c2a
                                  • Opcode Fuzzy Hash: 4c1376e7f27bce54e3710619517fe6f641db0fdfb4de06b67931ee9d63f56ed5
                                  • Instruction Fuzzy Hash: 212107B1D00228BBEB10EFA5DC44BEEBAFDEB48391F114126F911F2254DB7459408F64
                                  APIs
                                  • memset.MSVCRT ref: 100036D4
                                  • wsprintfA.USER32 ref: 100036F4
                                  • lstrlenA.KERNEL32(?,00000000), ref: 10003706
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 10004857
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 1000486A
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 10004878
                                    • Part of subcall function 10004822: LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004885
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 1000489D
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegOpenKeyExA), ref: 100048AD
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegEnumValueA), ref: 100048BD
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegEnumKeyExA), ref: 100048CA
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegCloseKey), ref: 100048D7
                                    • Part of subcall function 10004822: FreeLibrary.KERNEL32(?,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004A63
                                  • memset.MSVCRT ref: 10003738
                                  • getsockname.WS2_32(?,?,?), ref: 10003751
                                  • memcpy.MSVCRT(?,?,00000004), ref: 10003764
                                    • Part of subcall function 100035EA: lstrlenA.KERNEL32(?,?,1000377E,?,00000032,?,?,?,00000004), ref: 10003611
                                    • Part of subcall function 100035EA: gethostname.WS2_32(?,?), ref: 10003621
                                  • GetVersionExA.KERNEL32(?), ref: 10003792
                                    • Part of subcall function 1000358C: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 100035C9
                                    • Part of subcall function 1000358C: wsprintfA.USER32 ref: 100035DE
                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 100037B0
                                    • Part of subcall function 100031D2: LoadLibraryA.KERNEL32(Ole32.dll,?,00000144,00000000), ref: 100031E6
                                    • Part of subcall function 100031D2: GetProcAddress.KERNEL32(00000000,CoInitialize), ref: 100031F6
                                    • Part of subcall function 100031D2: GetProcAddress.KERNEL32(00000000,CoUninitialize), ref: 10003201
                                    • Part of subcall function 100031D2: GetProcAddress.KERNEL32(00000000,CoCreateInstance), ref: 1000320C
                                    • Part of subcall function 100031D2: LoadLibraryA.KERNEL32(Oleaut32.dll,?,?,?,?,?,?,?,?,?,?,?,?,100037D5), ref: 10003216
                                    • Part of subcall function 100031D2: GetProcAddress.KERNEL32(00000000,SysFreeString), ref: 10003221
                                    • Part of subcall function 1000366A: LoadLibraryA.KERNEL32(kernel32.dll,?,00000144,00000000,?,?,100037E0), ref: 10003676
                                    • Part of subcall function 1000366A: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 1000368E
                                    • Part of subcall function 1000366A: GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 10003698
                                    • Part of subcall function 1000366A: FreeLibrary.KERNEL32(00000000), ref: 100036AC
                                    • Part of subcall function 10003629: lstrlenA.KERNEL32(00000014,?,?,?,?,100037FD,?,00000014,?), ref: 10003650
                                    • Part of subcall function 10003629: lstrcpyA.KERNEL32(00000014,Error,?,?,?,?,100037FD,?,00000014,?), ref: 10003662
                                  • lstrcpyA.KERNEL32(?,10006514), ref: 10003809
                                    • Part of subcall function 10001863: ??2@YAPAXI@Z.MSVCRT(1000381E,?,00000144,00000000,1000381E,000000C8,00000144), ref: 10001884
                                    • Part of subcall function 10001863: memcpy.MSVCRT(00000000,000000C8,1000381E,?,00000144,00000000,1000381E,000000C8,00000144), ref: 1000189C
                                    • Part of subcall function 10001863: ??3@YAXPAX@Z.MSVCRT(00000144,00000144,1000381E,1000381E,00000004,1000381E,00000004,000000C8,00000004,?,00000003,?,00000144,00000000), ref: 100018F3
                                    • Part of subcall function 10001863: ??2@YAPAXI@Z.MSVCRT(00000001,00000144,00000144,1000381E,1000381E,00000004,1000381E,00000004,000000C8,00000004,?,00000003,?,00000144,00000000), ref: 100018FB
                                    • Part of subcall function 10001863: memcpy.MSVCRT(00000000,000000C8,00000001,00000001,00000144,00000144,1000381E,1000381E,00000004,1000381E,00000004,000000C8,00000004,?,00000003,?), ref: 1000190A
                                    • Part of subcall function 10001863: ??3@YAXPAX@Z.MSVCRT(00000000,00000144,00000001,00000004,000000C8,00000004,?,00000003,?,00000144,00000000), ref: 10001932
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$Library$memset$Load$lstrlenmemcpy$??2@??3@Freelstrcpywsprintf$GlobalInfoMemoryStatusSystemVersiongethostnamegetsockname
                                  • String ID: @$Group$SYSTEM\CurrentControlSet\Services\%s$SySe
                                  • API String ID: 1875266911-3168783696
                                  • Opcode ID: 955314d3c9f2b6115b712ce9295eb8f3d277e00088749fc94f886e12991fb5ce
                                  • Instruction ID: 3133a6343b416fd9d4de8abc7d75c938e5c6614370202d51db2fcbf0203c4673
                                  • Opcode Fuzzy Hash: 955314d3c9f2b6115b712ce9295eb8f3d277e00088749fc94f886e12991fb5ce
                                  • Instruction Fuzzy Hash: 2C41FDB690121CAAEB10DBA4CC49FCEB7BCEB08340F104496F609E7195DB74AB448FA1
                                  APIs
                                  • printf.MSVCRT ref: 100024B8
                                  • printf.MSVCRT ref: 100024C9
                                  • memset.MSVCRT ref: 100024FC
                                  • memcpy.MSVCRT(10006CF0,00000000,00000063,10006CF0,00000000,00000063,00000001), ref: 10002505
                                  • ??2@YAPAXI@Z.MSVCRT(-00000064,10006CF0,00000000,00000063,10006CF0,00000000,00000063,00000001), ref: 1000250E
                                  • memcpy.MSVCRT(00000000,00000000,-00000064,-00000064,10006CF0,00000000,00000063,10006CF0,00000000,00000063,00000001), ref: 1000251B
                                  • printf.MSVCRT ref: 10002537
                                  • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10002561
                                  • printf.MSVCRT ref: 10002573
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: printf$memcpy$??2@??3@memset
                                  • String ID: Can't load library from memory.$Loop_Proxy$OpenProxy$hmProxy!= NULL
                                  • API String ID: 60333908-620223428
                                  • Opcode ID: 1d0c7509cf9b4937be937c3ffef0e8e5e866c158fea0c4347d35d9917c06a107
                                  • Instruction ID: 34426b20c795a1564e6a7497d8f5fa3a22278249d6d1bd148d0ebd3529ec88d4
                                  • Opcode Fuzzy Hash: 1d0c7509cf9b4937be937c3ffef0e8e5e866c158fea0c4347d35d9917c06a107
                                  • Instruction Fuzzy Hash: 07112B76A045247FF200E7B0AD45FAF339ECB087D6F210026FA009605EEE756D0043A9
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 10001E3C
                                  • wsprintfA.USER32 ref: 10001E7B
                                    • Part of subcall function 10001B5B: OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,?,00000000), ref: 10001B96
                                    • Part of subcall function 10001B5B: _local_unwind2.MSVCRT ref: 10001BA9
                                  • wsprintfA.USER32 ref: 10001EAE
                                  • strlen.MSVCRT ref: 10001EBB
                                    • Part of subcall function 10004A93: LoadLibraryA.KERNEL32(ADVAPI32.dll,?,00000000,?), ref: 10004AC0
                                    • Part of subcall function 10004A93: GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 10004AD7
                                    • Part of subcall function 10004A93: GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10004AE2
                                    • Part of subcall function 10004A93: GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 10004AED
                                    • Part of subcall function 10004A93: GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10004AF8
                                    • Part of subcall function 10004A93: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10004B03
                                    • Part of subcall function 10004A93: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 10004B0E
                                    • Part of subcall function 10004A93: FreeLibrary.KERNEL32(00000000,?,00000000,?), ref: 10004C02
                                  • memset.MSVCRT ref: 10001EEE
                                  • lstrcpyA.KERNEL32(?,SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost), ref: 10001F02
                                  • lstrlenA.KERNEL32(?,00000001), ref: 10001F0B
                                    • Part of subcall function 10001A43: OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,SySe,?,?,?,?,?,?,?,10003043,SySe), ref: 10001A54
                                    • Part of subcall function 10001A43: OpenServiceA.ADVAPI32(00000000,?,000F01FF,?,?,?,?,?,?,?,10003043,SySe), ref: 10001A69
                                    • Part of subcall function 10001A43: StartServiceA.ADVAPI32(00000000,00000000,00000000,?,?,?,?,?,?,?,10003043,SySe), ref: 10001A7A
                                    • Part of subcall function 10001A43: GetLastError.KERNEL32(?,?,?,?,?,?,?,10003043,SySe), ref: 10001A84
                                    • Part of subcall function 10001A43: CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,?,10003043,SySe), ref: 10001A92
                                    • Part of subcall function 10001A43: CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,?,10003043,SySe), ref: 10001AC2
                                  Strings
                                  • SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost, xrefs: 10001EFC
                                  • ServiceDll, xrefs: 10001ED2
                                  • SYSTEM\CurrentControlSet\Services\%s\Parameters, xrefs: 10001EA8
                                  • %%SystemRoot%%\System32\svchost.exe -k "%s", xrefs: 10001E6F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$Service$Open$CloseHandleLibraryManagerwsprintf$ErrorFreeH_prologLastLoadStart_local_unwind2lstrcpylstrlenmemsetstrlen
                                  • String ID: %%SystemRoot%%\System32\svchost.exe -k "%s"$SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost$SYSTEM\CurrentControlSet\Services\%s\Parameters$ServiceDll
                                  • API String ID: 1573142492-3522277913
                                  • Opcode ID: 0128ef592e1c99bbe64aa5232a117bdd0909c69419edbc971054f239723094cd
                                  • Instruction ID: b0e3a08bed4d5a752cfc5ae4754fd9917613b9386cafdbad90e7966b10716f67
                                  • Opcode Fuzzy Hash: 0128ef592e1c99bbe64aa5232a117bdd0909c69419edbc971054f239723094cd
                                  • Instruction Fuzzy Hash: D9217EB290011CBBEB10DF94DC86EEF7B7DEB48780F104069FA08A2145EB715F558BA6
                                  APIs
                                    • Part of subcall function 10001ACF: OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 10001ADF
                                    • Part of subcall function 10001ACF: OpenServiceA.ADVAPI32(00000000,?,000F01FF), ref: 10001AF5
                                    • Part of subcall function 10001ACF: QueryServiceStatus.ADVAPI32(00000000,?), ref: 10001B06
                                    • Part of subcall function 10001ACF: ControlService.ADVAPI32(00000000,00000001,?), ref: 10001B1D
                                    • Part of subcall function 10001ACF: Sleep.KERNEL32(0000000A), ref: 10001B2F
                                    • Part of subcall function 10001ACF: QueryServiceStatus.ADVAPI32(00000000,?), ref: 10001B3A
                                    • Part of subcall function 10001ACF: CloseServiceHandle.ADVAPI32(00000000), ref: 10001B43
                                    • Part of subcall function 10001ACF: CloseServiceHandle.ADVAPI32(00000000), ref: 10001B4A
                                    • Part of subcall function 100020C8: GetModuleFileNameA.KERNEL32(?,00000104), ref: 100020E5
                                    • Part of subcall function 100020C8: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 100020F3
                                    • Part of subcall function 100020C8: GetTickCount.KERNEL32 ref: 100020F9
                                    • Part of subcall function 100020C8: wsprintfA.USER32 ref: 10002113
                                    • Part of subcall function 100020C8: MoveFileA.KERNEL32(?,?), ref: 1000212A
                                    • Part of subcall function 100020C8: MoveFileExA.KERNEL32(?,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 1000213B
                                  • wsprintfA.USER32 ref: 10002FC4
                                  • CreateProcessA.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 10002FE7
                                  • GetModuleFileNameA.KERNEL32(?,00000104), ref: 10002FFF
                                  • GetFileAttributesA.KERNEL32(?), ref: 1000300C
                                  • GetLastError.KERNEL32 ref: 10003018
                                  • Sleep.KERNEL32(000003E8), ref: 10003028
                                  • GetFileAttributesA.KERNEL32(?), ref: 10003035
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: FileService$AttributesCloseHandleModuleMoveNameOpenQuerySleepStatuswsprintf$ControlCountCreateDirectoryErrorLastManagerProcessSystemTick
                                  • String ID: D$GUpdate%s$SySe$WinSta0\Default
                                  • API String ID: 3185690247-240907611
                                  • Opcode ID: 677340bbb3e7d3deb07a041f04dc4ca50ceeb01c397db1cab97bb9b2955d953d
                                  • Instruction ID: ebf8a919204883b3cf295611002b4e487a781f5c3db184b4aeea1269bd5b3cbf
                                  • Opcode Fuzzy Hash: 677340bbb3e7d3deb07a041f04dc4ca50ceeb01c397db1cab97bb9b2955d953d
                                  • Instruction Fuzzy Hash: EB11B672401269AFFB11DBA0CC45EDF37BEFF09381F204051F506E2098DBB49A088BA1
                                  APIs
                                  • LoadLibraryA.KERNEL32(kernel32.dll), ref: 10004750
                                  • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 10004764
                                  • GetProcAddress.KERNEL32(00000000,Process32First), ref: 1000476E
                                  • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 10004779
                                  • lstrcmpiA.KERNEL32(?,?), ref: 100047B1
                                  • CloseHandle.KERNEL32(00000000), ref: 100047D0
                                  • FreeLibrary.KERNEL32(00000000), ref: 100047DB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$Library$CloseFreeHandleLoadlstrcmpi
                                  • String ID: CreateToolhelp32Snapshot$Process32First$Process32Next$kernel32.dll
                                  • API String ID: 1314729832-4285911020
                                  • Opcode ID: edd1cf7752d3c0a317ed2cc814c912f2b541baf62ab1e742b5b3ac3e1cc50ead
                                  • Instruction ID: 62e2a4d820bdf17ee503cc2422b7b88c1aaff87933f8729642c2e5364a3b347a
                                  • Opcode Fuzzy Hash: edd1cf7752d3c0a317ed2cc814c912f2b541baf62ab1e742b5b3ac3e1cc50ead
                                  • Instruction Fuzzy Hash: F3115E71D01228ABFB10DB618C88FEEBBF8EF497C1F110095E904E2144DB75AA408AA4
                                  APIs
                                  • memcpy.MSVCRT(?,?,00000170), ref: 100029D2
                                  • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 10002A05
                                  • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 10002A28
                                  • CloseHandle.KERNEL32(00000000), ref: 10002A3A
                                  • strlen.MSVCRT ref: 10002A47
                                  • wsprintfA.USER32 ref: 10002A6B
                                  • lstrcpyA.KERNEL32(?,?), ref: 10002A84
                                    • Part of subcall function 100027BC: memset.MSVCRT ref: 100027D8
                                    • Part of subcall function 100027BC: strrchr.MSVCRT ref: 100027E2
                                    • Part of subcall function 100027BC: strrchr.MSVCRT ref: 10002811
                                    • Part of subcall function 100027BC: strlen.MSVCRT ref: 10002821
                                    • Part of subcall function 100027BC: strncpy.MSVCRT ref: 1000283B
                                    • Part of subcall function 100027BC: memset.MSVCRT ref: 10002889
                                    • Part of subcall function 100027BC: wsprintfA.USER32 ref: 100028A4
                                    • Part of subcall function 100027BC: memset.MSVCRT ref: 100028B3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: memset$Filestrlenstrrchrwsprintf$CloseCreateHandleWritelstrcpymemcpystrncpy
                                  • String ID: %s %s$01#v$.#v
                                  • API String ID: 3641787489-3526099317
                                  • Opcode ID: 5a089fb692a77de50dca985f2a1d46a33a195534b01f1893c6a9a2dd3832bb26
                                  • Instruction ID: 17f6a9bfa48d753ffad60fceaecdc7a51846e01dcf90a102910361a13764abaa
                                  • Opcode Fuzzy Hash: 5a089fb692a77de50dca985f2a1d46a33a195534b01f1893c6a9a2dd3832bb26
                                  • Instruction Fuzzy Hash: B5318972A001196FFB60DBA4CC89FDB73ACDB05395F104562F608E2085EF71AE44CB61
                                  APIs
                                  • LoadLibraryA.KERNEL32(kernel32.dll,00000000,?,?,?,?,?,1000397D), ref: 10003BC4
                                  • GetProcAddress.KERNEL32(00000000,IsBadReadPtr), ref: 10003BD3
                                  • LoadLibraryA.KERNEL32(?,?,?,?,1000397D), ref: 10003C0D
                                  • realloc.MSVCRT ref: 10003C2C
                                  • GetProcAddress.KERNEL32(?,?), ref: 10003C85
                                  • FreeLibrary.KERNEL32(?,1000397D), ref: 10003CC7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: Library$AddressLoadProc$Freerealloc
                                  • String ID: IsBadReadPtr$kernel32.dll
                                  • API String ID: 343009874-2271619998
                                  • Opcode ID: 449202d9bcd9b40c7640628575b91c895d67466b70a0093317474b01c75d12b5
                                  • Instruction ID: afc84e2e1f51588ee312ba66ad041d110bb41dc23133337ce681a0c6c223f4ac
                                  • Opcode Fuzzy Hash: 449202d9bcd9b40c7640628575b91c895d67466b70a0093317474b01c75d12b5
                                  • Instruction Fuzzy Hash: 45410571A0021AABFB51CF64C889B9EBBF8FF04395F118069E905E7259D735EE44CB90
                                  APIs
                                  • strlen.MSVCRT ref: 10002C9F
                                  • ??2@YAPAXI@Z.MSVCRT(00000001), ref: 10002CB3
                                  • memcpy.MSVCRT(00000000,?,00000001,00000001), ref: 10002CBF
                                  • strrchr.MSVCRT ref: 10002CC7
                                  • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10002D27
                                    • Part of subcall function 10004529: LoadLibraryA.KERNEL32(wininet.dll,?,00000001,00000000), ref: 1000454D
                                    • Part of subcall function 10004529: GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 10004564
                                    • Part of subcall function 10004529: GetProcAddress.KERNEL32(00000000,InternetOpenUrlA), ref: 1000457E
                                    • Part of subcall function 10004529: FreeLibrary.KERNEL32(00000000,?,00000001,00000000), ref: 1000459C
                                    • Part of subcall function 1000248B: GetFileAttributesA.KERNEL32(00000001,10002CE8,00000001), ref: 1000248F
                                    • Part of subcall function 1000248B: GetLastError.KERNEL32 ref: 1000249A
                                  • CreateProcessA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 10002D18
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressLibraryProc$??2@??3@AttributesCreateErrorFileFreeLastLoadProcessmemcpystrlenstrrchr
                                  • String ID: D$WinSta0\Default
                                  • API String ID: 1737965409-1101385590
                                  • Opcode ID: fdc65b0dcff99aff6c43371ba455fda07db6a1f497c56a226c9a0abe83cfdb15
                                  • Instruction ID: 4c329e371b8b631c085a2e87808acd0a5feba54148e937fde04f6f1ec7f3be4b
                                  • Opcode Fuzzy Hash: fdc65b0dcff99aff6c43371ba455fda07db6a1f497c56a226c9a0abe83cfdb15
                                  • Instruction Fuzzy Hash: 6F01E1B75012286AFB01DBE49C45EDF77ACDF093D5F114422FE05E604ADEB49D0582E4
                                  APIs
                                  • LoadLibraryA.KERNEL32(user32.dll,?,?,00000000,?,00000000,Function_00004CE2,10005170,000000FF,?,100042CA,00000000), ref: 1000448F
                                  • GetProcAddress.KERNEL32(00000000,OpenInputDesktop), ref: 100044A4
                                  • GetProcAddress.KERNEL32(00000000,OpenDesktopA), ref: 100044B0
                                  • GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 100044BC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad
                                  • String ID: CloseDesktop$OpenDesktopA$OpenInputDesktop$user32.dll
                                  • API String ID: 2238633743-3711086354
                                  • Opcode ID: c36e72de9a328b3aed83568275539afdfd72128828bb5f39de00532976b64ac8
                                  • Instruction ID: 34d8331da3f18528c44290a267cf2e76cab1e846e39b69c6303802ebf673ca42
                                  • Opcode Fuzzy Hash: c36e72de9a328b3aed83568275539afdfd72128828bb5f39de00532976b64ac8
                                  • Instruction Fuzzy Hash: A3116DB5D00229ABEB11DFA9CC44FDDBAF8FB0C790F214125F511F2254CB7158008BA4
                                  APIs
                                  • printf.MSVCRT ref: 1000240A
                                    • Part of subcall function 1000389D: VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E), ref: 100038D8
                                    • Part of subcall function 1000389D: VirtualAlloc.KERNEL32(00000000,?,00002000,00000004,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E), ref: 100038E8
                                    • Part of subcall function 1000389D: GetProcessHeap.KERNEL32(00000000,00000014,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E,?,10006E5C), ref: 100038F9
                                    • Part of subcall function 1000389D: HeapAlloc.KERNEL32(00000000,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E,?,10006E5C,?), ref: 10003900
                                    • Part of subcall function 1000389D: VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E), ref: 10003924
                                    • Part of subcall function 1000389D: VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E), ref: 10003933
                                    • Part of subcall function 1000389D: memcpy.MSVCRT(00000000,?,?,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E,?), ref: 10003944
                                  • OutputDebugStringA.KERNEL32(Can't load library from memory.,?,?,1000234E,?,10006E5C,?,00000000,00000000,?,?), ref: 10002421
                                  • printf.MSVCRT ref: 1000244D
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 10002462
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AllocVirtual$Heapprintf$DebugFreeOutputProcessStringmemcpy
                                  • String ID: Can't load library from memory.$LoadFromMemory $LoadFromMemory END---$PluginMe
                                  • API String ID: 2530445704-2282109540
                                  • Opcode ID: f0778e8a1c44c2343f6cf091ec4a36fe4ce25287fc1b95e6eb17d6c0cbbf42cd
                                  • Instruction ID: 01af0e0ac1652a7321e0a293c3daa08a0af86dfdeaa3eab1b942b575fdefc638
                                  • Opcode Fuzzy Hash: f0778e8a1c44c2343f6cf091ec4a36fe4ce25287fc1b95e6eb17d6c0cbbf42cd
                                  • Instruction Fuzzy Hash: C3F09636100114BBFF02AF90DC05FDE3B75EB897E2F348015FA0455069CF72581597A1
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(?,00000104), ref: 100020E5
                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 100020F3
                                  • GetTickCount.KERNEL32 ref: 100020F9
                                  • wsprintfA.USER32 ref: 10002113
                                  • MoveFileA.KERNEL32(?,?), ref: 1000212A
                                  • MoveFileExA.KERNEL32(?,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 1000213B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: File$Move$CountDirectoryModuleNameSystemTickwsprintf
                                  • String ID: %s\%d.bak
                                  • API String ID: 830686190-2116986511
                                  • Opcode ID: c8f7a2f9335d496cf424573f89800cf957bdb9276c51bc95e16fdfb109c3bf7e
                                  • Instruction ID: c4293e3e21d6716b8372ba05ce181a3280e6ef40116a7aaffd0535516b57a778
                                  • Opcode Fuzzy Hash: c8f7a2f9335d496cf424573f89800cf957bdb9276c51bc95e16fdfb109c3bf7e
                                  • Instruction Fuzzy Hash: BEF0A4BA800278ABEB10EB94CDCDECB777DEB18785F100191F755D2065DAB59684CFA0
                                  APIs
                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00000144,00000000,?,?,100037E0), ref: 10003676
                                  • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 1000368E
                                  • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 10003698
                                  • FreeLibrary.KERNEL32(00000000), ref: 100036AC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressLibraryProc$FreeLoad
                                  • String ID: GetCurrentProcess$IsWow64Process$kernel32.dll
                                  • API String ID: 2256533930-2522683910
                                  • Opcode ID: 34a6eaa16ec599896768d47b9751df638f2169115c1a8e10c5d2607526b1ef77
                                  • Instruction ID: ef67112214a51d6d1f3e9f06108ff16868adfdb602b3d8d3b658392e0a076cbe
                                  • Opcode Fuzzy Hash: 34a6eaa16ec599896768d47b9751df638f2169115c1a8e10c5d2607526b1ef77
                                  • Instruction Fuzzy Hash: CBF0A072A00314BBF701D7E58C98DAF7BBCDB886D1B104019FA00A3208DB739D0189B5
                                  APIs
                                  • Sleep.KERNEL32(00000064), ref: 10002279
                                  • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 10002323
                                  • memcpy.MSVCRT(00000000,?,?), ref: 10002336
                                  • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 10002371
                                  • memcpy.MSVCRT(00000000,?,?), ref: 10002384
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AllocVirtualmemcpy$Sleep
                                  • String ID: GW2$SGSWh5-$SPh\n
                                  • API String ID: 1263862976-685354651
                                  • Opcode ID: 3d25bdad23a031e0b48f737afd54ec3eb76eea0dcd6b60b485997711385254f5
                                  • Instruction ID: 2f54f0f1129bbba38d4c41c0db51b56afb961a9339435d6967ffbe2678c67ccd
                                  • Opcode Fuzzy Hash: 3d25bdad23a031e0b48f737afd54ec3eb76eea0dcd6b60b485997711385254f5
                                  • Instruction Fuzzy Hash: E241F3B5104244BEF720DFA18CC6F7F7A6CEB457C4F10842AFA894548DCB76AE40A622
                                  APIs
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 10001ADF
                                  • OpenServiceA.ADVAPI32(00000000,?,000F01FF), ref: 10001AF5
                                  • QueryServiceStatus.ADVAPI32(00000000,?), ref: 10001B06
                                  • ControlService.ADVAPI32(00000000,00000001,?), ref: 10001B1D
                                  • Sleep.KERNEL32(0000000A), ref: 10001B2F
                                  • QueryServiceStatus.ADVAPI32(00000000,?), ref: 10001B3A
                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 10001B43
                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 10001B4A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: Service$CloseHandleOpenQueryStatus$ControlManagerSleep
                                  • String ID:
                                  • API String ID: 2359367111-0
                                  • Opcode ID: 5fba824a85b92acc79a789ef028bf042a0167ae6a51034b94a07b5d3b0519e81
                                  • Instruction ID: 13eb0d6c039a265936ccbdc891ea19e15248044979c42994c6487f454c48f15c
                                  • Opcode Fuzzy Hash: 5fba824a85b92acc79a789ef028bf042a0167ae6a51034b94a07b5d3b0519e81
                                  • Instruction Fuzzy Hash: 87017531644627ABF7119BA09C89FFF7BBAEF0A7C1F204060FA01D509DEB648542D6A1
                                  APIs
                                    • Part of subcall function 1000180A: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 1000182F
                                    • Part of subcall function 1000180A: CancelIo.KERNEL32(?,?,10001455,0000213A,00000000), ref: 10001838
                                    • Part of subcall function 1000180A: InterlockedExchange.KERNEL32(?,00000000), ref: 10001844
                                    • Part of subcall function 1000180A: closesocket.WS2_32(?), ref: 1000184D
                                    • Part of subcall function 1000180A: SetEvent.KERNEL32(?,?,10001455,0000213A,00000000), ref: 10001856
                                  • ResetEvent.KERNEL32(?,0000213A,00000000,00000000), ref: 10001458
                                  • socket.WS2_32(00000002,00000001,00000006), ref: 10001469
                                  • gethostbyname.WS2_32(?), ref: 1000147A
                                  • htons.WS2_32(?), ref: 1000148F
                                  • connect.WS2_32(?,00000002,00000010), ref: 100014AC
                                  • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 100014D1
                                  • WSAIoctl.WS2_32(?,98000004,?,0000000C,00000000,00000000,?,00000000,00000000), ref: 10001502
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: Eventsetsockopt$CancelExchangeInterlockedIoctlResetclosesocketconnectgethostbynamehtonssocket
                                  • String ID:
                                  • API String ID: 4281462294-0
                                  • Opcode ID: 3bd37e16282c1c1f21b19040e991c0c37f16a42726fa5d42d22308dc76884aca
                                  • Instruction ID: 8d33707021d861f585806a6466cff3f66270e93c65c897c0ed9a4eea2b4cd3d2
                                  • Opcode Fuzzy Hash: 3bd37e16282c1c1f21b19040e991c0c37f16a42726fa5d42d22308dc76884aca
                                  • Instruction Fuzzy Hash: 9421BD71500719BFE7109FA4CC84EEBBBF9EF09394F104529F602A62A4C7B29D449B20
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 100012D9
                                  • _CxxThrowException.MSVCRT(?,10005258), ref: 10001332
                                  • WSAStartup.WS2_32(00000202,?), ref: 10001343
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 10001350
                                  • memcpy.MSVCRT(?,00000068,00000003), ref: 10001379
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: CreateEventExceptionH_prologStartupThrowmemcpy
                                  • String ID: hx
                                  • API String ID: 80965288-1695387836
                                  • Opcode ID: 77854b9b63fc0fb3e868ca2b5d078d50e29d64ea9dc30742ffd87570b9eaf05b
                                  • Instruction ID: e29fc32a716e33b2e16fee5429824c3098a31f8f694cb1b228e84ed99c9fd0ff
                                  • Opcode Fuzzy Hash: 77854b9b63fc0fb3e868ca2b5d078d50e29d64ea9dc30742ffd87570b9eaf05b
                                  • Instruction Fuzzy Hash: 8211B4748013849EF710DBA8CD89BEEBBB8DF09384F50005DF141A7286DFB56A08CB62
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 100013BB
                                  • WaitForSingleObject.KERNEL32(?,000000FF,00000000,?,10002F56), ref: 100013DD
                                  • CloseHandle.KERNEL32(?,?,10002F56), ref: 100013F3
                                  • CloseHandle.KERNEL32(?,?,10002F56), ref: 100013FC
                                  • WSACleanup.WS2_32 ref: 10001402
                                    • Part of subcall function 1000180A: setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 1000182F
                                    • Part of subcall function 1000180A: CancelIo.KERNEL32(?,?,10001455,0000213A,00000000), ref: 10001838
                                    • Part of subcall function 1000180A: InterlockedExchange.KERNEL32(?,00000000), ref: 10001844
                                    • Part of subcall function 1000180A: closesocket.WS2_32(?), ref: 1000184D
                                    • Part of subcall function 1000180A: SetEvent.KERNEL32(?,?,10001455,0000213A,00000000), ref: 10001856
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: CloseHandle$CancelCleanupEventExchangeH_prologInterlockedObjectSingleWaitclosesocketsetsockopt
                                  • String ID: .#v
                                  • API String ID: 1476891362-507759092
                                  • Opcode ID: 22c76b733420cd5322f8b44b49fa99b01b9ed644fac333f7b406b2753b621805
                                  • Instruction ID: 3d7d7f28339fdf93618245a95348ecc54ac045937f8d7f2223a7296bdd3ad800
                                  • Opcode Fuzzy Hash: 22c76b733420cd5322f8b44b49fa99b01b9ed644fac333f7b406b2753b621805
                                  • Instruction Fuzzy Hash: C801A934812BA1DFE725DB64CA4979EBBF5EF047D0F20465CE0A3525EACBB16A04CB11
                                  APIs
                                  Strings
                                  • Rundll32 "%s",Uninstall, xrefs: 10002792
                                  • Rundll32 "%s",DllUpdate %s, xrefs: 10002774
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: wsprintf$ExecFileModuleName
                                  • String ID: Rundll32 "%s",DllUpdate %s$Rundll32 "%s",Uninstall
                                  • API String ID: 4265364758-3622515909
                                  • Opcode ID: 2fae55858e382da93d8a6581f30ac6264c287b13e5b54571d9062f30e9afb438
                                  • Instruction ID: 96afaeef2140f7acea31c6041c278450ca2d3413692d0236748e955fccce9fd0
                                  • Opcode Fuzzy Hash: 2fae55858e382da93d8a6581f30ac6264c287b13e5b54571d9062f30e9afb438
                                  • Instruction Fuzzy Hash: 0FF01875400228AFFB10DB50CC8DFCA777DEB08384F604191F659D2065DBB19698CF91
                                  APIs
                                  • LocalAlloc.KERNEL32(00000040,00000229,?,100022D7,?), ref: 10002616
                                  • memcpy.MSVCRT(00000001,www.sf2110.com,00000228,?,100022D7,?), ref: 10002633
                                  • LocalSize.KERNEL32(00000000), ref: 1000263C
                                    • Part of subcall function 10001863: ??2@YAPAXI@Z.MSVCRT(1000381E,?,00000144,00000000,1000381E,000000C8,00000144), ref: 10001884
                                    • Part of subcall function 10001863: memcpy.MSVCRT(00000000,000000C8,1000381E,?,00000144,00000000,1000381E,000000C8,00000144), ref: 1000189C
                                    • Part of subcall function 10001863: ??3@YAXPAX@Z.MSVCRT(00000144,00000144,1000381E,1000381E,00000004,1000381E,00000004,000000C8,00000004,?,00000003,?,00000144,00000000), ref: 100018F3
                                    • Part of subcall function 10001863: ??2@YAPAXI@Z.MSVCRT(00000001,00000144,00000144,1000381E,1000381E,00000004,1000381E,00000004,000000C8,00000004,?,00000003,?,00000144,00000000), ref: 100018FB
                                    • Part of subcall function 10001863: memcpy.MSVCRT(00000000,000000C8,00000001,00000001,00000144,00000144,1000381E,1000381E,00000004,1000381E,00000004,000000C8,00000004,?,00000003,?), ref: 1000190A
                                    • Part of subcall function 10001863: ??3@YAXPAX@Z.MSVCRT(00000000,00000144,00000001,00000004,000000C8,00000004,?,00000003,?,00000144,00000000), ref: 10001932
                                  • Sleep.KERNEL32(00000001,00000000,00000000), ref: 1000264F
                                  • LocalFree.KERNEL32(00000000), ref: 10002656
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: Localmemcpy$??2@??3@$AllocFreeSizeSleep
                                  • String ID: www.sf2110.com
                                  • API String ID: 3084024409-1396719888
                                  • Opcode ID: 2ebc1bcf665d22d67c7a361327471c09cc11f5b44399916a7679a62a2e06e5b5
                                  • Instruction ID: 6c6233c5ed4335591c5831c53d58df47d942e828471bf6846fd26331ce1e1182
                                  • Opcode Fuzzy Hash: 2ebc1bcf665d22d67c7a361327471c09cc11f5b44399916a7679a62a2e06e5b5
                                  • Instruction Fuzzy Hash: 1BE092750036317BF341ABA09C4DFCF3A6DEF097D1F044104FB49A5199CB51564187E6
                                  APIs
                                    • Part of subcall function 100012A4: VirtualFree.KERNEL32(?,00000000,00008000,?,10001878,?,00000144,00000000,1000381E,000000C8,00000144), ref: 100012B6
                                  • ??2@YAPAXI@Z.MSVCRT(1000381E,?,00000144,00000000,1000381E,000000C8,00000144), ref: 10001884
                                  • ??3@YAXPAX@Z.MSVCRT(00000144,00000144,1000381E,1000381E,00000004,1000381E,00000004,000000C8,00000004,?,00000003,?,00000144,00000000), ref: 100018F3
                                  • ??2@YAPAXI@Z.MSVCRT(00000001,00000144,00000144,1000381E,1000381E,00000004,1000381E,00000004,000000C8,00000004,?,00000003,?,00000144,00000000), ref: 100018FB
                                  • memcpy.MSVCRT(00000000,000000C8,00000001,00000001,00000144,00000144,1000381E,1000381E,00000004,1000381E,00000004,000000C8,00000004,?,00000003,?), ref: 1000190A
                                  • ??3@YAXPAX@Z.MSVCRT(00000000,00000144,00000001,00000004,000000C8,00000004,?,00000003,?,00000144,00000000), ref: 10001932
                                  • memcpy.MSVCRT(00000000,000000C8,1000381E,?,00000144,00000000,1000381E,000000C8,00000144), ref: 1000189C
                                    • Part of subcall function 1000104C: memcpy.MSVCRT(?,00000003,00000003,00000000,?,?,10001947,?,00000003,?,00000144,00000000,1000381E,000000C8,00000144), ref: 10001074
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: memcpy$??2@??3@$FreeVirtual
                                  • String ID:
                                  • API String ID: 494799333-0
                                  • Opcode ID: 4ee7b13994a7bebae5ea71dd6d5e065c25e5d167394b36d5181ca15b21c419c8
                                  • Instruction ID: a26a835bd5f016d956b68753e1f5501337bc07bd69db5d8cf19c0b84b9b19e4d
                                  • Opcode Fuzzy Hash: 4ee7b13994a7bebae5ea71dd6d5e065c25e5d167394b36d5181ca15b21c419c8
                                  • Instruction Fuzzy Hash: B631CBB9601204BBFF01EB64DD92FEE77AAEF44380F004019F605A6186DFB4BB149751
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: _strupr$MessageSendVisibleWindowlstrlenstrstr
                                  • String ID:
                                  • API String ID: 850376632-0
                                  • Opcode ID: 863bd39a3c954a72feaba740ccb092445ef11d91041d151f256abd7524e25783
                                  • Instruction ID: f84e90a798d893893a4456b5c45592e19e504f04fdea282cdc153707e49d09ee
                                  • Opcode Fuzzy Hash: 863bd39a3c954a72feaba740ccb092445ef11d91041d151f256abd7524e25783
                                  • Instruction Fuzzy Hash: 3001B9726002296FFF109F64DC49F9A7BBCEB04385F204076E705E6094DB71E9468BA4
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID:
                                  • API String ID: 3664257935-0
                                  • Opcode ID: f0b267456437bb5650b3bd9d655f830ec4ec3bf790c62446a31930fdfe0cb4b5
                                  • Instruction ID: d8b8667a67b2f2557cad44f9379b5e8f255c0c6237c58758e20748922239760e
                                  • Opcode Fuzzy Hash: f0b267456437bb5650b3bd9d655f830ec4ec3bf790c62446a31930fdfe0cb4b5
                                  • Instruction Fuzzy Hash: A6F0EC706007459AEA61EE7ACC44B17F3ECEF90AD1B028929A451D3694DA74EC458960
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: strlenwsprintf
                                  • String ID: Group$Remark$SYSTEM\CurrentControlSet\Services\%s$SySe
                                  • API String ID: 350797232-3298372318
                                  • Opcode ID: b298f06eb582685539f31f60401fdbef796c9698157982a35a7a39406c1ee736
                                  • Instruction ID: a3fc7b85e27bf4a01dcc346c82e5e7340bd10ea751e75b0120d021e994437014
                                  • Opcode Fuzzy Hash: b298f06eb582685539f31f60401fdbef796c9698157982a35a7a39406c1ee736
                                  • Instruction Fuzzy Hash: CCF065B6800124B7FF10AB54DC4AFDA3B6DDB083D4F1040E1FE0966158EBB55A94CBD1
                                  APIs
                                  • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E), ref: 100038D8
                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000004,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E), ref: 100038E8
                                  • GetProcessHeap.KERNEL32(00000000,00000014,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E,?,10006E5C), ref: 100038F9
                                  • HeapAlloc.KERNEL32(00000000,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E,?,10006E5C,?), ref: 10003900
                                  • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E), ref: 10003924
                                  • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E), ref: 10003933
                                  • memcpy.MSVCRT(00000000,?,?,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E,?), ref: 10003944
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: Alloc$Virtual$Heap$Processmemcpy
                                  • String ID:
                                  • API String ID: 2335822491-0
                                  • Opcode ID: e49d25e9bb0d4a180f47fe763da8cbfb8d19a32eb96c44da1c7ada0cf7328320
                                  • Instruction ID: eacb235572be496481c28daf470fd61b07f9ecf460b9dfe0afcc7509c1ddb230
                                  • Opcode Fuzzy Hash: e49d25e9bb0d4a180f47fe763da8cbfb8d19a32eb96c44da1c7ada0cf7328320
                                  • Instruction Fuzzy Hash: 88314A71600701AFE715CFA9CD85E6BBBECEF49794F118029F644DB285D7B0E9408BA4
                                  APIs
                                  • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E), ref: 100038D8
                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000004,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E), ref: 100038E8
                                  • GetProcessHeap.KERNEL32(00000000,00000014,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E,?,10006E5C), ref: 100038F9
                                  • HeapAlloc.KERNEL32(00000000,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E,?,10006E5C,?), ref: 10003900
                                  • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E), ref: 10003924
                                  • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E), ref: 10003933
                                  • memcpy.MSVCRT(00000000,?,?,?,75C24CB0,00000000,?,?,?,10002414,?,?,?,?,1000234E,?), ref: 10003944
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: Alloc$Virtual$Heap$Processmemcpy
                                  • String ID:
                                  • API String ID: 2335822491-0
                                  • Opcode ID: 9aa3b273a59eb2c0b2545a37afc38cd619bd195e7d1346904624c1b6da4ac45c
                                  • Instruction ID: 10317215f663cfab710d715b633d7b0dbc04a231647ffe3f91967b0172577e13
                                  • Opcode Fuzzy Hash: 9aa3b273a59eb2c0b2545a37afc38cd619bd195e7d1346904624c1b6da4ac45c
                                  • Instruction Fuzzy Hash: 69317A71600701AFEB15CBA8CD85F6BBBECEF49794F108029F645DB285D7B0E8008B64
                                  APIs
                                  • ceil.MSVCRT ref: 10001226
                                  • _ftol.MSVCRT ref: 1000122E
                                  • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,00000000,?,?,10001712,00000003), ref: 10001251
                                  • memcpy.MSVCRT(00000000,?,00000000,?,?,10001712,00000003), ref: 10001275
                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,?,10001712,00000003), ref: 10001287
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: Virtual$AllocFree_ftolceilmemcpy
                                  • String ID:
                                  • API String ID: 3927456183-0
                                  • Opcode ID: f94edee6810ba8cea6bfb4746a43b2bc9bf2551bc4d63573e388d815a9760473
                                  • Instruction ID: ff1c2b162e375ad2b81c3d4b25a5517a05f38efa8821d55832f31a3c03b13b4e
                                  • Opcode Fuzzy Hash: f94edee6810ba8cea6bfb4746a43b2bc9bf2551bc4d63573e388d815a9760473
                                  • Instruction Fuzzy Hash: 3A11C1B1700304ABF7549F65CC86B9FBBE9EB447D1F108429F655C6284DA71A8008760
                                  APIs
                                  • ceil.MSVCRT ref: 10001187
                                  • _ftol.MSVCRT ref: 1000118F
                                  • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,00000000,?,?,10001947,?,00000003,?,00000144), ref: 100011A3
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AllocVirtual_ftolceil
                                  • String ID:
                                  • API String ID: 3317677364-0
                                  • Opcode ID: 7f57421f4e8a0dbe28e4ec1d2025382d16bc9b97be7dafbce8d036dedad50421
                                  • Instruction ID: 1b5d6cedb6f753cdbab920be1aa23ddc9916300482f626f48fbf4534a1b153b9
                                  • Opcode Fuzzy Hash: 7f57421f4e8a0dbe28e4ec1d2025382d16bc9b97be7dafbce8d036dedad50421
                                  • Instruction Fuzzy Hash: 29119EB1700700ABF7189F65CC85BDFBAE8EB447D1F10842DFB4AC6694EAB5E8008764
                                  APIs
                                  • setsockopt.WS2_32(?,0000FFFF,00000080,00000000,00000004), ref: 1000182F
                                  • CancelIo.KERNEL32(?,?,10001455,0000213A,00000000), ref: 10001838
                                  • InterlockedExchange.KERNEL32(?,00000000), ref: 10001844
                                  • closesocket.WS2_32(?), ref: 1000184D
                                  • SetEvent.KERNEL32(?,?,10001455,0000213A,00000000), ref: 10001856
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                                  • String ID:
                                  • API String ID: 1486965892-0
                                  • Opcode ID: 1871585578dca608de80bf68f21ac6b78937bcf90260c740f92b3d4c82ad3011
                                  • Instruction ID: db2c71347286e861532d4f6efb444a5e96e0316710033133ccac3d22043cdb64
                                  • Opcode Fuzzy Hash: 1871585578dca608de80bf68f21ac6b78937bcf90260c740f92b3d4c82ad3011
                                  • Instruction Fuzzy Hash: 12F05E31000729EFEB209B95CC4EE9A7BB9FF08364F204528F382915F4DBB3A9449B50
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 100021A3
                                  • TerminateThread.KERNEL32(?,000000FF,0000213A,00000000,00000000,?,10002F05), ref: 100021CB
                                  • CloseHandle.KERNEL32(?,?,10002F05), ref: 100021D3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: CloseH_prologHandleTerminateThread
                                  • String ID: .#v
                                  • API String ID: 977738144-507759092
                                  • Opcode ID: f942fbd0e499d4cf21b5ec8bbe2cbe5843c9e0da49b9e854954a717c2909fbbe
                                  • Instruction ID: a8522333981b9843ad3281970ac5822235ad3633b8ee82379763b10bff34d37e
                                  • Opcode Fuzzy Hash: f942fbd0e499d4cf21b5ec8bbe2cbe5843c9e0da49b9e854954a717c2909fbbe
                                  • Instruction Fuzzy Hash: C9F09079A00751DFEB24DF58DC805DEB7B5FB483A1B21822EE17A92198CBB52901DF50
                                  APIs
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10004307
                                  • _beginthreadex.MSVCRT ref: 10004325
                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 10004335
                                  • CloseHandle.KERNEL32(?), ref: 1000433E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: CloseCreateEventHandleObjectSingleWait_beginthreadex
                                  • String ID:
                                  • API String ID: 92035984-0
                                  • Opcode ID: 4f24713aeb18b6c8055081ae489e524b02219a3e0fa4e6869f4180a6eb22546b
                                  • Instruction ID: faf95892778ea6415a1c54bed7ea38c560d5af97f962d2801ede21c28746a2bf
                                  • Opcode Fuzzy Hash: 4f24713aeb18b6c8055081ae489e524b02219a3e0fa4e6869f4180a6eb22546b
                                  • Instruction Fuzzy Hash: 93F097B1900119FFEF019FA8CC498AE7BB9FB08351B504565FD25E2264D7329A209B90
                                  APIs
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 10004857
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 1000486A
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 10004878
                                    • Part of subcall function 10004822: LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004885
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 1000489D
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegOpenKeyExA), ref: 100048AD
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegEnumValueA), ref: 100048BD
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegEnumKeyExA), ref: 100048CA
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegCloseKey), ref: 100048D7
                                    • Part of subcall function 10004822: FreeLibrary.KERNEL32(?,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004A63
                                  • lstrlenA.KERNEL32(00000014,?,?,?,?,100037FD,?,00000014,?), ref: 10003650
                                  • lstrcpyA.KERNEL32(00000014,Error,?,?,?,?,100037FD,?,00000014,?), ref: 10003662
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$memset$Library$FreeLoadlstrcpylstrlen
                                  • String ID: Error$InstallTime
                                  • API String ID: 2132864188-3993312925
                                  • Opcode ID: 05b9f159da249184b1e3b095e130b72a17f690af3a1cf10b62a6d9e74dba2db9
                                  • Instruction ID: e8fad5b45eeb662e546af45f25a3999bf1724c4d36ffe5c36dea95d3d4dec653
                                  • Opcode Fuzzy Hash: 05b9f159da249184b1e3b095e130b72a17f690af3a1cf10b62a6d9e74dba2db9
                                  • Instruction Fuzzy Hash: 9DE0BF31140648B7FF115F51CC46F9D3B5AEB187D6F108054FB08680A4DB7396A09789
                                  APIs
                                    • Part of subcall function 100042EE: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10004307
                                    • Part of subcall function 100042EE: _beginthreadex.MSVCRT ref: 10004325
                                    • Part of subcall function 100042EE: WaitForSingleObject.KERNEL32(?,000000FF), ref: 10004335
                                    • Part of subcall function 100042EE: CloseHandle.KERNEL32(?), ref: 1000433E
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 10003178
                                  • CloseHandle.KERNEL32(00000000), ref: 1000317F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: CloseHandleObjectSingleWait$CreateEvent_beginthreadex
                                  • String ID: .#v
                                  • API String ID: 1089044457-507759092
                                  • Opcode ID: 17d721387280f4c257e3238cd49efe249aff979b7a5e37610df1753b44f01f7e
                                  • Instruction ID: a1c9179e9ff13284b8660bf147a9eaea9a9923efbfad9c52f921b306abf4fa18
                                  • Opcode Fuzzy Hash: 17d721387280f4c257e3238cd49efe249aff979b7a5e37610df1753b44f01f7e
                                  • Instruction Fuzzy Hash: C8D022F64052303EFA0063B0EC08CFB360CCF052B0B310201FD14D10C8DA411C4103B9
                                  APIs
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 10004857
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 1000486A
                                    • Part of subcall function 10004822: memset.MSVCRT ref: 10004878
                                    • Part of subcall function 10004822: LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004885
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 1000489D
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegOpenKeyExA), ref: 100048AD
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegEnumValueA), ref: 100048BD
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegEnumKeyExA), ref: 100048CA
                                    • Part of subcall function 10004822: GetProcAddress.KERNEL32(?,RegCloseKey), ref: 100048D7
                                    • Part of subcall function 10004822: FreeLibrary.KERNEL32(?,?,?,?,?,?,?,0000213A,00000144,00000000), ref: 10004A63
                                  • lstrlenA.KERNEL32(?,?,1000377E,?,00000032,?,?,?,00000004), ref: 10003611
                                  • gethostname.WS2_32(?,?), ref: 10003621
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AddressProc$memset$Library$FreeLoadgethostnamelstrlen
                                  • String ID: Remark
                                  • API String ID: 619171837-3865500943
                                  • Opcode ID: 83dbbab8dfa45e9539ae4d59c493a246dad8b5cf60af1f24285e8dd54035da6b
                                  • Instruction ID: 39b077b3adc2da00c1cb4508d3157ec8a6411d10b118cb0f162994d28e94cfda
                                  • Opcode Fuzzy Hash: 83dbbab8dfa45e9539ae4d59c493a246dad8b5cf60af1f24285e8dd54035da6b
                                  • Instruction Fuzzy Hash: BDE0B635240219BBEF125F91CC46F9E3F2AEB087D1F108014FB18681A5DB739660AB89
                                  APIs
                                  • VirtualAlloc.KERNEL32(?,?,00001000,00000004,00000000,?,?), ref: 10003A10
                                  • memset.MSVCRT ref: 10003A1B
                                  • VirtualAlloc.KERNEL32(?,?,00001000,00000004,00000000,?,?), ref: 10003A31
                                  • memcpy.MSVCRT(00000000,?,?), ref: 10003A40
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4610411485.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                  • Associated: 00000003.00000002.4610385881.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610438233.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610463850.0000000010006000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.4610490577.0000000010007000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_10000000_svchost.jbxd
                                  Similarity
                                  • API ID: AllocVirtual$memcpymemset
                                  • String ID:
                                  • API String ID: 2542864682-0
                                  • Opcode ID: a05ca4ebf277b10faf3ccce4336dd2b651ae8b873c4573ed6e3e9fab059df227
                                  • Instruction ID: 4a5287acb012e3640f8314301f41164344c56cf0a301795e67bafcb82fb77477
                                  • Opcode Fuzzy Hash: a05ca4ebf277b10faf3ccce4336dd2b651ae8b873c4573ed6e3e9fab059df227
                                  • Instruction Fuzzy Hash: 82213871A00208AFEB11CF59CC81F9AB7F8FF44344F118459E9809B251D770AA50CB54

                                  Execution Graph

                                  Execution Coverage:12.4%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:19.6%
                                  Total number of Nodes:678
                                  Total number of Limit Nodes:13
                                  execution_graph 2334 b648b7 2335 b64979 2334->2335 2336 b648cf 2334->2336 2336->2335 2355 b64b58 WaitForSingleObjectEx 2336->2355 2339 b6496c 2339->2335 2342 b62a77 13 API calls 2339->2342 2342->2335 2343 b646ca 15 API calls 2344 b64920 2343->2344 2345 b64925 GetLastError 2344->2345 2346 b6493f 2344->2346 2365 b62a77 ReleaseMutex 2345->2365 2370 b64b03 2346->2370 2353 b6495b GetProcessHeap HeapFree 2353->2339 2356 b64903 2355->2356 2357 b64b79 2355->2357 2356->2339 2360 b646ca 2356->2360 2357->2356 2386 b62a26 2357->2386 2361 b646f0 2360->2361 2362 b646d9 GetLastError 2360->2362 2361->2343 2363 b62a52 13 API calls 2362->2363 2364 b646e8 SetLastError 2363->2364 2364->2361 2366 b62a8d 2365->2366 2367 b62a89 SetLastError 2365->2367 2453 b62a11 2366->2453 2367->2346 2371 b64947 2370->2371 2374 b64b1a 2370->2374 2375 b649b2 2371->2375 2373 b64b2f GetProcessHeap HeapFree 2373->2374 2374->2371 2465 b62e62 2374->2465 2376 b649c5 2375->2376 2377 b649bd 2375->2377 2379 b6494e 2376->2379 2380 b62a52 13 API calls 2376->2380 2378 b62a52 13 API calls 2377->2378 2378->2376 2379->2353 2381 b62a52 CloseHandle 2379->2381 2380->2379 2382 b62a64 2381->2382 2383 b62a68 2381->2383 2382->2353 2384 b62a11 12 API calls 2383->2384 2385 b62a76 2384->2385 2389 b62916 2386->2389 2392 b62843 2389->2392 2393 b62855 2392->2393 2404 b625b2 2393->2404 2396 b628f5 2399 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2396->2399 2398 b628c5 2416 b627d1 2398->2416 2401 b62906 2399->2401 2405 b625e1 2404->2405 2406 b625eb 2404->2406 2405->2406 2407 b62916 8 API calls 2405->2407 2408 b6265b GetCurrentThreadId 2406->2408 2407->2406 2409 b626aa 2408->2409 2410 b627cb 2409->2410 2411 b62737 IsDebuggerPresent 2409->2411 2413 b62728 2409->2413 2411->2413 2412 b627a0 OutputDebugStringW 2415 b62747 2412->2415 2413->2412 2413->2415 2420 b62100 2413->2420 2415->2396 2415->2398 2417 b627e7 2416->2417 2418 b627f2 memset 2416->2418 2417->2418 2419 b62820 2418->2419 2421 b622ca 2420->2421 2424 b6212c 2420->2424 2422 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2421->2422 2423 b62307 2422->2423 2423->2412 2424->2421 2425 b621b4 FormatMessageW 2424->2425 2426 b621f3 2425->2426 2427 b6220a 2425->2427 2449 b620aa 2426->2449 2429 b620aa _vsnwprintf 2427->2429 2430 b62205 2429->2430 2431 b62235 GetCurrentThreadId 2430->2431 2433 b620aa _vsnwprintf 2430->2433 2432 b620aa _vsnwprintf 2431->2432 2435 b6225b 2432->2435 2434 b62230 2433->2434 2434->2431 2435->2421 2436 b620aa _vsnwprintf 2435->2436 2437 b6227f 2436->2437 2438 b62297 2437->2438 2439 b620aa _vsnwprintf 2437->2439 2440 b622af 2438->2440 2443 b620aa _vsnwprintf 2438->2443 2439->2438 2441 b622cf 2440->2441 2442 b622b8 2440->2442 2445 b622d5 2441->2445 2446 b622e9 2441->2446 2444 b620aa _vsnwprintf 2442->2444 2443->2440 2444->2421 2447 b620aa _vsnwprintf 2445->2447 2448 b620aa _vsnwprintf 2446->2448 2447->2421 2448->2421 2450 b620bc 2449->2450 2452 b620d4 2449->2452 2451 b6201a _vsnwprintf 2450->2451 2450->2452 2451->2452 2452->2430 2452->2452 2456 b6293d 2453->2456 2461 b6251b GetLastError 2456->2461 2459 b62843 11 API calls 2460 b62985 2459->2460 2462 b62530 2461->2462 2463 b62548 2461->2463 2464 b62916 11 API calls 2462->2464 2463->2459 2464->2463 2466 b62ea2 GetProcessHeap HeapFree 2465->2466 2467 b62e78 2465->2467 2466->2373 2468 b62e7c GetProcessHeap HeapFree 2467->2468 2468->2468 2469 b62e9e 2468->2469 2469->2466 2470 b61db5 2473 b66483 2470->2473 2476 b663e0 2473->2476 2477 b663ec 2476->2477 2478 b66413 _lock __dllonexit 2477->2478 2479 b663fd _onexit 2477->2479 2483 b6647a _unlock 2478->2483 2482 b61dba 2479->2482 2483->2482 2484 b61e30 2487 b653ad InitOnceExecuteOnce 2484->2487 2486 b61e35 2487->2486 2492 b660ba 2493 b660d5 2492->2493 2494 b660ce _exit 2492->2494 2495 b660de _cexit 2493->2495 2496 b660e9 2493->2496 2494->2493 2495->2496 2501 b660a6 _XcptFilter 2502 b624a7 2503 b624be 2502->2503 2504 b624af 2502->2504 2506 b623be 2504->2506 2507 b623f1 GetModuleHandleExW 2506->2507 2508 b6240d 2506->2508 2507->2508 2509 b62405 2507->2509 2508->2509 2510 b6242d GetModuleFileNameA 2508->2510 2511 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2509->2511 2510->2509 2512 b62493 2511->2512 2512->2503 2006 b66aa5 2007 b66a80 2006->2007 2007->2006 2009 b65e4f LdrResolveDelayLoadedAPI 2007->2009 2009->2007 2010 b65f25 2025 b667e8 2010->2025 2012 b65f31 GetStartupInfoW 2013 b65f4e 2012->2013 2014 b65f63 2013->2014 2015 b65f6a Sleep 2013->2015 2016 b65f82 _amsg_exit 2014->2016 2018 b65f8c 2014->2018 2015->2013 2016->2018 2017 b65fce _initterm 2021 b65fe9 __IsNonwritableInCurrentImage 2017->2021 2018->2017 2019 b65faf 2018->2019 2018->2021 2020 b660d5 2020->2019 2022 b660de _cexit 2020->2022 2021->2019 2021->2020 2024 b66086 exit 2021->2024 2026 b64136 HeapSetInformation NtSetInformationProcess 2021->2026 2022->2019 2024->2021 2025->2012 2027 b6416e 2026->2027 2027->2027 2082 b66953 2027->2082 2029 b64193 2030 b64197 AttachConsole 2029->2030 2031 b641ab LocalAlloc 2029->2031 2030->2031 2032 b643a7 2031->2032 2035 b641c1 2031->2035 2033 b643b6 ExitProcess 2032->2033 2034 b643b0 FreeConsole 2032->2034 2034->2033 2036 b643a0 LocalFree 2035->2036 2087 b65695 2035->2087 2036->2032 2041 b64202 LoadLibraryExW 2042 b6422a 2041->2042 2043 b6421a GetProcAddress 2041->2043 2044 b64233 2042->2044 2045 b6425a 2042->2045 2043->2042 2046 b640f3 5 API calls 2044->2046 2047 b64285 SetErrorMode 2045->2047 2048 b64261 2045->2048 2050 b64240 2046->2050 2097 b65911 PathIsRelativeW 2047->2097 2051 b640f3 5 API calls 2048->2051 2053 b64393 2050->2053 2054 b64248 2050->2054 2055 b6426f 2051->2055 2052 b642a3 2133 b65d6a NtOpenProcessToken RtlNtStatusToDosError 2052->2133 2057 b64397 FreeLibrary 2053->2057 2058 b6439e 2053->2058 2166 b63fe7 CoInitializeEx 2054->2166 2055->2053 2056 b64277 2055->2056 2174 b637c3 CoInitializeEx 2056->2174 2057->2058 2058->2036 2063 b64255 2063->2053 2064 b642b6 2145 b63e5b 2064->2145 2065 b64357 2193 b638f0 LoadStringW 2065->2193 2069 b64370 2069->2053 2071 b64380 DeactivateActCtx 2069->2071 2072 b6438c ReleaseActCtx 2069->2072 2070 b6434b LocalFree 2070->2069 2071->2072 2072->2053 2076 b64306 2163 b640f3 2076->2163 2078 b64319 2079 b64332 2078->2079 2080 b64341 FreeLibrary 2079->2080 2081 b6433a DestroyWindow 2079->2081 2080->2070 2081->2080 2083 b66966 2082->2083 2084 b66962 2082->2084 2085 b66981 2083->2085 2086 b6696b ApiSetQueryApiSetPresence 2083->2086 2084->2029 2085->2029 2086->2085 2089 b656d2 2087->2089 2091 b65771 2087->2091 2088 b641ef 2088->2036 2093 b640b1 NtQuerySystemInformation 2088->2093 2090 b6562f CompareStringW 2089->2090 2089->2091 2090->2089 2091->2088 2092 b65884 CharNextW 2091->2092 2092->2088 2092->2091 2094 b640dc 2093->2094 2207 b661b0 2094->2207 2096 b640f1 2096->2041 2096->2042 2098 b65940 RtlSetSearchPathMode SearchPathW 2097->2098 2099 b6596f 2097->2099 2098->2099 2113 b65ade 2098->2113 2102 b659b8 GetFileAttributesW 2099->2102 2103 b659d9 2099->2103 2099->2113 2100 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2101 b65aed 2100->2101 2101->2052 2102->2103 2104 b659ca CreateActCtxW 2102->2104 2105 b659e7 2103->2105 2106 b65afd 2103->2106 2104->2103 2107 b65abf ActivateActCtx 2105->2107 2108 b659fc CreateActCtxWWorker 2105->2108 2213 b662f8 2106->2213 2107->2113 2108->2107 2111 b65a27 CreateActCtxWWorker 2108->2111 2111->2113 2114 b65a48 CreateActCtxWWorker 2111->2114 2113->2100 2114->2107 2117 b65a69 GetModuleHandleW CreateActCtxWWorker 2114->2117 2115 b65b74 GetWindowLongW 2118 b65c4e NtdllDefWindowProc_W 2115->2118 2119 b65b85 GetWindow 2115->2119 2116 b65b39 2116->2118 2120 b65b50 SetWindowLongW 2116->2120 2117->2107 2117->2113 2121 b65c5c 2118->2121 2122 b65c47 2119->2122 2123 b65b99 memset GetClassNameW 2119->2123 2120->2121 2125 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2121->2125 2122->2118 2126 b65bc3 CompareStringW 2123->2126 2127 b65bed GetWindow 2123->2127 2128 b65c68 2125->2128 2126->2127 2129 b65be2 GetWindow 2126->2129 2127->2122 2130 b65bfa GetWindowLongW 2127->2130 2128->2052 2129->2127 2130->2122 2131 b65c10 2130->2131 2131->2122 2132 b65c26 SetWindowLongW 2131->2132 2132->2122 2134 b65da1 2133->2134 2140 b65dc7 2134->2140 2217 b65cf1 NtQueryInformationToken 2134->2217 2136 b65dff 2138 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2136->2138 2141 b642ae 2138->2141 2139 b65df7 2139->2136 2143 b65e08 NtOpenProcessToken 2139->2143 2140->2136 2140->2139 2142 b65ddd QueryActCtxW 2140->2142 2141->2064 2141->2065 2142->2139 2143->2136 2144 b65e1d NtSetInformationToken NtClose 2143->2144 2144->2136 2223 b63c66 LoadLibraryExW 2145->2223 2148 b63f62 2148->2070 2158 b63f6b GetPEB RtlImageNtHeader 2148->2158 2149 b63ea2 2240 b63d62 2149->2240 2151 b63f3b 2153 b638f0 12 API calls 2151->2153 2152 b63f29 2152->2148 2155 b63f58 FreeLibrary 2153->2155 2155->2148 2156 b63edf WideCharToMultiByte LocalAlloc 2156->2151 2157 b63f0c WideCharToMultiByte 2156->2157 2157->2152 2159 b63fbf ImageDirectoryEntryToData 2158->2159 2160 b63f89 2158->2160 2161 b63fd4 2159->2161 2160->2159 2162 b65c6c LoadIconW LoadCursorW RegisterClassW CreateWindowExW 2161->2162 2162->2076 2164 b640b1 5 API calls 2163->2164 2165 b64104 2164->2165 2165->2078 2167 b64064 2166->2167 2168 b6400d CLSIDFromString 2166->2168 2169 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2167->2169 2170 b6405e CoUninitialize 2168->2170 2171 b6401c CoCreateInstance 2168->2171 2172 b64070 2169->2172 2170->2167 2171->2170 2173 b64037 2171->2173 2172->2063 2173->2170 2175 b637e2 CoInitializeSecurity 2174->2175 2176 b638ed 2174->2176 2177 b638e7 CoUninitialize 2175->2177 2178 b637fe 2175->2178 2176->2063 2177->2176 2279 b6205a CoCreateInstance 2178->2279 2181 b6381b GetCurrentThreadId 2281 b653ad InitOnceExecuteOnce 2181->2281 2183 b6382a 2282 b64d3c 2183->2282 2185 b6385c CreateEventW 2186 b63872 SetEvent CloseHandle 2185->2186 2187 b63880 2185->2187 2186->2187 2188 b63884 CoWaitForMultipleHandles 2187->2188 2189 b638cf CloseHandle 2187->2189 2192 b638a1 2188->2192 2189->2177 2292 b63584 2192->2292 2194 b6392c 2193->2194 2201 b63a24 2193->2201 2313 b61f86 2194->2313 2195 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2197 b63a4d 2195->2197 2197->2069 2199 b63951 LoadStringW 2200 b63971 2199->2200 2199->2201 2200->2201 2202 b6397f CreateFileW 2200->2202 2201->2195 2202->2201 2203 b639a7 WriteConsoleW WriteConsoleW 2202->2203 2205 b639f5 2203->2205 2205->2205 2206 b63a00 WriteConsoleW CloseHandle 2205->2206 2206->2201 2208 b661b8 2207->2208 2209 b661bb 2207->2209 2208->2096 2212 b661c0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2209->2212 2211 b662f6 2211->2096 2212->2211 2216 b661c0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2213->2216 2215 b65b02 2215->2115 2215->2116 2216->2215 2218 b65d23 2217->2218 2219 b65d4c RtlNtStatusToDosError 2217->2219 2218->2219 2220 b65d46 2218->2220 2222 b65d2f NtQueryInformationToken 2218->2222 2221 b65d57 NtClose 2219->2221 2220->2219 2221->2140 2222->2219 2222->2220 2224 b63d12 RtlImageNtHeader 2223->2224 2225 b63c93 GetLastError 2223->2225 2228 b63d51 2224->2228 2229 b63d1d 2224->2229 2226 b63ca0 2225->2226 2227 b63cdb 2225->2227 2252 b63b09 2226->2252 2232 b63cf2 FormatMessageW 2227->2232 2233 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2228->2233 2229->2228 2230 b63d28 SetProcessMitigationPolicy 2229->2230 2230->2228 2232->2228 2235 b63cfc 2232->2235 2236 b63d60 2233->2236 2238 b638f0 12 API calls 2235->2238 2236->2148 2236->2149 2237 b63cab 2237->2228 2239 b63d10 2238->2239 2239->2228 2241 b63d85 2240->2241 2242 b63e52 2240->2242 2243 b63dad LocalAlloc 2241->2243 2244 b63d93 _wtoi GetProcAddress 2241->2244 2242->2151 2242->2152 2242->2156 2243->2242 2246 b63ddf WideCharToMultiByte 2243->2246 2244->2242 2247 b63e4b LocalFree 2246->2247 2248 b63dfb GetProcAddress 2246->2248 2247->2242 2248->2247 2250 b63e1f GetProcAddress 2248->2250 2250->2247 2251 b63e3c GetProcAddress 2250->2251 2251->2247 2269 b63a51 CreateFileW 2252->2269 2255 b63b2b GetCurrentProcess IsWow64Process2 2256 b63b4a 2255->2256 2268 b63b91 2255->2268 2258 b63b56 2256->2258 2259 b63ba1 RtlWow64IsWowGuestMachineSupported 2256->2259 2257 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2260 b63b9f 2257->2260 2262 b63b60 GetSystemDirectoryW 2258->2262 2258->2268 2261 b63bb3 2259->2261 2259->2268 2260->2232 2260->2237 2263 b63bbc GetSystemWow64Directory2W 2261->2263 2261->2268 2264 b63b72 2262->2264 2263->2264 2265 b63b76 PathCchAppend 2264->2265 2264->2268 2266 b63bd1 Wow64EnableWow64FsRedirection memset GetCommandLineW CreateProcessW Wow64EnableWow64FsRedirection 2265->2266 2265->2268 2267 b63c2e WaitForSingleObject CloseHandle CloseHandle 2266->2267 2266->2268 2267->2268 2268->2257 2270 b63a88 memset ReadFile 2269->2270 2271 b63af9 2269->2271 2272 b63af2 CloseHandle 2270->2272 2273 b63ab0 2270->2273 2274 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2271->2274 2272->2271 2273->2272 2276 b63abb SetFilePointer 2273->2276 2275 b63b07 2274->2275 2275->2255 2275->2268 2276->2272 2277 b63acc ReadFile 2276->2277 2277->2272 2278 b63aeb 2277->2278 2278->2272 2280 b6207c CreateEventW 2279->2280 2280->2177 2280->2181 2281->2183 2283 b64d5f 2282->2283 2291 b64dea 2283->2291 2298 b664a6 2283->2298 2285 b64dab 2286 b664a6 2 API calls 2285->2286 2287 b64dc9 2286->2287 2288 b664a6 2 API calls 2287->2288 2288->2291 2289 b64fbd 2289->2185 2290 b664a6 2 API calls 2290->2289 2291->2289 2291->2290 2293 b635a6 2292->2293 2294 b664a6 2 API calls 2293->2294 2297 b635f1 2293->2297 2294->2297 2306 b63306 2297->2306 2299 b663b2 __EH_prolog3_catch 2298->2299 2302 b66aca 2299->2302 2301 b663ca 2301->2285 2303 b66adf malloc 2302->2303 2304 b66ad2 _callnewh 2303->2304 2305 b66aee 2303->2305 2304->2303 2304->2305 2305->2301 2307 b63320 2306->2307 2308 b633d8 2307->2308 2309 b6337e AcquireSRWLockExclusive 2307->2309 2310 b63399 ReleaseSRWLockExclusive 2307->2310 2311 b633b3 DecodePointer 2307->2311 2312 b633a9 ReleaseSRWLockExclusive 2307->2312 2308->2189 2309->2307 2310->2307 2311->2307 2312->2311 2314 b61f94 2313->2314 2315 b61fb6 2314->2315 2317 b6201a _vsnwprintf 2314->2317 2315->2199 2315->2201 2318 b6203e 2317->2318 2318->2315 2518 b645a0 2521 b651ae 2518->2521 2522 b65207 CoResumeClassObjects 2521->2522 2523 b651ca 2521->2523 2524 b65216 2522->2524 2525 b645b6 2522->2525 2523->2524 2526 b651d9 CoRegisterClassObject 2523->2526 2524->2525 2528 b6521f CoRevokeClassObject 2524->2528 2526->2523 2527 b65203 2526->2527 2527->2522 2527->2524 2528->2525 2528->2528 2529 b661a0 2532 b66735 2529->2532 2531 b661a5 2531->2531 2533 b6675e GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 2532->2533 2534 b6675a 2532->2534 2535 b667ad 2533->2535 2534->2533 2534->2535 2535->2531 2536 b66915 2538 b668f5 2536->2538 2538->2536 2539 b65e4f LdrResolveDelayLoadedAPI 2538->2539 2539->2538 2540 b65490 2541 b654fa 2540->2541 2542 b655fb RoOriginateErrorW 2541->2542 2547 b6554c 2541->2547 2543 b655f9 2542->2543 2544 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2543->2544 2545 b6562b 2544->2545 2546 b655d2 RoOriginateError 2546->2543 2547->2546 2548 b655e1 2547->2548 2550 b633f9 2548->2550 2551 b6341e AcquireSRWLockShared 2550->2551 2555 b63487 2550->2555 2553 b63477 2551->2553 2554 b63441 DecodePointer 2551->2554 2553->2555 2556 b6347b ReleaseSRWLockShared 2553->2556 2557 b63461 2554->2557 2558 b634c9 AcquireSRWLockExclusive 2555->2558 2564 b63470 2555->2564 2556->2555 2559 b63469 ReleaseSRWLockShared 2557->2559 2557->2564 2560 b634ee DecodePointer 2558->2560 2561 b634de EncodePointer 2558->2561 2559->2564 2562 b63505 2560->2562 2561->2562 2563 b6350e ReleaseSRWLockExclusive 2562->2563 2562->2564 2563->2564 2564->2543 2565 b64510 CoAddRefServerProcess 2566 b66510 SetUnhandledExceptionFilter 2571 b6691f 2572 b66924 2571->2572 2575 b65e4f LdrResolveDelayLoadedAPI 2572->2575 2574 b66931 2575->2574 2589 b65e80 2590 b65e85 2589->2590 2598 b66598 GetModuleHandleW 2590->2598 2592 b65e91 __set_app_type __p__fmode __p__commode 2593 b65ec9 2592->2593 2594 b65ed2 __setusermatherr 2593->2594 2595 b65ede 2593->2595 2594->2595 2600 b667cd _controlfp 2595->2600 2597 b65ee3 2599 b665a9 2598->2599 2599->2592 2600->2597 2602 b63200 2603 b6322a 2602->2603 2604 b6320d 2602->2604 2607 b631df 2604->2607 2608 b631f8 GetProcAddress 2607->2608 2609 b631e8 GetModuleHandleW 2607->2609 2608->2603 2609->2608 2610 b65400 2611 b65414 RoOriginateError 2610->2611 2612 b65423 2610->2612 2613 b6542e 2611->2613 2615 b654a1 2612->2615 2620 b663b2 2615->2620 2617 b654b6 2618 b654bc 2617->2618 2624 b63718 2617->2624 2618->2613 2621 b663be __EH_prolog3_catch 2620->2621 2622 b66aca 2 API calls 2621->2622 2623 b663ca 2622->2623 2623->2617 2625 b63734 2624->2625 2626 b63755 SetEvent 2625->2626 2627 b6375c 2625->2627 2626->2627 2627->2618 2628 b63180 2636 b630bc 2628->2636 2631 b631a1 2632 b631ca 2631->2632 2641 b62f81 2631->2641 2637 b630df GetCurrentThreadId 2636->2637 2638 b630f8 2636->2638 2637->2638 2640 b6311f GetCurrentThreadId 2638->2640 2653 b63004 2638->2653 2640->2631 2640->2632 2642 b62f98 2641->2642 2646 b62fdc 2641->2646 2643 b62faa 2642->2643 2657 b64751 GetCurrentProcessId 2642->2657 2645 b62fc7 GetCurrentThreadId 2643->2645 2643->2646 2645->2646 2646->2632 2647 b62ebd 2646->2647 2648 b62ed4 2647->2648 2652 b62ee9 2647->2652 2649 b62f7a 2648->2649 2651 b6230b 3 API calls 2648->2651 2649->2632 2651->2652 2652->2649 2762 b62d48 2652->2762 2654 b630b3 2653->2654 2655 b63024 2653->2655 2654->2640 2655->2654 2655->2655 2656 b6309f memcpy_s 2655->2656 2656->2654 2658 b61f86 _vsnwprintf 2657->2658 2659 b6478e CreateMutexExW 2658->2659 2660 b646ca 15 API calls 2659->2660 2661 b647b7 2660->2661 2662 b647bf 2661->2662 2663 b647cb 2661->2663 2683 b62553 2662->2683 2664 b64b58 12 API calls 2663->2664 2666 b647e1 2664->2666 2686 b62c6f 2666->2686 2667 b647c4 2670 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2667->2670 2672 b6488c 2670->2672 2671 b64815 2674 b629db 11 API calls 2671->2674 2675 b64832 2671->2675 2672->2643 2674->2675 2678 b6484a 2675->2678 2679 b6483f 2675->2679 2704 b649d3 2675->2704 2676 b629db 11 API calls 2676->2678 2680 b62a77 13 API calls 2678->2680 2681 b6486a 2678->2681 2679->2676 2679->2678 2680->2681 2681->2667 2682 b62a52 13 API calls 2681->2682 2682->2667 2684 b6251b 12 API calls 2683->2684 2685 b62568 2684->2685 2685->2667 2687 b62cad 2686->2687 2688 b62cbb OpenSemaphoreW 2687->2688 2689 b62cd2 GetLastError 2688->2689 2690 b62cef 2688->2690 2691 b62cdd 2689->2691 2698 b62ceb 2689->2698 2726 b62b5a WaitForSingleObject 2690->2726 2723 b629fa 2691->2723 2693 b62d2f 2697 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2693->2697 2696 b62a52 13 API calls 2696->2693 2699 b62d42 2697->2699 2698->2693 2698->2696 2699->2671 2701 b629db 2699->2701 2700 b629db 11 API calls 2700->2698 2702 b62916 11 API calls 2701->2702 2703 b629f6 2702->2703 2703->2671 2746 b6230b GetProcessHeap HeapAlloc 2704->2746 2707 b64a03 2708 b629db 11 API calls 2707->2708 2711 b64a17 2708->2711 2709 b64afd 2710 b64a1c 2710->2709 2749 b62a9c 2710->2749 2711->2679 2714 b64a43 2716 b629db 11 API calls 2714->2716 2715 b64a60 memset 2717 b64a52 2715->2717 2716->2717 2718 b64ad4 2717->2718 2719 b62a52 13 API calls 2717->2719 2720 b64ade 2718->2720 2721 b62a52 13 API calls 2718->2721 2719->2718 2720->2711 2722 b64ae2 GetProcessHeap HeapFree 2720->2722 2721->2720 2722->2711 2741 b6298e 2723->2741 2727 b62b8b 2726->2727 2728 b62b78 2726->2728 2730 b62ba7 ReleaseSemaphore 2727->2730 2731 b62be4 ReleaseSemaphore 2727->2731 2740 b62b96 2727->2740 2729 b629fa 12 API calls 2728->2729 2733 b62b86 2729->2733 2730->2728 2734 b62bbf ReleaseSemaphore 2730->2734 2731->2728 2732 b62c02 2731->2732 2735 b62c0e ReleaseSemaphore 2732->2735 2732->2740 2733->2698 2733->2700 2737 b62bd0 GetLastError 2734->2737 2734->2740 2738 b62c1c GetLastError 2735->2738 2735->2740 2736 b629db 11 API calls 2736->2733 2737->2733 2737->2740 2739 b62c29 WaitForSingleObject 2738->2739 2738->2740 2739->2728 2739->2740 2740->2733 2740->2736 2742 b6251b 12 API calls 2741->2742 2743 b629a9 2742->2743 2744 b62843 11 API calls 2743->2744 2745 b629d2 2744->2745 2745->2698 2747 b6233f 2746->2747 2748 b62328 GetProcessHeap 2746->2748 2747->2707 2747->2710 2748->2747 2750 b62b54 2749->2750 2751 b62ac9 2749->2751 2752 b62afd CreateSemaphoreExW 2751->2752 2753 b62b23 2752->2753 2754 b62b19 2752->2754 2756 b62553 12 API calls 2753->2756 2755 b646ca 15 API calls 2754->2755 2757 b62b21 2755->2757 2756->2757 2758 b62b3d 2757->2758 2759 b629db 11 API calls 2757->2759 2760 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2758->2760 2759->2758 2761 b62b50 2760->2761 2761->2714 2761->2715 2763 b62da3 2762->2763 2764 b62e16 2763->2764 2765 b6230b 3 API calls 2763->2765 2767 b62e5c 2764->2767 2775 b64c0a 2764->2775 2766 b62df4 2765->2766 2766->2764 2768 b62dfb GetProcessHeap HeapFree 2766->2768 2767->2649 2768->2764 2771 b64c0a memcpy_s 2772 b62e3f 2771->2772 2779 b64ba0 2772->2779 2776 b62e30 2775->2776 2777 b64c1a 2775->2777 2776->2771 2777->2776 2778 b64c3d memcpy_s 2777->2778 2778->2776 2780 b64bb3 2779->2780 2782 b62e4e memset 2779->2782 2781 b64bdb memcpy_s 2780->2781 2780->2782 2781->2782 2782->2767 2783 b64700 2786 b6445f 2783->2786 2785 b6470d 2787 b63306 ctype 4 API calls 2786->2787 2788 b6446c 2787->2788 2788->2785 2324 b65ef0 __wgetmainargs 2802 b668f0 2803 b668f5 2802->2803 2805 b65e4f LdrResolveDelayLoadedAPI 2803->2805 2805->2803 2806 b64c70 2807 b663b2 2 API calls 2806->2807 2808 b64c84 2807->2808 2809 b66b70 2810 b66bb0 2809->2810 2811 b66b8b 2809->2811 2811->2810 2812 b66b90 GetProcessHeap HeapFree 2811->2812 2812->2811 2817 b624e0 GetModuleHandleW GetProcAddress 2818 b62503 2817->2818 2820 b64560 2821 b64594 2820->2821 2823 b6456f 2820->2823 2822 b6457d CoRevokeClassObject 2822->2823 2823->2821 2823->2822 2824 b63760 SHSetThreadRef CoCreateInstance SHSetThreadRef 2825 b66b60 2826 b66b6e 2825->2826 2828 b648b7 2825->2828 2827 b64979 2828->2827 2829 b64b58 12 API calls 2828->2829 2830 b64903 2829->2830 2831 b6496c 2830->2831 2832 b646ca 15 API calls 2830->2832 2831->2827 2834 b62a77 13 API calls 2831->2834 2833 b64917 2832->2833 2835 b646ca 15 API calls 2833->2835 2834->2827 2836 b64920 2835->2836 2837 b64925 GetLastError 2836->2837 2838 b6493f 2836->2838 2839 b62a77 13 API calls 2837->2839 2840 b64b03 6 API calls 2838->2840 2841 b64935 SetLastError 2839->2841 2842 b64947 2840->2842 2841->2838 2843 b649b2 13 API calls 2842->2843 2844 b6494e 2843->2844 2845 b6495b GetProcessHeap HeapFree 2844->2845 2846 b62a52 13 API calls 2844->2846 2845->2831 2846->2845 2863 b644d0 CoReleaseServerProcess 2864 b644e2 2863->2864 2865 b65250 2866 b65270 2865->2866 2867 b6525f RoOriginateError 2865->2867 2867->2866 2868 b66850 _except_handler4_common 2869 b653d1 2870 b65400 2869->2870 2871 b65414 RoOriginateError 2870->2871 2872 b65423 2870->2872 2874 b6542e 2871->2874 2873 b654a1 3 API calls 2872->2873 2873->2874 2883 b61e45 2884 b66483 4 API calls 2883->2884 2885 b61e4a 2884->2885 2886 b664c0 2887 b664fd 2886->2887 2889 b664d2 2886->2889 2888 b664f7 ?terminate@ 2888->2887 2889->2887 2889->2888 2890 b63240 2891 b63250 2890->2891 2892 b6326d 2890->2892 2893 b631df GetModuleHandleW 2891->2893 2894 b6325a GetProcAddress 2893->2894 2894->2892 2895 b643c0 RoOriginateError 2896 b64540 2899 b65094 2896->2899 2898 b64553 2900 b664a6 2 API calls 2899->2900 2901 b650bf 2900->2901 2902 b664a6 2 API calls 2901->2902 2903 b650d7 2902->2903 2903->2898 2904 b66b41 2905 b661b0 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 4 API calls 2904->2905 2906 b66b52 2905->2906

                                  Control-flow Graph

                                  APIs
                                  • PathIsRelativeW.API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0(?,00000000,00000000,00000000), ref: 00B65932
                                  • RtlSetSearchPathMode.NTDLL ref: 00B65945
                                  • SearchPathW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(00000000,?,00000000,00000104,?,?), ref: 00B65961
                                  • GetFileAttributesW.KERNEL32(?,?,?), ref: 00B659BF
                                  • CreateActCtxW.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(00000020,?,?), ref: 00B659D1
                                  • CreateActCtxWWorker.KERNEL32(00000020,?,?), ref: 00B65A17
                                  • CreateActCtxWWorker.KERNEL32(00000020,?,?), ref: 00B65A38
                                  • CreateActCtxWWorker.KERNEL32(00000020,?,?), ref: 00B65A59
                                  • GetModuleHandleW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,?,?), ref: 00B65A98
                                  • CreateActCtxWWorker.KERNEL32(?,?,?), ref: 00B65AB5
                                  • ActivateActCtx.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(?,00000000,?,?), ref: 00B65AF3
                                  • SetWindowLongW.USER32(?,00000000,00000001), ref: 00B65B67
                                  • GetWindowLongW.USER32(?,00000000), ref: 00B65B77
                                  • GetWindow.USER32(?,00000003), ref: 00B65B89
                                  • memset.MSVCRT ref: 00B65BA7
                                  • GetClassNameW.USER32(00000000,?,00000050), ref: 00B65BB9
                                  • CompareStringW.API-MS-WIN-CORE-STRING-L1-1-0(0000007F,00000001,?,000000FF,IME,000000FF), ref: 00B65BD7
                                  • GetWindow.USER32(00000000,00000003), ref: 00B65BE5
                                  • GetWindow.USER32(00000000,00000004), ref: 00B65BF0
                                  • GetWindowLongW.USER32(00000000,000000EC), ref: 00B65BFD
                                  • SetWindowLongW.USER32(00000000,000000EC,?), ref: 00B65C37
                                  • NtdllDefWindowProc_W.NTDLL(?,0000001C,?,?), ref: 00B65C56
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: Window$Create$LongWorker$Path$Search$ActivateAttributesClassCompareFileHandleModeModuleNameNtdllProc_RelativeStringmemset
                                  • String ID: $ $.manifest$IME$N$|
                                  • API String ID: 1028207903-3161873098
                                  • Opcode ID: 11cd33071b0b83cae35265a0cfe4d5847570e2bce5e5daca4b7583fad156cb66
                                  • Instruction ID: 03d24f540de58f68acdc522bf45da43ecb641c0e2d1158f14333ff50a0cb9218
                                  • Opcode Fuzzy Hash: 11cd33071b0b83cae35265a0cfe4d5847570e2bce5e5daca4b7583fad156cb66
                                  • Instruction Fuzzy Hash: 57916371900619AFDB30AF64DC88F9A7BF8EB45321F1442A5F519E31D0EBBC99848F61

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 51 b64136-b6416b HeapSetInformation NtSetInformationProcess 52 b6416e-b64177 51->52 52->52 53 b64179-b64195 call b66953 52->53 56 b64197-b641a6 AttachConsole 53->56 57 b641ab-b641bb LocalAlloc 53->57 56->57 58 b643a7-b643ae 57->58 59 b641c1-b641cf call b61ef1 57->59 60 b643b6-b643b7 ExitProcess 58->60 61 b643b0 FreeConsole 58->61 64 b641d5-b641f1 call b65695 59->64 65 b643a0-b643a1 LocalFree 59->65 61->60 64->65 68 b641f7-b64200 call b640b1 64->68 65->58 71 b64202-b64218 LoadLibraryExW 68->71 72 b6422c-b64231 68->72 73 b6422a 71->73 74 b6421a-b64228 GetProcAddress 71->74 75 b64233-b64242 call b640f3 72->75 76 b6425a-b6425f 72->76 73->72 74->72 84 b64393-b64395 75->84 85 b64248-b64255 call b63fe7 75->85 78 b64285-b642b0 SetErrorMode call b65911 call b65d6a 76->78 79 b64261-b64271 call b640f3 76->79 96 b642b6-b642e7 call b63e5b 78->96 97 b64357-b6436b call b638f0 78->97 79->84 87 b64277-b64280 call b637c3 79->87 88 b64397-b64398 FreeLibrary 84->88 89 b6439e 84->89 85->84 87->84 88->89 89->65 102 b6434b-b64355 LocalFree 96->102 103 b642e9-b642ee 96->103 101 b64370-b64377 97->101 101->84 104 b64379-b6437e 101->104 102->101 105 b642f0-b642f4 103->105 106 b642f8-b6431b call b63f6b call b65c6c call b640f3 103->106 107 b64380-b64386 DeactivateActCtx 104->107 108 b6438c-b6438d ReleaseActCtx 104->108 105->106 115 b64332-b64338 106->115 116 b6431d-b6432d call b64072 106->116 107->108 108->84 118 b64341-b64345 FreeLibrary 115->118 119 b6433a-b6433b DestroyWindow 115->119 116->115 118->102 119->118
                                  APIs
                                  • HeapSetInformation.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000001,00000000,00000000), ref: 00B6414D
                                  • NtSetInformationProcess.NTDLL ref: 00B64162
                                  • AttachConsole.API-MS-WIN-CORE-CONSOLE-L1-2-0(000000FF), ref: 00B64199
                                  • LocalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(00000040,00000000), ref: 00B641B1
                                  • LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(WLDP.DLL,00000000,00000800,?,?,?), ref: 00B6420E
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,WldpIsAllowedEntryPoint), ref: 00B64220
                                  • SetErrorMode.KERNEL32(00008001), ref: 00B6428A
                                  • DestroyWindow.USER32(?), ref: 00B6433B
                                  • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00B64345
                                  • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(00000000), ref: 00B6434F
                                  • DeactivateActCtx.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(00000000,00000000), ref: 00B64386
                                  • ReleaseActCtx.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(?), ref: 00B6438D
                                    • Part of subcall function 00B637C3: CoInitializeEx.API-MS-WIN-CORE-COM-L1-1-0(00000000,00000002), ref: 00B637D4
                                    • Part of subcall function 00B637C3: CoInitializeSecurity.API-MS-WIN-CORE-COM-L1-1-0(00B619CC,00000000,00000000,00000000,00000000,00000000,00000000,00000008,00000000), ref: 00B637F0
                                    • Part of subcall function 00B637C3: CreateEventW.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,00000001,00000000,00000000), ref: 00B63808
                                    • Part of subcall function 00B637C3: GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00B6381D
                                    • Part of subcall function 00B637C3: CreateEventW.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,00000000,00000000,?), ref: 00B63866
                                    • Part of subcall function 00B637C3: SetEvent.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00B63873
                                    • Part of subcall function 00B637C3: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 00B6387A
                                    • Part of subcall function 00B637C3: CoWaitForMultipleHandles.API-MS-WIN-CORE-COM-L1-1-0(00000000,00007530,00000001,00B68420,?), ref: 00B63897
                                    • Part of subcall function 00B637C3: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00B638D9
                                    • Part of subcall function 00B637C3: CoUninitialize.API-MS-WIN-CORE-COM-L1-1-0 ref: 00B638E7
                                  • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00B64398
                                  • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(00000000), ref: 00B643A1
                                  • FreeConsole.API-MS-WIN-CORE-CONSOLE-L1-2-0 ref: 00B643B0
                                  • ExitProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00B643B7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: Free$EventLibraryLocal$CloseConsoleCreateHandleInformationInitializeProcess$AddressAllocAttachCurrentDeactivateDestroyErrorExitHandlesHeapLoadModeMultipleProcReleaseSecurityThreadUninitializeWaitWindow
                                  • String ID: WLDP.DLL$WldpIsAllowedEntryPoint$localserver$requestedRunLevel
                                  • API String ID: 3009286836-3890604504
                                  • Opcode ID: de01af1a0375f4cbe2719739d4fdbb7a2cd9c3f9e74e317e796d8449221e8504
                                  • Instruction ID: 90048634af703054fb493404c0d0d6f2adefb6e4d486360ad72c324928382413
                                  • Opcode Fuzzy Hash: de01af1a0375f4cbe2719739d4fdbb7a2cd9c3f9e74e317e796d8449221e8504
                                  • Instruction Fuzzy Hash: DF61AB71108701AFC710EF24DC49A6F7BEAEF88714F044A68F996932E1DB78C949CB52

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 168 b65d6a-b65d9f NtOpenProcessToken RtlNtStatusToDosError 169 b65da1-b65daa 168->169 170 b65dac 168->170 169->170 171 b65dc7-b65dce 170->171 172 b65dae-b65db4 call b65cf1 170->172 174 b65dd0-b65dd2 171->174 175 b65e3e-b65e4e call b661b0 171->175 176 b65db9-b65dc4 NtClose 172->176 174->175 177 b65dd4-b65dd6 174->177 176->171 179 b65dfa-b65dfd 177->179 180 b65dd8-b65ddb 177->180 183 b65dff-b65e02 179->183 184 b65e08-b65e1b NtOpenProcessToken 179->184 180->179 182 b65ddd-b65df5 QueryActCtxW 180->182 182->179 185 b65df7 182->185 183->175 186 b65e04-b65e06 183->186 184->175 187 b65e1d-b65e38 NtSetInformationToken NtClose 184->187 185->179 186->175 187->175
                                  APIs
                                  • NtOpenProcessToken.NTDLL ref: 00B65D8E
                                  • RtlNtStatusToDosError.NTDLL ref: 00B65D95
                                  • NtClose.NTDLL ref: 00B65DBE
                                  • QueryActCtxW.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(80000000,00000000,00000000,00000005,?,0000000C,00000000), ref: 00B65DED
                                  • NtOpenProcessToken.NTDLL ref: 00B65E13
                                  • NtSetInformationToken.NTDLL(?,00000018,00000000,00000004), ref: 00B65E2F
                                  • NtClose.NTDLL ref: 00B65E38
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: Token$CloseOpenProcess$ErrorInformationQueryStatus
                                  • String ID:
                                  • API String ID: 3674487995-0
                                  • Opcode ID: 2e4b23918191f44cd0f11502a2bb251dbf320869da31cda0eeb2aa0293b9c8ff
                                  • Instruction ID: 9db9c191e38600dd6b67f922f2904a4e68a18bf94db56a6336432ac7a8d9c544
                                  • Opcode Fuzzy Hash: 2e4b23918191f44cd0f11502a2bb251dbf320869da31cda0eeb2aa0293b9c8ff
                                  • Instruction Fuzzy Hash: A9218532A0061AABDF309B948D49FAF7BB8EB45721F110264E915B71E0DA789D14C6A0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 189 b63c66-b63c91 LoadLibraryExW 190 b63d12-b63d1b RtlImageNtHeader 189->190 191 b63c93-b63c9e GetLastError 189->191 194 b63d51 190->194 195 b63d1d-b63d26 190->195 192 b63ca0-b63ca9 call b63b09 191->192 193 b63cdb-b63ced 191->193 204 b63cb2-b63cd9 192->204 205 b63cab-b63cad 192->205 199 b63cf2-b63cfa FormatMessageW 193->199 197 b63d53-b63d61 call b661b0 194->197 195->194 196 b63d28-b63d4b SetProcessMitigationPolicy 195->196 196->194 199->194 202 b63cfc-b63d10 call b638f0 199->202 202->194 204->199 205->197
                                  APIs
                                  • LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000008), ref: 00B63C87
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000000,00000008), ref: 00B63C93
                                  • FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00001200,00000000,00000000,00000000,?,00000104,00000000,?,00000000,00000008), ref: 00B63CF2
                                    • Part of subcall function 00B63B09: GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?), ref: 00B63B39
                                    • Part of subcall function 00B63B09: IsWow64Process2.API-MS-WIN-CORE-WOW64-L1-1-1(00000000), ref: 00B63B40
                                    • Part of subcall function 00B63B09: GetSystemDirectoryW.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,000000F6), ref: 00B63B6C
                                    • Part of subcall function 00B63B09: PathCchAppend.API-MS-WIN-CORE-PATH-L1-1-0(?,00000105,rundll32.exe), ref: 00B63B87
                                  • RtlImageNtHeader.NTDLL(00000000), ref: 00B63D13
                                  • SetProcessMitigationPolicy.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-1(00000000,?,00000008,?,00000000,00000008), ref: 00B63D4B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: Process$AppendCurrentDirectoryErrorFormatHeaderImageLastLibraryLoadMessageMitigationPathPolicyProcess2SystemWow64
                                  • String ID:
                                  • API String ID: 4162338769-0
                                  • Opcode ID: a0890ceb9cdc6ddcf238ed2f5c81ecf2e80980ee6a85777ac6f5c4e89b64bde4
                                  • Instruction ID: f54fa9fc636deeb0af5788ea23518fb328af8890408d8220dcff7b7533693619
                                  • Opcode Fuzzy Hash: a0890ceb9cdc6ddcf238ed2f5c81ecf2e80980ee6a85777ac6f5c4e89b64bde4
                                  • Instruction Fuzzy Hash: 8B2174706402186EFB14DB258C89FFA76FDEBD4B10F1440A9F509E71D0DEB88F848A61

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 228 b65cf1-b65d21 NtQueryInformationToken 229 b65d23-b65d27 228->229 230 b65d4c-b65d55 RtlNtStatusToDosError 228->230 231 b65d4b 229->231 232 b65d29-b65d2d 229->232 233 b65d57-b65d5f 230->233 234 b65d61 230->234 231->230 232->230 235 b65d2f-b65d44 NtQueryInformationToken 232->235 233->234 236 b65d65-b65d69 234->236 237 b65d63 234->237 235->230 238 b65d46-b65d49 235->238 237->236 238->230 238->231
                                  APIs
                                  • NtQueryInformationToken.NTDLL ref: 00B65D17
                                  • NtQueryInformationToken.NTDLL ref: 00B65D3C
                                  • RtlNtStatusToDosError.NTDLL ref: 00B65D4D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: InformationQueryToken$ErrorStatus
                                  • String ID:
                                  • API String ID: 1049779487-0
                                  • Opcode ID: 1567091156206c34e7006831e4544113b232e851810fdae50a6fea7fbee987c1
                                  • Instruction ID: 4d593e119840a13f8216bb79578d69b56e90b5c7e3e6b18a9723c5a4a638a757
                                  • Opcode Fuzzy Hash: 1567091156206c34e7006831e4544113b232e851810fdae50a6fea7fbee987c1
                                  • Instruction Fuzzy Hash: 06017571600219BBEF309AA19D4DFAE7BFCEB44755F1040B1AA01DB0D1D778D919CB60

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 239 b640b1-b640da NtQuerySystemInformation 240 b640e4-b640f2 call b661b0 239->240 241 b640dc-b640e0 239->241 241->240 242 b640e2 241->242 242->240
                                  APIs
                                  • NtQuerySystemInformation.NTDLL ref: 00B640D2
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: InformationQuerySystem
                                  • String ID:
                                  • API String ID: 3562636166-0
                                  • Opcode ID: d2d3eabac46f2ffeb825f3389a8caa5c35c3ca7bac8076fe60b033bb454da186
                                  • Instruction ID: eb5f3a554d52b9d4950273443e4d6e456bd8f29c792fa61382a9d1bc8b9c83d0
                                  • Opcode Fuzzy Hash: d2d3eabac46f2ffeb825f3389a8caa5c35c3ca7bac8076fe60b033bb454da186
                                  • Instruction Fuzzy Hash: B0E092347003087BE710DBA49A85BAEBBEC9B45708F141066EA41A71C1DAB4E8089621

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 245 b65e4f-b65e78 LdrResolveDelayLoadedAPI
                                  APIs
                                  • LdrResolveDelayLoadedAPI.NTDLL(00B60000,?,?), ref: 00B65E71
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: DelayLoadedResolve
                                  • String ID:
                                  • API String ID: 841769287-0
                                  • Opcode ID: b629aa93f9f5644c7fa9d538bd3a67ace5fc13b5eb6f6f7ecfd2e04b521ee427
                                  • Instruction ID: 495a067760b35b07de89b2a29a0d6e752c28f2153ce6bfe6b63912d50627c5c1
                                  • Opcode Fuzzy Hash: b629aa93f9f5644c7fa9d538bd3a67ace5fc13b5eb6f6f7ecfd2e04b521ee427
                                  • Instruction Fuzzy Hash: CAD0CA3B006248FF8F022FC6EC24C863F2AE788320B048002F608020B0CBBA8021EB60

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 120 b65f25-b65f4c call b667e8 GetStartupInfoW 123 b65f4e-b65f5d 120->123 124 b65f77-b65f79 123->124 125 b65f5f-b65f61 123->125 128 b65f7a-b65f80 124->128 126 b65f63-b65f68 125->126 127 b65f6a-b65f75 Sleep 125->127 126->128 127->123 129 b65f82-b65f8a _amsg_exit 128->129 130 b65f8c-b65f92 128->130 131 b65fc6-b65fcc 129->131 132 b65f94-b65fad call b66100 130->132 133 b65fc0 130->133 134 b65fce-b65fdf _initterm 131->134 135 b65fe9-b65feb 131->135 132->131 142 b65faf-b65fbb 132->142 133->131 134->135 137 b65ff6-b65ffd 135->137 138 b65fed-b65ff4 135->138 140 b66022-b6602b 137->140 141 b65fff-b6600c call b66640 137->141 138->137 140->142 144 b6602d-b66033 140->144 141->140 148 b6600e-b66020 141->148 145 b660f0-b660ff 142->145 147 b66036-b6603c 144->147 149 b6603e-b66041 147->149 150 b6608d-b66090 147->150 148->140 151 b66043-b66045 149->151 152 b6605c-b66060 149->152 153 b66092-b6609b 150->153 154 b6609e-b660a4 150->154 151->150 155 b66047-b6604a 151->155 156 b66062-b66066 152->156 157 b66068-b6606a 152->157 153->154 154->147 159 b660d5-b660dc 154->159 155->152 160 b6604c-b6604f 155->160 161 b6606b-b66073 call b64136 156->161 157->161 162 b660de-b660e4 _cexit 159->162 163 b660e9 159->163 160->152 164 b66051-b6605a 160->164 166 b66078-b66084 161->166 162->163 163->145 164->155 166->159 167 b66086-b66087 exit 166->167 167->150
                                  APIs
                                  • GetStartupInfoW.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,00B66C20,00000058), ref: 00B65F3A
                                  • Sleep.API-MS-WIN-CORE-SYNCH-L1-2-0(000003E8), ref: 00B65F6F
                                  • _amsg_exit.MSVCRT ref: 00B65F84
                                  • _initterm.MSVCRT ref: 00B65FD8
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00B66004
                                  • exit.MSVCRT ref: 00B66087
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: CurrentImageInfoNonwritableSleepStartup_amsg_exit_inittermexit
                                  • String ID:
                                  • API String ID: 2849151604-0
                                  • Opcode ID: 1d17bd6dfc8268ad39ba6fe95045ec91a46a1aeaadd2d4abb1294593656e74d1
                                  • Instruction ID: 9e332b36ac2cfd71e88fcd4bf00ac324fb146b69075dafb03a15c439b924ab8c
                                  • Opcode Fuzzy Hash: 1d17bd6dfc8268ad39ba6fe95045ec91a46a1aeaadd2d4abb1294593656e74d1
                                  • Instruction Fuzzy Hash: 8F41EE71A447129FDB359F58D88576A77E4EB44760F2006BEE806AB2D0DFBC8C40CB64

                                  Control-flow Graph

                                  APIs
                                  • LoadIconW.USER32(?,00000064), ref: 00B65C95
                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00B65CA4
                                  • RegisterClassW.USER32(?), ref: 00B65CC7
                                  • CreateWindowExW.USER32(00000080,RunDLL,00B619A0,00000000,80000000,80000000,00000000,00000000,00000000,00000000,?,00000000), ref: 00B65CE6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: Load$ClassCreateCursorIconRegisterWindow
                                  • String ID: RunDLL
                                  • API String ID: 1446224504-1316671358
                                  • Opcode ID: aeef00a3e24e09ae41023767c7798a04338b6d29dbd94041d4273a2f89d8c6cb
                                  • Instruction ID: fde179ba3449ec18b445298f3fa1bf780b8ae5e17bd8ecaec2b7bbe39fc993b4
                                  • Opcode Fuzzy Hash: aeef00a3e24e09ae41023767c7798a04338b6d29dbd94041d4273a2f89d8c6cb
                                  • Instruction Fuzzy Hash: 6C01E5B1D00208AFEB109F9A9C88EAFBEBCFB48754F504019F514E3280C7B859058BB4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 208 b63e5b-b63e9c call b63c66 211 b63f62-b63f68 208->211 212 b63ea2-b63eb7 call b63d62 208->212 215 b63f46-b63f49 212->215 216 b63ebd-b63ec2 212->216 217 b63f4e-b63f5c call b638f0 FreeLibrary 215->217 218 b63ec4-b63ec6 216->218 219 b63f29-b63f39 216->219 217->211 218->219 221 b63ec8-b63ecd 218->221 219->211 221->219 223 b63ecf-b63ed1 221->223 224 b63ed4-b63edd 223->224 224->224 225 b63edf-b63f0a WideCharToMultiByte LocalAlloc 224->225 226 b63f0c-b63f27 WideCharToMultiByte 225->226 227 b63f3b-b63f44 225->227 226->219 227->217
                                  APIs
                                    • Part of subcall function 00B63C66: LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000008), ref: 00B63C87
                                    • Part of subcall function 00B63C66: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000000,00000008), ref: 00B63C93
                                    • Part of subcall function 00B63D62: _wtoi.MSVCRT(?), ref: 00B63D94
                                    • Part of subcall function 00B63D62: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?), ref: 00B63DA0
                                  • WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(00000000,00000400,?,?,00000000,00000000,00000000,00000000), ref: 00B63EF5
                                  • LocalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(00000000,00000000), ref: 00B63F00
                                  • WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(00000000,00000400,?,?,00000000,00000000,00000000,00000000), ref: 00B63F1E
                                  • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?), ref: 00B63F5C
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: ByteCharLibraryMultiWide$AddressAllocErrorFreeLastLoadLocalProc_wtoi
                                  • String ID:
                                  • API String ID: 1343397253-0
                                  • Opcode ID: 40d80763ff67ec0a4627a74b94fdee3eafcfa160007b23a8409d9ef9c19200ec
                                  • Instruction ID: 3e39ab6f75595c284e6e3569a61621131dba019c9be271a9a16740d0f06cf02b
                                  • Opcode Fuzzy Hash: 40d80763ff67ec0a4627a74b94fdee3eafcfa160007b23a8409d9ef9c19200ec
                                  • Instruction Fuzzy Hash: B5313EB5A00205ABCB04CFA9C8549AFBBF9FF89B04F1440A9F905A7350DA759E01CB60

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 246 b65ef0-b65f22 __wgetmainargs
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: __wgetmainargs
                                  • String ID:
                                  • API String ID: 1709950718-0
                                  • Opcode ID: e0cfff25eaf25411ed16128dbece1e0f73c8f060a228638c07f0bb6b3d217316
                                  • Instruction ID: 34bac7492b620ac14df60928c5068dbbb53b77545b058cbb5a0170bb45c95ea0
                                  • Opcode Fuzzy Hash: e0cfff25eaf25411ed16128dbece1e0f73c8f060a228638c07f0bb6b3d217316
                                  • Instruction Fuzzy Hash: ECD0C9726C1201EB87609F24AD0A8013AE0A200B407000B94F408A32F2DEFD941C8B1D
                                  APIs
                                  • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00B662F6,00B61000), ref: 00B661C7
                                  • UnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00B662F6,?,00B662F6,00B61000), ref: 00B661D0
                                  • GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(C0000409,?,00B662F6,00B61000), ref: 00B661DB
                                  • TerminateProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(00000000,?,00B662F6,00B61000), ref: 00B661E2
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                  • String ID:
                                  • API String ID: 3231755760-0
                                  • Opcode ID: bfb45eb396fd2d3cdf2627ced4fb86f1cc2736db9ea3ecf02cea753a51ac2443
                                  • Instruction ID: 84f7a4a4e5216a2b6b500ed2542391b379a55116639dd5d9eb87d26507c7a8c1
                                  • Opcode Fuzzy Hash: bfb45eb396fd2d3cdf2627ced4fb86f1cc2736db9ea3ecf02cea753a51ac2443
                                  • Instruction Fuzzy Hash: 1FD0E972444105BBDF002BE1EC0DA593E2DFB45656F154410F71A974A1DFBA5412CB65
                                  APIs
                                  • GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,00000000,00000000), ref: 00B6265E
                                  • IsDebuggerPresent.API-MS-WIN-CORE-DEBUG-L1-1-0 ref: 00B62737
                                  • OutputDebugStringW.API-MS-WIN-CORE-DEBUG-L1-1-0(?), ref: 00B627A1
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: CurrentDebugDebuggerOutputPresentStringThread
                                  • String ID:
                                  • API String ID: 4268342597-0
                                  • Opcode ID: eb68979f4f89b941fe21ce01eb1ec7856118ea5829c9d244f8b5daf6abe2004b
                                  • Instruction ID: 3d7e2bcf317df2ca0ce37075ce662dbc52cb8fb48dbc543e0e3a6f5cc8b3d452
                                  • Opcode Fuzzy Hash: eb68979f4f89b941fe21ce01eb1ec7856118ea5829c9d244f8b5daf6abe2004b
                                  • Instruction Fuzzy Hash: 59618D35600A099FEB219F39D844A6A7BE6FF84710B1585A9E80AD73A0DF7CEC01CB50
                                  APIs
                                  • RtlImageNtHeader.NTDLL ref: 00B63F7A
                                  • ImageDirectoryEntryToData.IMAGEHLP(?,00000001,0000000A,?), ref: 00B63FCA
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: Image$DataDirectoryEntryHeader
                                  • String ID:
                                  • API String ID: 3478907836-0
                                  • Opcode ID: e31f195a5dd92d32aba28f35ddc4dff9387f126d9fb585de16bb40c6b9d6c6a0
                                  • Instruction ID: 21a256cf2a46cb397e29830032c3b63ce3eb148a0f643ced1a76ad0e9f687383
                                  • Opcode Fuzzy Hash: e31f195a5dd92d32aba28f35ddc4dff9387f126d9fb585de16bb40c6b9d6c6a0
                                  • Instruction Fuzzy Hash: AF018F75610351AAD7209F21C804BA3B7F8FF05B00F04059DF596DB291E779EA80CBA1
                                  APIs
                                  • CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0(00B6161C,00000000,00000001,00B61940,?), ref: 00B62072
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: CreateInstance
                                  • String ID:
                                  • API String ID: 542301482-0
                                  • Opcode ID: d118f3006d1886c95597b4cf4641fe918766c438f3de1a579a295bee1de05906
                                  • Instruction ID: b61b32d4ada636a65fc24293cdf43528ef5d720c7dde4efe28b9ff6814b85a2d
                                  • Opcode Fuzzy Hash: d118f3006d1886c95597b4cf4641fe918766c438f3de1a579a295bee1de05906
                                  • Instruction Fuzzy Hash: 35F08235740218BFDB00DB99CC55F8D77ADEB88750F140095FA06E72D0CAB5AE01CB90
                                  APIs
                                  • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(Function_000064C0), ref: 00B66515
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: 2a6860c8f1c6108f577e4a8f62716b4a051cec6fe6cdf9e56d98572543fb8f87
                                  • Instruction ID: 2aaf922523fbc7e093d97187ea8f13fd48ea191748c7b4bf36dd901c1bf21890
                                  • Opcode Fuzzy Hash: 2a6860c8f1c6108f577e4a8f62716b4a051cec6fe6cdf9e56d98572543fb8f87
                                  • Instruction Fuzzy Hash: 009002A02565004646002B706C0D50526E46E48A1A7420590E006C92A4EEAA41059551
                                  APIs
                                  • FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00001200,00000000,?,00000400,?,00000100,00000000), ref: 00B621D8
                                  • GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?), ref: 00B6223F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: CurrentFormatMessageThread
                                  • String ID: $%hs!%p: $%hs(%d) tid(%x) %08X %ws$%hs(%u)\%hs!%p: $(caller: %p) $CallContext:[%hs] $Exception$FailFast$LogHr$Msg:[%ws] $ReturnHr$[%hs(%hs)]$[%hs]
                                  • API String ID: 2411632146-3173542853
                                  • Opcode ID: d2039f94eda327ac9bf246204ea82270a6bec6cf4d1e370f5d5859a5deae5083
                                  • Instruction ID: 4dab67fa5d6b05f9202320dd3560b9742f3a04cc3e65b4efce480f3c02228ea3
                                  • Opcode Fuzzy Hash: d2039f94eda327ac9bf246204ea82270a6bec6cf4d1e370f5d5859a5deae5083
                                  • Instruction Fuzzy Hash: BE5124B1900B00ABFB345F69CC49F67B7F9EB55700F084ADDF106A21A2DA7D9940CB62
                                  APIs
                                    • Part of subcall function 00B63A51: CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00B63A7B
                                    • Part of subcall function 00B63A51: memset.MSVCRT ref: 00B63A8F
                                    • Part of subcall function 00B63A51: ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,00000040,?,00000000,00000000), ref: 00B63AA6
                                    • Part of subcall function 00B63A51: SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,00000000,00000000), ref: 00B63AC1
                                    • Part of subcall function 00B63A51: ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,000000F8,?,00000000), ref: 00B63AE1
                                    • Part of subcall function 00B63A51: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 00B63AF3
                                  • GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?), ref: 00B63B39
                                  • IsWow64Process2.API-MS-WIN-CORE-WOW64-L1-1-1(00000000), ref: 00B63B40
                                  • GetSystemDirectoryW.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,000000F6), ref: 00B63B6C
                                  • PathCchAppend.API-MS-WIN-CORE-PATH-L1-1-0(?,00000105,rundll32.exe), ref: 00B63B87
                                  • RtlWow64IsWowGuestMachineSupported.NTDLL ref: 00B63BA9
                                  • GetSystemWow64Directory2W.API-MS-WIN-CORE-WOW64-L1-1-1(?,000000F6,?), ref: 00B63BC9
                                  • Wow64EnableWow64FsRedirection.API-MS-WIN-CORE-KERNEL32-PRIVATE-L1-1-0(00000000), ref: 00B63BD4
                                  • memset.MSVCRT ref: 00B63BE6
                                  • GetCommandLineW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00B63C08
                                  • CreateProcessW.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,00000000), ref: 00B63C16
                                  • Wow64EnableWow64FsRedirection.API-MS-WIN-CORE-KERNEL32-PRIVATE-L1-1-0(00000001), ref: 00B63C20
                                  • WaitForSingleObject.API-MS-WIN-CORE-SYNCH-L1-1-0(?,000000FF), ref: 00B63C36
                                  • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?), ref: 00B63C44
                                  • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?), ref: 00B63C50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: Wow64$File$CloseHandle$CreateEnableProcessReadRedirectionSystemmemset$AppendCommandCurrentDirectoryDirectory2GuestLineMachineObjectPathPointerProcess2SingleSupportedWait
                                  • String ID: rundll32.exe
                                  • API String ID: 1294557600-3034741169
                                  • Opcode ID: 4aa6bd05c84ecbf09d9b789b0f4f6c005060dcc81debdbf3be524e17f6c1bfc1
                                  • Instruction ID: 3257f07885a4316de4ca85b6c16254fed6a4b9a82bae15c6920543cde7e0ca33
                                  • Opcode Fuzzy Hash: 4aa6bd05c84ecbf09d9b789b0f4f6c005060dcc81debdbf3be524e17f6c1bfc1
                                  • Instruction Fuzzy Hash: AF313272901129ABDF619B609C8DFEA77FCEB05B00F0801E5E609E3090DF789B85DB50
                                  APIs
                                  • CoInitializeEx.API-MS-WIN-CORE-COM-L1-1-0(00000000,00000002), ref: 00B637D4
                                  • CoInitializeSecurity.API-MS-WIN-CORE-COM-L1-1-0(00B619CC,00000000,00000000,00000000,00000000,00000000,00000000,00000008,00000000), ref: 00B637F0
                                  • CoUninitialize.API-MS-WIN-CORE-COM-L1-1-0 ref: 00B638E7
                                    • Part of subcall function 00B6205A: CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0(00B6161C,00000000,00000001,00B61940,?), ref: 00B62072
                                  • CreateEventW.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,00000001,00000000,00000000), ref: 00B63808
                                  • GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00B6381D
                                    • Part of subcall function 00B653AD: InitOnceExecuteOnce.API-MS-WIN-CORE-SYNCH-L1-2-0(00B684A4,00B653D0,00000000,00000000,00B6382A), ref: 00B653BB
                                  • CreateEventW.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,00000000,00000000,?), ref: 00B63866
                                  • SetEvent.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00B63873
                                  • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 00B6387A
                                  • CoWaitForMultipleHandles.API-MS-WIN-CORE-COM-L1-1-0(00000000,00007530,00000001,00B68420,?), ref: 00B63897
                                  • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00B638D9
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: CreateEvent$CloseHandleInitializeOnce$CurrentExecuteHandlesInitInstanceMultipleSecurityThreadUninitializeWait
                                  • String ID:
                                  • API String ID: 2536006573-0
                                  • Opcode ID: 093d2fe9608a75e09d7cd524a75fd2b5048d34d1e5e87207422bcb0a857b3f5d
                                  • Instruction ID: 5685411ae467e94a65dbd774d8ec6ce05916e9be6fa9c16f063412910fbf44e5
                                  • Opcode Fuzzy Hash: 093d2fe9608a75e09d7cd524a75fd2b5048d34d1e5e87207422bcb0a857b3f5d
                                  • Instruction Fuzzy Hash: 07314171600306AFEB115BB09C8DEAA7AECFB44B45B0445A9F506E32A1DFFCD9448B20
                                  APIs
                                  • LoadStringW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,000000C8), ref: 00B6391E
                                  • LoadStringW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000402,?,000000C8,?,000000C8), ref: 00B63963
                                  • CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(CONOUT$,C0000000,00000003,00000000,00000003,00000000,00000000,?,00000402,?,000000C8,?,000000C8), ref: 00B63992
                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(00000001,?,?,?,00000000,?,00000402,?,000000C8,?,000000C8), ref: 00B639D0
                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(00000001,00B61844,00000002,?,00000000,?,00000402,?,000000C8,?,000000C8), ref: 00B639E6
                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(00000001,?,?,?,00000000,?,00000402,?,000000C8,?,000000C8), ref: 00B63A15
                                  • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000001,?,00000402,?,000000C8,?,000000C8), ref: 00B63A1C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$LoadString$CloseCreateFileHandle
                                  • String ID: CONOUT$
                                  • API String ID: 258192622-3130406586
                                  • Opcode ID: 204118bde5bc50f77aef7650df38682d5a5d748fc2b585e7cb13a2a367653975
                                  • Instruction ID: aaa11e3aed5d3e1cc6cbe380c733ee3eb8456202768c7dd6d321b9d0b5692c19
                                  • Opcode Fuzzy Hash: 204118bde5bc50f77aef7650df38682d5a5d748fc2b585e7cb13a2a367653975
                                  • Instruction Fuzzy Hash: 0931A232500119ABEB20DB64CC49FEB77FCEB45B00F044195FA0AE7181EA74AB49CE64
                                  APIs
                                  • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00B63431
                                  • DecodePointer.API-MS-WIN-CORE-UTIL-L1-1-0(?), ref: 00B63443
                                  • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00B6346A
                                  • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00B6347C
                                  • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00B634CF
                                  • EncodePointer.API-MS-WIN-CORE-UTIL-L1-1-0(?), ref: 00B634E1
                                  • DecodePointer.API-MS-WIN-CORE-UTIL-L1-1-0(00000000), ref: 00B634EF
                                  • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?), ref: 00B6350F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: Lock$PointerReleaseShared$AcquireDecodeExclusive$Encode
                                  • String ID:
                                  • API String ID: 3770696666-0
                                  • Opcode ID: 33c9df0035957b0e1a8d457afa4084edb8bb35f7406988a56556d9aca4cd66b1
                                  • Instruction ID: 64dd6b6bf5bd855b7c758cd4bdbdbe3f6aa862f3b3997ffba26545fd43f72ef0
                                  • Opcode Fuzzy Hash: 33c9df0035957b0e1a8d457afa4084edb8bb35f7406988a56556d9aca4cd66b1
                                  • Instruction Fuzzy Hash: B9413A75A00219EFCB05DF65D89896DBBF9FF49B107144099E906EB3A0CB79AE01CF90
                                  APIs
                                  • WaitForSingleObject.API-MS-WIN-CORE-SYNCH-L1-1-0(?,00000000,?), ref: 00B62B6D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: ObjectSingleWait
                                  • String ID:
                                  • API String ID: 24740636-0
                                  • Opcode ID: 58584c2af3e9970e34ef36aec9694d84718c31129a41919be2af313e1f394de6
                                  • Instruction ID: b8414d77680e54b252c6108f9cc611986e49ce88e289703895a6f776a3e7071c
                                  • Opcode Fuzzy Hash: 58584c2af3e9970e34ef36aec9694d84718c31129a41919be2af313e1f394de6
                                  • Instruction Fuzzy Hash: A4316D70600A06ABFB245B619CC8BAF36EDEF51350F3480B6F506E62D0DB7CCD429692
                                  APIs
                                  • _wtoi.MSVCRT(?), ref: 00B63D94
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?), ref: 00B63DA0
                                  • LocalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(00000000,?), ref: 00B63DD3
                                  • WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(00000000,00000400,?,?,00000000,?,00000000,00000000), ref: 00B63DF1
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,?,?,00000000,?,00000000,00000000), ref: 00B63E13
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,?,?,00000000,?,00000000,00000000), ref: 00B63E30
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,?,?,00000000,?,00000000,00000000), ref: 00B63E43
                                  • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(00000000,?,?,00000000,?,00000000,00000000), ref: 00B63E4C
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: AddressProc$Local$AllocByteCharFreeMultiWide_wtoi
                                  • String ID:
                                  • API String ID: 3528786098-0
                                  • Opcode ID: 7dd1cea7406f4637bc96d43970fc98c66f69dd4bb2023b6c1189fd4f51a146fb
                                  • Instruction ID: 4887967de71ab9fbb997ab7304f5a27b9b41547cc3fb87397f0d83eba50c2bad
                                  • Opcode Fuzzy Hash: 7dd1cea7406f4637bc96d43970fc98c66f69dd4bb2023b6c1189fd4f51a146fb
                                  • Instruction Fuzzy Hash: E3317F76500212EFCB215F64DC489ABBBF9EF49B1071445AAED46D3250DBBA9E01CAB0
                                  APIs
                                  • CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00B63A7B
                                  • memset.MSVCRT ref: 00B63A8F
                                  • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,00000040,?,00000000,00000000), ref: 00B63AA6
                                  • SetFilePointer.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,00000000,00000000), ref: 00B63AC1
                                  • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,000000F8,?,00000000), ref: 00B63AE1
                                  • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 00B63AF3
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: File$Read$CloseCreateHandlePointermemset
                                  • String ID:
                                  • API String ID: 3827546496-0
                                  • Opcode ID: e62a4d395679897cf0470dee59e9a2f1f5cb59122154715389f147cf474b4992
                                  • Instruction ID: 0c889506683756eb474adedec2e3c22be27fae44fce9dc75884ac05dd8c096c1
                                  • Opcode Fuzzy Hash: e62a4d395679897cf0470dee59e9a2f1f5cb59122154715389f147cf474b4992
                                  • Instruction Fuzzy Hash: 931186716001247BDB209BA59C49FFF7BBCEF45B60F440158FA5CE20D0EAB89A45DBA1
                                  APIs
                                  • GetSystemTimeAsFileTime.API-MS-WIN-CORE-SYSINFO-L1-1-0(00000000), ref: 00B66762
                                  • GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00B66771
                                  • GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00B6677A
                                  • GetTickCount.API-MS-WIN-CORE-SYSINFO-L1-1-0 ref: 00B66783
                                  • QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?), ref: 00B66798
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                  • String ID:
                                  • API String ID: 1445889803-0
                                  • Opcode ID: 06b09b1fe3d20a7ada4a4e8af4b3af6d8c6c56fdc9273b198f86e166da6e7e15
                                  • Instruction ID: 54b947b39716443b862f1a6af9aa6b6376ee6e895660da23a3ef46e71beea7de
                                  • Opcode Fuzzy Hash: 06b09b1fe3d20a7ada4a4e8af4b3af6d8c6c56fdc9273b198f86e166da6e7e15
                                  • Instruction Fuzzy Hash: EB110671D01209AFDF20DFB8DA4869EB7F9EF58315F6148A5D802E7290EA789F049B50
                                  APIs
                                  • CharNextW.API-MS-WIN-CORE-STRING-L2-1-0(?,00000000,?,00000000,?), ref: 00B65885
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: CharNext
                                  • String ID: /$localserver$sta
                                  • API String ID: 3213498283-3694077230
                                  • Opcode ID: 346f6e1c155e81b6e9dabf88a6d9b216df12034b569ae4091c0725582bd8dba8
                                  • Instruction ID: 4d1199f8ab6fe1308819dbb1b4ed576e26700335937d62e8b355260f8a407bb0
                                  • Opcode Fuzzy Hash: 346f6e1c155e81b6e9dabf88a6d9b216df12034b569ae4091c0725582bd8dba8
                                  • Instruction Fuzzy Hash: 6E71A279A00626DBCF34DF5984106B9B3F1EFA8750F6444EAE8C5EB280EB788E51D750
                                  APIs
                                  • GetModuleHandleW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(kernelbase.dll), ref: 00B624EB
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,RaiseFailFastException), ref: 00B624F7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: RaiseFailFastException$kernelbase.dll
                                  • API String ID: 1646373207-919018592
                                  • Opcode ID: 6f318f487be221b582321a12a448f1179799b6b06df2e8a6c9c591413735dae0
                                  • Instruction ID: c208b720e48df89ced4fad658780e450e368168a3e63ce81a90d313f6c7ee620
                                  • Opcode Fuzzy Hash: 6f318f487be221b582321a12a448f1179799b6b06df2e8a6c9c591413735dae0
                                  • Instruction Fuzzy Hash: DAE0EC76540229B78F212FA5DC1CC9A7F6DEB447A27044452FE19931A0CE798C10DAA0
                                  APIs
                                  • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00B63381
                                  • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00B6339A
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: ExclusiveLock$AcquireRelease
                                  • String ID:
                                  • API String ID: 17069307-0
                                  • Opcode ID: db1abf698b784bbed2e48aec9b5c6a3dbe76faca56a56e3bac06f5bf2a88bd44
                                  • Instruction ID: cd08dcff5235f697c453f771247fdbd325a4028a8d855bd0f15d5b070bd02e00
                                  • Opcode Fuzzy Hash: db1abf698b784bbed2e48aec9b5c6a3dbe76faca56a56e3bac06f5bf2a88bd44
                                  • Instruction Fuzzy Hash: 4831C331600124EFCB049B19C898A6DBBE9FF49710B1540D5E906DB3A0CF78AE01CB94
                                  APIs
                                  • CoInitializeEx.API-MS-WIN-CORE-COM-L1-1-0(00000000,00000006), ref: 00B64003
                                  • CLSIDFromString.API-MS-WIN-CORE-COM-L1-1-0(?,?), ref: 00B64012
                                  • CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0(?,00000000,00000001,00B61970,?,?,?), ref: 00B6402D
                                  • CoUninitialize.API-MS-WIN-CORE-COM-L1-1-0(?,?), ref: 00B6405E
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: CreateFromInitializeInstanceStringUninitialize
                                  • String ID:
                                  • API String ID: 2575628211-0
                                  • Opcode ID: e513fc13412560d387f9dbaab5cdad16b903ff2756abcae6b9c1e63a2bc59c31
                                  • Instruction ID: 08ca965dc78659a640aeb0d600ea8308f53f9c86d42097e306386048d127d371
                                  • Opcode Fuzzy Hash: e513fc13412560d387f9dbaab5cdad16b903ff2756abcae6b9c1e63a2bc59c31
                                  • Instruction Fuzzy Hash: 8C115231700528AFDB14DB65DC55EAE7BBDEF48710F000095E605E7290CFB9A901CBA1
                                  APIs
                                    • Part of subcall function 00B66598: GetModuleHandleW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00B6659F
                                  • __set_app_type.MSVCRT ref: 00B65E92
                                  • __p__fmode.MSVCRT ref: 00B65EA8
                                  • __p__commode.MSVCRT ref: 00B65EB6
                                  • __setusermatherr.MSVCRT ref: 00B65ED7
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: HandleModule__p__commode__p__fmode__set_app_type__setusermatherr
                                  • String ID:
                                  • API String ID: 1632413811-0
                                  • Opcode ID: 940eb034b63b2b410d1eaa9286d820563d565e8446d0ed950147e028fec05ad2
                                  • Instruction ID: 41178791272166d9a6d4a51d5551c11c9833a4bdd01ed1cb225c2d233c54f5ef
                                  • Opcode Fuzzy Hash: 940eb034b63b2b410d1eaa9286d820563d565e8446d0ed950147e028fec05ad2
                                  • Instruction Fuzzy Hash: CAF0F2B05803099FCB28AF30A84A6083BA4BB15721B104B9AE466932F5DFBD8454CA54
                                  APIs
                                  • RoOriginateError.API-MS-WIN-CORE-WINRT-ERROR-L1-1-0(80040111,?), ref: 00B655D9
                                    • Part of subcall function 00B633F9: AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00B63431
                                    • Part of subcall function 00B633F9: DecodePointer.API-MS-WIN-CORE-UTIL-L1-1-0(?), ref: 00B63443
                                    • Part of subcall function 00B633F9: ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000), ref: 00B6346A
                                  • RoOriginateErrorW.API-MS-WIN-CORE-WINRT-ERROR-L1-1-0(80070057,00000012,?), ref: 00B65616
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: ErrorLockOriginateShared$AcquireDecodePointerRelease
                                  • String ID: activatibleClassId
                                  • API String ID: 3068322146-2691401494
                                  • Opcode ID: 4e29eec3d366f456f0909d4827ef6f1f3def7b1e1bdcf8d62f4f6079592ca263
                                  • Instruction ID: c09d8aaf3c688e49c19cc11f40f35800c6e88307c954586d10a58d89454a5ece
                                  • Opcode Fuzzy Hash: 4e29eec3d366f456f0909d4827ef6f1f3def7b1e1bdcf8d62f4f6079592ca263
                                  • Instruction Fuzzy Hash: 4941C571A10618EBCB24DF64DC98AAE77FAFF58710F104099E807E7291DB79AD11CB90
                                  APIs
                                  • GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(00000040,?,00000000,00000000), ref: 00B64771
                                  • CreateMutexExW.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,?,00000000,001F0001,?,?,?,?,?,00000000), ref: 00B647A5
                                    • Part of subcall function 00B646CA: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,?,00B62B21,00000000,?,?), ref: 00B646DA
                                    • Part of subcall function 00B646CA: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,?,00B62B21,00000000,?,?), ref: 00B646E9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CreateCurrentMutexProcess
                                  • String ID: Local\SM0:%d:%d:%hs
                                  • API String ID: 779401067-4162240545
                                  • Opcode ID: d2d3176e4e7c0ad7d4cae938e990d77c154ea02ddff538a1ee9b30c83adb7825
                                  • Instruction ID: b37deae25bb95fa5dbe06d358ca97891b582c20a221e8b6e24cfef9f8ff3acdb
                                  • Opcode Fuzzy Hash: d2d3176e4e7c0ad7d4cae938e990d77c154ea02ddff538a1ee9b30c83adb7825
                                  • Instruction Fuzzy Hash: 3841B471941938ABCB31DB64DC89AEA77F9EB54700F1041E5F809A7281DBB89E80CBD0
                                  APIs
                                  • OpenSemaphoreW.API-MS-WIN-CORE-SYNCH-L1-1-0(001F0003,00000000,?), ref: 00B62CC6
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00B62CD2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: ErrorLastOpenSemaphore
                                  • String ID: _p0
                                  • API String ID: 1909229842-2437413317
                                  • Opcode ID: 7146da838952f1883ea73e492aaf4f10b9bbd9a0a90f595ffd3d5be5cf4348ab
                                  • Instruction ID: 0590972d8a0760d59e627e4e27364b129fb2e75cf76193197b749403cabf7891
                                  • Opcode Fuzzy Hash: 7146da838952f1883ea73e492aaf4f10b9bbd9a0a90f595ffd3d5be5cf4348ab
                                  • Instruction Fuzzy Hash: 1C21F271205A05AFE315EF18D88596BB7E9EBC8310F108A6DF85587394DB38DC058AA2
                                  APIs
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,00000000,?), ref: 00B64925
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?), ref: 00B64936
                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,00000000,00000000,?), ref: 00B6495D
                                  • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,00000000,00000000,?), ref: 00B64964
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: ErrorHeapLast$FreeProcess
                                  • String ID:
                                  • API String ID: 1234203156-0
                                  • Opcode ID: 1c7a475f5dcc4cbf5629df3ddc64301703f216deca13e1c14b7c4e5ec398e1f9
                                  • Instruction ID: d14e43e2de76e1b5ad0b24587978c71d90c2aaed57da1903c1e2ff827d97de8c
                                  • Opcode Fuzzy Hash: 1c7a475f5dcc4cbf5629df3ddc64301703f216deca13e1c14b7c4e5ec398e1f9
                                  • Instruction Fuzzy Hash: CD21AC31500910AFCF15AFA0D985A7EBBE9EF8170930441D4F9069B1A6DFBC9D05DBA0
                                  APIs
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,00000000,?), ref: 00B64925
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?), ref: 00B64936
                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,00000000,00000000,?), ref: 00B6495D
                                  • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,00000000,00000000,?), ref: 00B64964
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: ErrorHeapLast$FreeProcess
                                  • String ID:
                                  • API String ID: 1234203156-0
                                  • Opcode ID: 6a7a811c7ed11aa79ddd98a09f0729bcd5fc321ec8f2965a8c003cd667f1e84c
                                  • Instruction ID: fff98d4f92f2cfa3771420efe426af7b6fdc3de9b797c58f6c1839c4cbd4d60b
                                  • Opcode Fuzzy Hash: 6a7a811c7ed11aa79ddd98a09f0729bcd5fc321ec8f2965a8c003cd667f1e84c
                                  • Instruction Fuzzy Hash: 1221AC31500820EFCF15AFA0D985AAEBBA9EF8170430441D4F802AB19ADFBC9D01DBA0
                                  APIs
                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,00000000,?,?,00B64B2F,?,00000000,00000000,?,?,?,00000000,?), ref: 00B62E80
                                  • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,?,00000000,?,?,?,00B648A0,?,?,?,?,00000000), ref: 00B62E87
                                  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,?,00B64B2F,?,00000000,00000000,?,?,?,00000000,?,?,?,00B648A0), ref: 00B62EA5
                                  • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?,?,?,00000000,?,?,?,00B648A0,?,?,?,?,00000000), ref: 00B62EAC
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4610504848.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                                  • Associated: 00000007.00000002.4610477592.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000007.00000002.4610531810.0000000000B69000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_b60000_SySe.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcess
                                  • String ID:
                                  • API String ID: 3859560861-0
                                  • Opcode ID: 93b289103173740ff90fb89894815f4e08b59570d16f298a793d33ac891a73f9
                                  • Instruction ID: b61ce8d8c8b1038037229c6cc5df78e20d7c9e8d3903ce455b372ec4cdc72909
                                  • Opcode Fuzzy Hash: 93b289103173740ff90fb89894815f4e08b59570d16f298a793d33ac891a73f9
                                  • Instruction Fuzzy Hash: E7F04F72610611AFDB188FA1DC88B65BBFCFF48312F110529F141C7490DBB9E995CBA0